Cryptology ePrint Archive: Listing for all
2023/381 (PDF ) Security of Blockchains at Capacity Lucianna Kiffer, Joachim Neu, Srivatsan Sridhar, Aviv Zohar, David Tse
2023/380 (PDF ) Security Analysis of Signature Schemes with Key Blinding Edward Eaton, Tancrède Lepoint, Christopher A. Wood
2023/379 (PDF ) Asymmetric Quantum Secure Multi-Party Computation With Weak Clients Against Dishonest Majority Theodoros Kapourniotis, Elham Kashefi, Dominik Leichtle, Luka Music, Harold Ollivier
2023/378 (PDF ) SGXonerated: Finding (and Partially Fixing) Privacy Flaws in TEE-based Smart Contract Platforms Without Breaking the TEE Nerla Jean-Louis, Yunqi Li, Yan Ji, Harjasleen Malvai, Thomas Yurek, Sylvain Bellemare, Andrew Miller
2023/377 (PDF ) FuLeeca: A Lee-based Signature Scheme Stefan Ritterhoff, Georg Maringer, Sebastian Bitzer, Violetta Weger, Patrick Karl, Thomas Schamberger, Jonas Schupp, Antonia Wachter-Zeh
2023/376 (PDF ) Efficient computation of $(3^n,3^n)$-isogenies Thomas Decru, Sabrina Kunzweiler
2023/375 (PDF ) Accelerating exp-log based finite field multiplication Nicolas Belleville
2023/374 (PDF ) Practical-Time Related-Key Attack on GOST with Secret S-boxes Orr Dunkelman, Nathan Keller, Ariel Weizman
2023/373 (PDF ) Consensus Algorithm Using Transaction History for Cryptocurrency Yuuki Komi, Takayuki Tatekawa
2023/372 (PDF ) Practically Solving LPN in High Noise Regimes Faster Using Neural Networks Haozhe Jiang, Kaiyue Wen, Yilei Chen
2023/371 (PDF ) PACIFIC: Privacy-preserving automated contact tracing scheme featuring integrity against cloning Scott Griffy, Anna Lysyanskaya
2023/370 (PDF ) Publicly-Verifiable Deletion via Target-Collapsing Functions James Bartusek, Dakshita Khurana, Alexander Poremba
2023/369 (PDF ) LURK: Lambda, the Ultimate Recursive Knowledge Nada Amin, John Burnham, François Garillot, Rosario Gennaro, Chhi'mèd Künzang, Daniel Rogozin, Cameron Wong
2023/368 (PDF ) AI Attacks AI: Recovering Neural Network architecture from NVDLA using AI-assisted Side Channel Attack Naina Gupta, Arpan Jati, Anupam Chattopadhyay
2023/367 (PDF ) Practical Attacks on Small Private Exponent RSA: New Records and New Insights Qiang Li, Qun-xiong Zheng, Wen-feng Qi
2023/366 (PDF ) Efficient Homomorphic Evaluation of Arbitrary Uni/Bivariate Integer Functions and Their Applications Daisuke Maeda, Koki Morimura, Shintaro Narisada, Kazuhide Fukushima, Takashi Nishide
2023/365 (PDF ) Verifiable encodings in multigroup fully homomorphic encryption Ramsès Fernàndez-València
2023/364 (PDF ) Zero-Knowledge Arguments for Subverted RSA Groups Dimitris Kolonelos, Mary Maller, Mikhail Volkhov
2023/363 (PDF ) Composable Long-Term Security with Rewinding Robin Berger, Brandon Broadnax, Michael Klooß, Jeremias Mechler, Jörn Müller-Quade, Astrid Ottenhues, Markus Raiber
2023/362 (PDF ) Protecting Quantum Procrastinators with Signature Lifting: A Case Study in Cryptocurrencies Or Sattath, Shai Wyborski
2023/361 (PDF ) Authenticated Encryption for Very Short Inputs Alexandre Adomnicai, Kazuhiko Minematsu, Junji Shikata
2023/360 (PDF ) Fast and Efficient Code-Based Digital Signature with Dual Inverse Matrix Farshid Haidary Makoui, T. Aaron Gulliver, Mohammad, Dakhilalian
2023/359 (PDF ) Convolutions in Overdrive: Maliciously Secure Convolutions for MPC Marc Rivinius, Pascal Reisert, Sebastian Hasler, Ralf Kuesters
2023/358 (PDF ) Efficient Code Based Cryptosystem with Dual Inverse Matrix Farshid Haidary Makoui, T. Aaron Gulliver, Mohammad Dakhilalian
2023/357 (PDF ) FFT-less TFHE: Simpler, Faster and Scale-invariant Zhen Gu, Wen-jie Lu, Cheng Hong
2023/356 (PDF ) Anamorphic Signatures: Secrecy From a Dictator Who Only Permits Authentication! Mirek Kutylowski, Giuseppe Persiano, Duong Hieu Phan, Moti Yung, Marcin Zawada
2023/355 (PDF ) Improved Differential Analysis of MIBS Based on Greedy Algorithm Jian Liu, Yanjun Li, Runyi Liu, Jian Zou, Zhiqiang Wang
2023/354 (PDF ) Guessing Less and Better: Improved Attacks on GIFT-64 Federico Canale, María Naya-Plasencia
2023/353 (PDF ) Searching for S-boxes with better Diffusion using Evolutionary Algorithm Rahul Mishra, Bhupendra Singh, Radhakrishnan Delhibabu
2023/352 (PDF ) Post-Quantum Security for the Extended Access Control Protocol Marc Fischlin, Jonas von der Heyden, Marian Margraf, Frank Morgner, Andreas Wallner, Holger Bock
2023/351 (PDF ) Anonymous Broadcast Authentication with Logarithmic-order Ciphertexts from DLP or LWE Yoshinori Aono, Junji Shikata
2023/350 (PDF ) Weighted Oblivious RAM, with Applications to Searchable Symmetric Encryption Leonard Assouline, Brice Minaud
2023/349 (PDF ) AAQ-PEKS: An Attribute-based Anti-Quantum Public-Key Encryption Scheme with Keyword Search for E-healthcare Scenarios Gang Xu, Shiyuan Xu, Yibo Cao, Ke Xiao, Xiu-Bo Chen, Mianxiong Dong, Shui Yu
2023/348 (PDF ) Optimal Security for Keyed Hash Functions: Avoiding Time-Space Tradeoffs for Finding Collisions Cody Freitag, Ashrujit Ghoshal, Ilan Komargodski
2023/347 (PDF ) Off-Chain Programmability at Scale Yibin Yang, Mohsen Minaei, Srinivasan Raghuraman, Ranjit Kumaresan, Mahdi Zamani
2023/346 (PDF ) How to achieve bidirectional zero-knowledge authentication? Jin Li, Xingyu Li, Chang Chen, Guoyu Yang, Junyang Li, Qi Chen, Hongyang Yan
2023/345 (PDF ) Encryption with Quantum Public Keys Alex B. Grilo, Or Sattath, Quoc-Huy Vu
2023/344 (PDF ) Quantum Search-to-Decision Reduction for the LWE Problem Kyohei Sudo, Masayuki Tezuka, Keisuke Hara, Yusuke Yoshida
2023/343 (PDF ) A Map of Witness Maps: New Definitions and Connections Suvradip Chakraborty, Manoj Prabhakaran, Daniel Wichs
2023/342 (PDF ) TurboSHAKE Guido Bertoni, Joan Daemen, Seth Hoffert, Michaël Peeters, Gilles Van Assche, Ronny Van Keer, Benoît Viguier
2023/341 (PDF ) On How Zero-Knowledge Proof Blockchain Mixers Improve, and Worsen User Privacy Zhipeng Wang, Stefanos Chaliasos, Kaihua Qin, Liyi Zhou, Lifeng Gao, Pascal Berrang, Benjamin Livshits, Arthur Gervais
2023/340 (PDF ) SALSA PICANTE: a machine learning attack on LWE with binary secrets Cathy Li, Jana Sotáková, Emily Wenger, Mohamed Malhou, Evrard Garcelon, Francois Charton, Kristin Lauter
2023/339 (PDF ) An Analysis of the Post Quantum and Classical Security of 4x4 and 16x4 S-Boxes and Their Implementations in Simplified-AES Christopher Dunne
2023/338 (PDF ) Shield: Secure Allegation Escrow System with Stronger Guarantees Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal
2023/337 (PDF ) Quantum Implementation of AIM: Aiming for Low-Depth Kyungbae Jang, Dukyoung Kim, Yujin Oh, Sejin Lim, Yujin Yang, Hyunji Kim, Hwajeong Seo
2023/336 (PDF ) A Novel Approach to e-Voting with Group Identity Based Identification and Homomorphic Encryption Apurva K Vangujar, Buvana Ganesh, Paolo Palmieri
2023/335 (PDF ) Separating Oil and Vinegar with a Single Trace Thomas Aulbach, Fabio Campos, Juliane Krämer, Simona Samardjiska, Marc Stöttinger
2023/334 (PDF ) A Generic Transform from Multi-Round Interactive Proof to NIZK Pierre-Alain Fouque, Adela Georgescu, Chen Qian, Adeline Roux-Langlois, Weiqiang Wen
2023/333 (PDF ) Secret Sharing Scheme with Perfect Concealment Izumi Takeuti, Tomoko Adachi
2023/332 (PDF ) Asymmetric Group Message Franking: Definitions & Constructions Junzuo Lai, Gongxian Zeng, Zhengan Huang, Siu Ming Yiu, Xin Mu, Jian Weng
2023/331 (PDF ) A Vulnerability in Implementations of SHA-3, SHAKE, EdDSA, and Other NIST-Approved Algorithm Nicky Mouha, Christopher Celi
2023/330 (PDF ) Perfect MPC over Layered Graphs Bernardo David, Anders Konring, Yuval Ishai, Eyal Kushilevitz, Varun Narayanan
2023/329 (PDF ) Caveat Implementor! Key Recovery Attacks on MEGA Martin R. Albrecht, Miro Haller, Lenka Mareková, Kenneth G. Paterson
2023/328 (PDF ) The state diagram of $\chi$ Jan Schoone, Joan Daemen
2023/327 (PDF ) New Quantum Search Model on Symmetric Ciphers and Its Applications Yangru Zheng, Juntao Gao, Baocang Wang
2023/326 (PDF ) A weakness in OCB3 used with short nonces allowing for a break of authenticity and confidentiality Jean Liénardy, Frédéric Lafitte
2023/325 (PDF ) Revocable Cryptography from Learning with Errors Prabhanjan Ananth, Alexander Poremba, Vinod Vaikuntanathan
2023/324 (PDF ) LATKE: An identity-binding PAKE from lattice assumptions Michael Rosenberg
2023/323 (PDF ) Poseidon2: A Faster Version of the Poseidon Hash Function Lorenzo Grassi, Dmitry Khovratovich, Markus Schofnegger
2023/322 (PDF ) Differential Fault Attack on Rasta and $\text {FiLIP} _ {\text {DSM}}$ R Radheshwar, Meenakshi Kansal, Pierrick Méaux, Dibyendu Roy
2023/321 (PDF ) A Holistic Security Analysis of Monero Transactions Cas Cremers, Julian Loss, Benedikt Wagner
2023/320 (PDF ) Anonymous Counting Tokens Fabrice Benhamouda, Mariana Raykova, Karn Seth
2023/319 (PDF ) A Sharding-Based Approach for Enhancing Efficiency in ISSDOs for Sharing Scattered Values Reza Ghasemi
2023/318 (PDF ) A Transformation for Lifting Discrete Logarithm Based Cryptography to Post-Quantum Cryptography Danilo Gligoroski
2023/317 (PDF ) The special case of cyclotomic fields in quantum algorithms for unit groups Razvan Barbulescu, Adrien Poulalion
2023/316 (PDF ) New Methods for Bounding the Length of Impossible Differentials of SPN Block Ciphers Senpeng Wang, Dengguo Feng, Bin Hu, Jie Guan, Ting Cui, Tairong Shi, Kai Zhang
2023/315 (PDF ) SoK on Blockchain Evolution and a Taxonomy for Public Blockchain Generations Thuat Do
2023/314 (PDF ) Memory-Tight Multi-Challenge Security of Public-Key Encryption Joseph Jaeger, Akshaya Kumar
2023/313 (PDF ) SoK: Metadata-Protecting Communication Systems Sajin Sasy, Ian Goldberg
2023/312 (PDF ) BIP32-Compatible Threshold Wallets Poulami Das, Andreas Erwig, Sebastian Faust, Julian Loss, Siavash Riahi
2023/311 (PDF ) Oblivious Transfer from Zero-Knowledge Proofs, or How to Achieve Round-Optimal Quantum Oblivious Transfer and Zero-Knowledge Proofs on Quantum States Léo Colisson, Garazi Muguruza, Florian Speelman
2023/310 (PDF ) Ramen: Souper Fast Three-Party Computation for RAM Programs Lennart Braun, Mahak Pancholi, Rahul Rachuri, Mark Simkin
2023/309 (PDF ) Practical Construction for Secure Trick-Taking Games Even With Cards Set Aside Rohann Bella, Xavier Bultel, Céline Chevalier, Pascal Lafourcade, Charles Olivier-Anclin
2023/308 (PDF ) Punctured Syndrome Decoding Problem Efficient Side-Channel Attacks Against Classic McEliece Vincent Grosso, Pierre-Louis Cayrel, Brice Colombier, Vlad-Florin Dragoi
2023/307 (PDF ) SUPERPACK: Dishonest Majority MPC with Constant Online Communication Daniel Escudero, Vipul Goyal, Antigoni Polychroniadou, Yifan Song, Chenkai Weng
2023/306 (PDF ) A Simple Construction of Quantum Public-Key Encryption from Quantum-Secure One-Way Functions Khashayar Barooti, Giulio Malavolta, Michael Walter
2023/305 (PDF ) A Novel Related Nonce Attack for ECDSA Marco Macchetti
2023/304 (PDF ) On homomorphic encryption using abelian groups: Classical security analysis Eleni Agathocleous, Vishnupriya Anupindi, Annette Bachmayr, Chloe Martindale, Rahinatou Yuh Njah Nchiwo, Mima Stanojkovski
2023/303 (PDF ) Fusion One-Time Non-Interactively-Aggregatable Digital Signatures From Lattices Brandon Goodell, Aaron Feickert
2023/302 (PDF ) Does the Dual-Sieve Attack on Learning with Errors even Work? Léo Ducas, Ludo Pulles
2023/301 (PDF ) On Circuit Private, Multikey and Threshold Approximate Homomorphic Encryption Kamil Kluczniak, Giacomo Santato
2023/300 (PDF ) CNF Characterization of Sets over $\mathbb{Z}_2^n$ and Its Applications in Cryptography Hu Xiaobo, Xu Shengyuan, Tu Yinzi, Feng Xiutao
2023/299 (PDF ) Approximate Modeling of Signed Difference and Digraph based Bit Condition Deduction: New Boomerang Attacks on BLAKE Yonglin Hao, Qingju Wang, Lin Jiao, Xinxin Gong
2023/298 (PDF ) Hardening Signature Schemes via Derive-then-Derandomize: Stronger Security Proofs for EdDSA Mihir Bellare, Hannah Davis, Zijing Di
2023/297 (PDF ) Authenticated private information retrieval Simone Colombo, Kirill Nikitin, Henry Corrigan-Gibbs, David J. Wu, Bryan Ford
2023/296 (PDF ) OpenPubkey: Augmenting OpenID Connect with User held Signing Keys Ethan Heilman, Lucie Mugnier, Athanasios Filippidis, Sharon Goldberg, Sebastien Lipman, Yuval Marcus, Mike Milano, Sidhartha Premkumar, Chad Unrein
2023/295 (PDF ) Randomized Half-Ideal Cipher on Groups with applications to UC (a)PAKE Bruno Freitas Dos Santos, Yanqi Gu, Stanislaw Jarecki
2023/294 (PDF ) SCA-LDPC: A Code-Based Framework for Key-Recovery Side-Channel Attacks on Post-Quantum Encryption Schemes Qian Guo, Denis Nabokov, Alexander Nilsson, Thomas Johansson
2023/293 (PDF ) Searching for Gemstones: Flawed Stegosystems May Hide Promissing Ideas Diana Maimut, Evgnosia-Alexandra Kelesidis, Ilona Teodora Ciocan
2023/292 (PDF ) A Formal Treatment of Distributed Key Generation, and New Constructions Chelsea Komlo, Ian Goldberg, Douglas Stebila
2023/291 (PDF ) PEO-Store: Practical and Economical Oblivious Store with Peer-to-Peer Delegation Wenlong Tian, Jian Guo, Zhiyong Xu, Ruixuan Li, Weijun Xiao
2023/290 (PDF ) Improved Key Pair Generation for Falcon, BAT and Hawk Thomas Pornin
2023/289 (PDF ) Lower-Bounds for Secret-Sharing Schemes for k-Hypergraphs Amos Beimel
2023/288 (PDF ) Efficient Detection of High Probability Statistical Properties of Cryptosystems via Surrogate Differentiation Itai Dinur, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir
2023/287 (PDF ) Modelling Delay-based Physically Unclonable Functions through Particle Swarm Optimization Nimish Mishra, Kuheli Pratihar, Anirban Chakraborty, Debdeep Mukhopadhyay
2023/286 (PDF ) DORCIS: Depth Optimized Quantum Implementation of Substitution Boxes Matthew Chun, Anubhab Baksi, Anupam Chattopadhyay
2023/285 (PDF ) New Records in Collision Attacks on RIPEMD-160 and SHA-256 Yingxin Li, Fukang Liu, Gaoli Wang
2023/284 (PDF ) Robust and Reusable Fuzzy Extractors and their Application to Authentication from Iris Data Somnath Panja, Nikita Tripathi, Shaoquan Jiang, Reihaneh Safavi-Naini
2023/283 (PDF ) Maximizing Miner Revenue in Transaction Fee Mechanism Design Ke Wu, Elaine Shi, Hao Chung
2023/282 (PDF ) Quantum trapdoor functions from classical one-way functions Andrea Coladangelo
2023/281 (PDF ) Towards A Correct-by-Construction FHE Model Zhenkun Yang, Wen Wang, Jeremy Casas, Pasquale Cocchini, Jin Yang
2023/280 (PDF ) A Simple Single Slot Finality Protocol For Ethereum Francesco D'Amato, Luca Zanolini
2023/279 (PDF ) Recent Latest Message Driven GHOST: Balancing Dynamic Availability With Asynchrony Resilience Francesco D'Amato, Luca Zanolini
2023/278 (PDF ) Actively Secure Half-Gates with Minimum Overhead under Duplex Networks Hongrui Cui, Xiao Wang, Kang Yang, Yu Yu
2023/277 (PDF ) Analysis of RIPEMD-160: New Collision Attacks and Finding Characteristics with MILP Fukang Liu, Gaoli Wang, Santanu Sarkar, Ravi Anand, Willi Meier, Yingxin Li, Takanori Isobe
2023/276 (PDF ) Threshold and Multi-Signature Schemes from Linear Hash Functions Stefano Tessaro, Chenzhi Zhu
2023/275 (PDF ) Revisiting BBS Signatures Stefano Tessaro, Chenzhi Zhu
2023/274 (PDF ) Panacea: Non-interactive and Stateless Oblivious RAM Kelong Cong, Debajyoti Das, Georgio Nicolas, Jeongeun Park
2023/273 (PDF ) Derecho: Privacy Pools with Proof-Carrying Disclosures Josh Beal, Ben Fisch
2023/272 (PDF ) A study of KEM generalizations Bertram Poettering, Simon Rastikian
2023/271 (PDF ) Swoosh: Practical Lattice-Based Non-Interactive Key Exchange Phillip Gajland, Bor de Kock, Miguel Quaresma, Giulio Malavolta, Peter Schwabe
2023/270 (PDF ) Actively Secure Arithmetic Computation and VOLE with Constant Computational Overhead Benny Applebaum, Niv Konstantini
2023/269 (PDF ) Simple Two-Round OT in the Explicit Isogeny Model Emmanuela Orsini, Riccardo Zanotto
2023/268 (PDF ) Verifiable Multi-Client Functional Encryption for Inner Product Dinh Duy Nguyen, Duong Hieu Phan, David Pointcheval
2023/267 (PDF ) PROTEUS: A Tool to generate pipelined Number Theoretic Transform Architectures for FHE and ZKP applications Florian Hirner, Ahmet Can Mert, Sujoy Sinha Roy
2023/266 (PDF ) Do we need to change some things? Open questions posed by the upcoming post-quantum migration to existing standards and deployments Panos Kampanakis, Tancrède Lepoint
2023/265 (PDF ) Obfuscation and Outsourced Computation with Certified Deletion James Bartusek, Sanjam Garg, Vipul Goyal, Dakshita Khurana, Giulio Malavolta, Justin Raizes, Bhaskar Roberts
2023/264 (PDF ) Public Key Encryption with Secure Key Leasing Shweta Agrawal, Fuyuki Kitagawa, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
2023/263 (PDF ) DualMS: Efficient Lattice-Based Two-Round Multi-Signature with Trapdoor-Free Simulation Yanbo Chen
2023/262 (PDF ) Generic Attack on Duplex-Based AEAD Modes using Random Function Statistics Henri Gilbert, Rachelle Heim Boissier, Louiza Khati, Yann Rotella
2023/261 (PDF ) A Greedy Global Framework for LLL Sanjay Bhattacherjee, Julio Hernandez-Castro, Jack Moyler
2023/260 (PDF ) Webb Protocol: A cross-chain private application and governance protocol. Drew Stone
2023/259 (PDF ) A MIQCP-Based Automatic Search Algorithm for Differential-Linear Trails of ARX Ciphers(Long Paper) Guangqiu Lv, Chenhui Jin, Ting Cui
2023/258 (PDF ) Privacy-Preserving Tree-Based Inference with Fully Homomorphic Encryption Jordan Frery, Andrei Stoian, Roman Bredehoft, Luis Montero, Celia Kherfallah, Benoit Chevallier-Mames, Arthur Meyre
2023/257 (PDF ) Deep Neural Networks for Encrypted Inference with TFHE Andrei Stoian, Jordan Frery, Roman Bredehoft, Luis Montero, Celia Kherfallah, Benoit Chevallier-Mames
2023/256 (PDF ) Traitor Tracing with N^(1/3)-size Ciphertexts and O(1)-size Keys from k-Lin Junqing Gong, Ji Luo, Hoeteck Wee
2023/255 (PDF ) Exploiting Non-Full Key Additions: Full-Fledged Automatic Demirci-Selcuk Meet-in-the-Middle Cryptanalysis of SKINNY Danping Shi, Siwei Sun, Ling Song, Lei Hu, Qianqian Yang
2023/254 (PDF ) Mitigating Decentralized Finance Liquidations with Reversible Call Options Kaihua Qin, Jens Ernstberger, Liyi Zhou, Philipp Jovanovic, Arthur Gervais
2023/253 (PDF ) XOCB: Beyond-Birthday-Bound Secure Authenticated Encryption Mode with Rate-One Computation (Full Version) Zhenzhen Bao, Seongha Hwang, Akiko Inoue, Byeonghak Lee, Jooyoung Lee, Kazuhiko Minematsu
2023/252 (PDF ) Obfuscation of Pseudo-Deterministic Quantum Circuits James Bartusek, Fuyuki Kitagawa, Ryo Nishimaki, Takashi Yamakawa
2023/251 (PDF ) Hardware Root-of-Trust implementations in Trusted Execution Environments Usman Ali, Hamza Omar, Chujiao Ma, Vaibhav Garg, Omer Khan
2023/250 (PDF ) A Lower Bound on the Length of Signatures Based on Group Actions and Generic Isogenies Dan Boneh, Jiaxin Guan, Mark Zhandry
2023/249 (PDF ) Anamorphic Encryption, Revisited Fabio Banfi, Konstantin Gegier, Martin Hirt, Ueli Maurer
2023/248 (PDF ) Unique-Path Identity Based Encryption With Applications to Strongly Secure Messaging Paul Rösler, Daniel Slamanig, Christoph Striecks
2023/247 (PDF ) A New Sieving-Style Information-Set Decoding Algorithm Qian Guo, Thomas Johansson, Vu Nguyen
2023/246 (PDF ) Fixing and Mechanizing the Security Proof of Fiat-Shamir with Aborts and Dilithium Manuel Barbosa, Gilles Barthe, Christian Doczkal, Jelle Don, Serge Fehr, Benjamin Grégoire, Yu-Hsuan Huang, Andreas Hülsing, Yi Lee, Xiaodi Wu
2023/245 (PDF ) A Detailed Analysis of Fiat-Shamir with Aborts Julien Devevey, Pouria Fallahpour, Alain Passelègue, Damien Stehlé
2023/244 (PDF ) Semi-Quantum Copy-Protection and More Céline Chevalier, Paul Hermouet, Quoc-Huy Vu
2023/243 (PDF ) Memory-Efficient Attacks on Small LWE Keys Andre Esser, Rahul Girme, Arindam Mukherjee, Santanu Sarkar
2023/242 (PDF ) The propagation game: on simulatability, correlation matrices, and probing security Vittorio Zaccaria
2023/241 (PDF ) Lynx: Family of Lightweight Authenticated Encryption Schemes based on Tweakable Blockcipher Munawar Hasan, Donghoon Chang
2023/240 (PDF ) Pitfalls and Shortcomings for Decompositions and Alignment (Full Version) Baptiste Lambin, Gregor Leander, Patrick Neumann
2023/238 (PDF ) Certifying Giant Nonprimes Charlotte Hoffmann, Pavel Hubáček, Chethan Kamath, Krzysztof Pietrzak
2023/237 (PDF ) Fast Practical Lattice Reduction through Iterated Compression Keegan Ryan, Nadia Heninger
2023/236 (PDF ) Certified Everlasting Secure Collusion-Resistant Functional Encryption, and More Taiga Hiroka, Fuyuki Kitagawa, Tomoyuki Morimae, Ryo Nishimaki, Tapas Pal, Takashi Yamakawa
2023/235 (PDF ) New Results on Machine Learning Based Distinguishers Anubhab Baksi, Jakub Breier, Vishnu Asutosh Dasu, Xiaolu Hou, Hyunji Kim, Hwajeong Seo
2023/234 (PDF ) Privately Puncturing PRFs from Lattices: Adaptive Security and Collusion Resistant Pseudorandomness Rupeng Yang
2023/233 (PDF ) Complete Characterization of Broadcast and Pseudo-Signatures from Correlations Varun Narayanan, Vinod M. Prabhakaran, Neha Sangwan, Shun Watanabe
2023/232 (PDF ) Crypto Dark Matter on the Torus: Oblivious PRFs from shallow PRFs and FHE Martin R. Albrecht, Alex Davidson, Amit Deo, Daniel Gardham
2023/231 (PDF ) One Digit Checksum for Data Integrity Verification of Cloud-executed Homomorphic Encryption Operations Mostefa Kara, Abdelkader Laouid, Omer Al dabbas, Mohammad Hammoudeh, Ahcène Bounceur
2023/230 (PDF ) Attacking the IETF/ISO Standard for Internal Re-keying CTR-ACPKM Orr Dunkelman, Shibam Ghosh, Eran Lambooij
2023/229 (PDF ) One-out-of-Many Unclonable Cryptography: Definitions, Constructions, and More Fuyuki Kitagawa, Ryo Nishimaki
2023/228 (PDF ) Authenticated Continuous Key Agreement: Active MitM Detection and Prevention Benjamin Dowling, Britta Hale
2023/227 (PDF ) A Novel Automatic Technique Based on MILP to Search for Impossible Differentials Yong Liu, Zejun Xiang, Siwei Chen, Shasha Zhang, Xiangyong Zeng
2023/226 (PDF ) Impossibility of Indifferentiable Iterated Blockciphers from 3 or Less Primitive Calls Chun Guo, Lei Wang, Dongdai Lin
2023/225 (PDF ) A Post-Quantum Round-Optimal Oblivious PRF from Isogenies Andrea Basso
2023/224 (PDF ) Improved Power Analysis Attacks on Falcon Shiduo Zhang, Xiuhan Lin, Yang Yu, Weijia Wang
2023/223 (PDF ) Classical and Quantum Security of Elliptic Curve VRF, via Relative Indifferentiability Chris Peikert, Jiayu Xu
2023/222 (PDF ) A Lightweight Identification Protocol Based on Lattices Samed Düzlü, Juliane Krämer, Thomas Pöppelmann, Patrick Struck
2023/221 (PDF ) Bicorn: An optimistically efficient distributed randomness beacon Kevin Choi, Arasu Arun, Nirvan Tyagi, Joseph Bonneau
2023/220 (PDF ) Password-Authenticated TLS via OPAQUE and Post-Handshake Authentication Julia Hesse, Stanislaw Jarecki, Hugo Krawczyk, Christopher Wood
2023/219 (PDF ) Sieving for large twin smooth integers using single solutions to Prouhet-Tarry-Escott Knud Ahrens
2023/218 (PDF ) On the Post-Quantum Security of Classical Authenticated Encryption Schemes Nathalie Lang, Stefan Lucks
2023/217 (PDF ) Indifferentiability of the Sponge Construction with a Restricted Number of Message Blocks Charlotte Lefevre
2023/216 (PDF ) Two-Round Stateless Deterministic Two-Party Schnorr Signatures From Pseudorandom Correlation Functions Yashvanth Kondi, Claudio Orlandi, Lawrence Roy
2023/215 (PDF ) Formally verifying Kyber Part I: Implementation Correctness José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Benjamin Grégoire, Vincent Laporte, Jean-Christophe Léchenet, Tiago Oliveira, Hugo Pacheco, Miguel Quaresma, Peter Schwabe, Antoine Séré, Pierre-Yves Strub
2023/214 (PDF ) DIPSAUCE: Efficient Private Stream Aggregation Without Trusted Parties Joakim Brorsson, Martin Gunnarsson
2023/213 (PDF ) Deniable Authentication when Signing Keys Leak Suvradip Chakraborty, Dennis Hofheinz, Ueli Maurer, Guilherme Rito
2023/212 (PDF ) Generating Secure Hardware using ChatGPT Resistant to CWEs Madhav Nair, Rajat Sadhukhan, Debdeep Mukhopadhyay
2023/211 (PDF ) Improved Low-depth SHA3 Quantum Circuit for Fault-tolerant Quantum Computers Gyeongju Song, Kyungbae Jang, Hwajeong Seo
2023/210 (PDF ) New Generic Constructions of Error-Correcting PIR and Efficient Instantiations Reo Eriguchi, Kaoru Kurosawa, Koji Nuida
2023/209 (PDF ) Hiding in Plain Sight: Non-profiling Deep Learning-based Side-channel Analysis with Plaintext/Ciphertext Lichao Wu, Guilherme Perin, Stjepan Picek
2023/208 (PDF ) zkTree: a zk recursion tree with ZKP membership proofs Sai Deng, Bo Du
2023/207 (PDF ) On Quantum Secure Compressing Pseudorandom Functions Ritam Bhaumik, Benoît Cogliati, Jordan Ethan, Ashwin Jha
2023/206 (PDF ) Orca: FSS-based Secure Training with GPUs Neha Jawalkar, Kanav Gupta, Arkaprava Basu, Nishanth Chandran, Divya Gupta, Rahul Sharma
2023/205 (PDF ) DEFending Integrated Circuit Layouts Jitendra Bhandari, Jayanth Gopinath, Mohammed Ashraf, Johann Knechtel, Ramesh Karri
2023/204 (PDF ) TreePIR: Sublinear-Time and Polylog-Bandwidth Private Information Retrieval from DDH Arthur Lazzaretti, Charalampos Papamanthou
2023/203 (PDF ) A Different Base Approach for Better Efficiency on Range Proofs Esra Günsay, Cansu Betin Onur, Murat Cenk
2023/202 (PDF ) SAT-aided Automatic Search of Boomerang Distinguishers for ARX Ciphers (Long Paper) Dachao Wang, Baocang Wang, Siwei Sun
2023/201 (PDF ) DenseQMC: an efficient bit-slice implementation of the Quine-McCluskey algorithm Aleksei Udovenko
2023/200 (PDF ) Classical and quantum 3 and 4-sieves to solve SVP with low memory Johanna Loyer, André Chailloux
2023/199 (PDF ) MixFlow: Assessing Mixnets Anonymity with Contrastive Architectures and Semantic Network Information Reyhane Attarian, Esfandiar Mohammadi, Tao Wang, Emad Heydari Beni
2023/198 (PDF ) Chopsticks: Fork-Free Two-Round Multi-Signatures from Non-Interactive Assumptions Jiaxin Pan, Benedikt Wagner
2023/197 (PDF ) Flexible Password-Based Encryption: Securing Cloud Storage and Provably Resisting Partitioning-Oracle Attacks Mihir Bellare, Laura Shea
2023/196 (PDF ) On Two Factors Affecting the Efficiency of MILP Models in Automated Cryptanalyses Shengyuan Xu, Xiutao Feng, Yongxing Wang
2023/195 (PDF ) A simpler alternative to Lucas–Lehmer–Riesel primality test Pavel Atnashev
2023/194 (PDF ) Hull Attacks on the Lattice Isomorphism Problem Léo Ducas, Shane Gibbons
2023/193 (PDF ) Traceable Policy-Based Signatures with Delegation Ismail Afia, Riham AlTawy
2023/192 (PDF ) Faithful Simulation of Randomized BFT Protocols on Block DAGs Hagit Attiya, Constantin Enea, Shafik Nassar
2023/191 (PDF ) Beyond the Blockchain Address: Zero-Knowledge Address Abstraction Sanghyeon Park, Jeong Hyuk Lee, Seunghwa Lee, Jung Hyun Chun, Hyeonmyeong Cho, MinGi Kim, Hyun Ki Cho, Soo-Mook Moon
2023/190 (PDF ) Practical Security Analysis of Zero-Knowledge Proof Circuits Hongbo Wen, Jon Stephens, Yanju Chen, Kostas Ferles, Shankara Pailoor, Kyle Charbonnet, Isil Dillig, Yu Feng
2023/189 (PDF ) tlock: Practical Timelock Encryption from Threshold BLS Nicolas Gailly, Kelsey Melissaris, Yolan Romailler
2023/188 (PDF ) Cryptanalysis of a key agreement scheme using determinants and rectangular matrices Daniel R. L. Brown
2023/187 (PDF ) Towards Modular Foundations for Protocol Security Lúcás Críostóir Meier
2023/186 (PDF ) Generic Models for Group Actions Julien Duman, Dominik Hartmann, Eike Kiltz, Sabrina Kunzweiler, Jonas Lehmann, Doreen Riepel
2023/185 (PDF ) The Last Yard: Foundational End-to-End Verification of High-Speed Cryptography Philipp G. Haselwarter, Benjamin Salling Hvass, Lasse Letager Hansen, Théo Winterhalter, Catalin Hritcu, Bas Spitters
2023/184 (PDF ) Quantum Linear Key-recovery Attacks Using the QFT André Schrottenloher
2023/183 (PDF ) Maravedí: A Secure and Practical Protocol to Trade Risk for Instantaneous Finality Mario Larangeira, Maxim Jourenko
2023/182 (PDF ) CAPYBARA and TSUBAKI: Verifiable Random Functions from Group Actions and Isogenies Yi-Fu Lai
2023/181 (PDF ) Fully Automated Differential-Linear Attacks against ARX Ciphers Emanuele Bellini, David Gerault, Juan Grados, Rusydi Makarim, Thomas Peyrin
2023/180 (PDF ) Asymmetric Trapdoor Pseudorandom Generators: Definitions, Constructions, and Applications to Homomorphic Signatures with Shorter Public Keys Jinpeng Hou, Yansong Gao, Mang Su, Willy Susilo, Jie Chen, Anmin Fu
2023/179 (PDF ) TS-Hash: a lightweight cryptographic hash family based on Galois LFSRs Itay Bookstein, Boaz Tsaban
2023/178 (PDF ) Rotational-XOR Differential Rectangle Cryptanalysis on Simon-like Ciphers Siwei Chen, Mingming Zhu, Zejun Xiang, Runqing Xu, Xiangyong Zeng, Shasha Zhang
2023/177 (PDF ) The geometric interpretation of the Tate pairing and its applications Damien Robert
2023/176 (PDF ) A New Algebraic Approach to the Regular Syndrome Decoding Problem and Implications for PCG Constructions Pierre Briaud, Morten Øygarden
2023/175 (PDF ) Linear codes of Schubert type and quadratic public keys of Multivariate Cryptography Vasyl Ustimenko
2023/174 (PDF ) Improved Heuristics for Low-latency Implementations of Linear Layers Qun Liu, Zheng Zhao, Meiqin Wang
2023/173 (PDF ) Degree-$D$ Reverse Multiplication-Friendly Embeddings: Constructions and Applications Daniel Escudero, Hongqing Liu, Chaoping Xing, Chen Yuan
2023/172 (PDF ) Impossibility of Efficient Information-Theoretic Fuzzy Extraction Luke Demarest, Benjamin Fuller, Alexander Russell
2023/171 (PDF ) On Differential Privacy and Adaptive Data Analysis with Bounded Space Itai Dinur, Uri Stemmer, David P. Woodruff, Samson Zhou
2023/170 (PDF ) EKE Meets Tight Security in the Universally Composable Framework Xiangyu Liu, Shengli Liu, Shuai Han, Dawu Gu
2023/169 (PDF ) Reputation-based state machine replication Muhong Huang, Runchao Han, Zhiqiang Du, Yanfang Fu, Liangxin Liu
2023/168 (PDF ) Time-Efficient Finite Field Microarchitecture Design for Curve448 and Ed448 on Cortex-M4 Mila Anastasova, Reza Azarderakhsh, Mehran Mozaffari Kermani, Lubjana Beshaj
2023/167 (PDF ) Modular Design of KEM-Based Authenticated Key Exchange Colin Boyd, Bor de Kock, Lise Millerjord
2023/166 (PDF ) Hermes: I/O-Efficient Forward-Secure Searchable Symmetric Encryption Brice Minaud, Michael Reichle
2023/165 (PDF ) Optimizing the depth of quantum implementations of linear layers Chengkai Zhu, Zhenyu Huang
2023/164 (PDF ) Input Transformation Based Efficient Zero-Knowledge Argument System for Arbitrary Circuits with Practical Succinctness Frank Y.C. Lu
2023/163 (PDF ) Hardware-Software Co-design for Side-Channel Protected Neural Network Inference Anuj Dubey, Rosario Cammarota, Avinash Varna, Raghavan Kumar, Aydin Aysu
2023/162 (PDF ) AutoFHE: Automated Adaption of CNNs for Efficient Evaluation over FHE Wei Ao, Vishnu Boddeti
2023/161 (PDF ) Quantum Advantage from One-Way Functions Tomoyuki Morimae, Takashi Yamakawa
2023/160 (PDF ) Practical Improvement to Gaudry-Schost Algorithm on Subgroups of $\mathbb{Z}^{*}_{p}$ Madhurima Mukhopadhyay
2023/159 (PDF ) Sequential Half-Aggregation of Lattice-Based Signatures Katharina Boudgoust, Akira Takahashi
2023/158 (PDF ) Enabling FrodoKEM on Embedded Devices Joppe W. Bos, Olivier Bronchain, Frank Custers, Joost Renes, Denise Verbakel, Christine van Vredendaal
2023/157 (PDF ) A Key-Recovery Attack against Mitaka in the t-Probing Model Thomas Prest
2023/156 (PDF ) Zero-Knowledge Elementary Databases with Function Queries Xinxuan Zhang, Yi Deng
2023/155 (PDF ) More Efficient Two-Round Multi-Signature Scheme with Provably Secure Parameters Kaoru Takemure, Yusuke Sakai, Bagus Santoso, Goichiro Hanaoka, Kazuo Ohta
2023/154 (PDF ) Practical Signature-Free Asynchronous Common Subset in Constant Time Sisi Duan, Xin Wang, Haibin Zhang
2023/153 (PDF ) Almost Tight Multi-User Security under Adaptive Corruptions & Leakages in the Standard Model Shuai Han, Shengli Liu, Dawu Gu
2023/152 (PDF ) Almost Tightly-Secure Re-Randomizable and Replayable CCA-secure Public Key Encryption Antonio Faonio, Dennis Hofheinz, Luigi Russo
2023/151 (PDF ) Analysis of the XSL Attack Coteanu Maria Gabriela, Țîflea Denisa-Ionela
2023/150 (PDF ) More Efficient Zero-Knowledge Protocols over $\mathbb{Z}_{2^k}$ via Galois Rings Fuchun Lin, Chaoping Xing, Yizhou Yao
2023/149 (PDF ) Demystifying Bootstrapping in Fully Homomorphic Encryption Ahmad Al Badawi, Yuriy Polyakov
2023/148 (PDF ) PassPro: A secure password protection from the adversaries Ripon Patgiri, Laiphrakpam Dolendro Singh
2023/147 (PDF ) Fiat-Shamir Bulletproofs are Non-Malleable (in the Random Oracle Model) Chaya Ganesh, Claudio Orlandi, Mahak Pancholi, Akira Takahashi, Daniel Tschudi
2023/146 (PDF ) Optimized Quantum Implementation of AES Da Lin, Zejun Xiang, Runqing Xu, Shasha Zhang, Xiangyong Zeng
2023/145 (PDF ) Combining MILP Modeling with Algebraic Bias Evaluation for Linear Mask Search: Improved Fast Correlation Attacks on SNOW Xinxin Gong, Yonglin Hao, Qingju Wang
2023/144 (PDF ) Aegis: Privacy-Preserving Market for Non-Fungible Tokens Hisham S. Galal, Amr M. Youssef
2023/143 (PDF ) A Practical Compiler for Attribute-Based Encryption: New Decentralized Constructions and More Marloes Venema
2023/142 (PDF ) On the Feasibility of Single-Trace Attacks on the Gaussian Sampler using a CDT Soundes Marzougui, Ievgan Kabin, Juliane Krämer, Thomas Aulbach, Jean-Pierre Seifert
2023/141 (PDF ) A Secure Bandwidth-Efficient Treatment for Dropout-Resistant Time-Series Data Aggregation Reyhaneh Rabaninejad, Alexandros Bakas, Eugene Frimpong, Antonis Michalas
2023/140 (PDF ) Improving Convergence and Practicality of Slide-type Reductions Jianwei Li, Michael Walter
2023/139 (PDF ) Improved Estimation of Key Enumeration with Applications to Solving LWE Alessandro Budroni, Erik Mårtensson
2023/138 (PDF ) Tracing a Linear Subspace: Application to Linearly-Homomorphic Group Signatures Chloé Hébant, David Pointcheval, Robert Schädlich
2023/137 (PDF ) PAPR: Publicly Auditable Privacy Revocation for Anonymous Credentials Joakim Brorsson, Bernardo David, Lorenzo Gentile, Elena Pagnin, Paul Stankovski Wagner
2023/136 (PDF ) Public-key Compression in M-SIDH Kaizhan Lin, Jianming Lin, Shiping Cai, Weize Wang, Chang-An Zhao
2023/135 (PDF ) Uncovering Vulnerabilities in Smartphone Cryptography: A Timing Analysis of the Bouncy Castle RSA Implementation Sarani Bhattacharya, Dilip Kumar Shanmugasundaram Veeraraghavan, Shivam Bhasin, Debdeep Mukhopadhyay
2023/134 (PDF ) Cryptanalysis of Reduced Round ChaCha- New Attack and Deeper Analysis Sabyasachi Dey, Hirendra Kumar Garai, Subhamoy Maitra
2023/133 (PDF ) Prism: Private Set Intersection and Union with Aggregation over Multi-Owner Outsourced Data Shantanu Sharma, Yin Li, Sharad Mehrotra, Nisha Panwar, Dhrubajyoti Ghosh, Peeyush Gupta
2023/132 (PDF ) Security analysis of DBTRU cryptosystem Alexandra Ciobanu, Marina Stefiuc
2023/131 (PDF ) Some Practical Applications of Fully Homomorphic Encryption Elisa Giurgea, Tudor Hutu, Emil Simion
2023/130 (PDF ) Verifiable Distributed Aggregation Functions Hannah Davis, Christopher Patton, Mike Rosulek, Phillipp Schoppmann
2023/129 (PDF ) A Lower Bound on the Share Size in Evolving Secret Sharing Noam Mazor
2023/128 (PDF ) Cloning Games: A General Framework for Unclonable Primitives Prabhanjan Ananth, Fatih Kaleoglu, Qipeng Liu
2023/127 (PDF ) Sender-binding Key Encapsulation Rebecca Schwerdt, Laurin Benz, Wasilij Beskorovajnov, Sarai Eilebrecht, Jörn Müller-Quade, Astrid Ottenhues
2023/126 (PDF ) Privacy-Preserving Payment System With Verifiable Local Differential Privacy Danielle Movsowitz Davidow, Yacov Manevich
2023/125 (PDF ) Ransomware data recovery techniques Irimia Alexandru-Vasile
2023/124 (PDF ) Security of Ethereum Layer 2s Ionuț Roșca, Alexandra-Ina Butnaru, Emil Simion
2023/123 (PDF ) A way of decrypting particular malware payloads found in MZPE files Tudorică Radu, Rares Radu, Emil Simion
2023/122 (PDF ) SoK: Privacy-Enhancing Technologies in Finance Carsten Baum, James Hsin-yu Chiang, Bernardo David, Tore Kasper Frederiksen
2023/121 (PDF ) Hashing to elliptic curves over highly $2$-adic fields $\mathbb{F}_{\!q}$ with $O(\log(q))$ operations in $\mathbb{F}_{\!q}$ Dmitrii Koshelev
2023/120 (PDF ) X-Cipher: Achieving Data Resiliency in Homomorphic Ciphertexts Adam Caulfield, Nabiha Raza, Peizhao Hu
2023/119 (PDF ) Worst-Case Subexponential Attacks on PRGs of Constant Degree or Constant Locality Akin Ünal
2023/118 (PDF ) A New Generic Fault Resistant Masking Scheme using Error-Correcting Codes Chloé Gravouil
2023/117 (PDF ) Full-Round Differential Attack on ULC and LICID Block Ciphers Designed for IoT Manjeet Kaur, Tarun Yadav, Manoj Kumar, Dhananjoy Dey
2023/116 (PDF ) CBDC-Cash: How to Fund and Defund CBDC Wallets Diego Castejon-Molina, Dimitrios Vasilopoulos, Pedro Moreno-Sanchez
2023/115 (PDF ) Multi-User CDH Problems and the Concrete Security of NAXOS and HMQV Eike Kiltz, Jiaxin Pan, Doreen Riepel, Magnus Ringerud
2023/114 (PDF ) Credible, Optimal Auctions via Blockchains Tarun Chitra, Matheus V. X. Ferreira, Kshitij Kulkarni
2023/113 (PDF ) Homomorphic Sortition – Single Secret Leader Election for PoS Blockchains Luciano Freitas, Andrei Tonkikh, Adda-Akram Bendoukha, Sara Tucci-Piergiovanni, Renaud Sirdey, Oana Stan, Petr Kuznetsov
2023/112 (PDF ) Faster Amortized FHEW bootstrapping using Ring Automorphisms Gabrielle De Micheli, Duhyeong Kim, Daniele Micciancio, Adam Suhl
2023/111 (PDF ) An Attack on the LILLE Stream Cipher Vahid Amin-Ghafari, Mohammad Ali Orumiehchiha, Saeed Rostami
2023/110 (PDF ) VORSHA: A Variable-sized, One-way and Randomized Secure Hash Algorithm Ripon Patgiri, Laiphrakpam Dolendro Singh, Dalton Meitei Thounaojam
2023/109 (PDF ) SoK: Modeling for Large S-boxes Oriented to Differential Probabilities and Linear Correlations (Long Paper) Ling Sun, Meiqin Wang
2023/108 (PDF ) Grotto: Screaming fast $(2 + 1)$-PC for $\mathbb{Z}_{2^{n}}$ via (2, 2)-DPFs Kyle Storrier, Adithya Vadapalli, Allan Lyons, Ryan Henry
2023/107 (PDF ) The Tip5 Hash Function for Recursive STARKs Alan Szepieniec, Alexander Lemmens, Jan Ferdinand Sauer, Bobbin Threadbare
2023/106 (PDF ) Deuring for the People: Supersingular Elliptic Curves with Prescribed Endomorphism Ring in General Characteristic Jonathan Komada Eriksen, Lorenz Panny, Jana Sotáková, Mattia Veroni
2023/105 (PDF ) Gate-Level Masking of Streamlined NTRU Prime Decapsulation in Hardware Georg Land, Adrian Marotzke, Jan Richter-Brockmann, Tim Güneysu
2023/104 (PDF ) Optimizations and Trade-offs for HElib Anamaria Costache, Lea Nürnberger, Rachel Player
2023/103 (PDF ) Fair Delivery of Decentralised Randomness Beacon Runchao Han, Jiangshan Yu
2023/102 (PDF ) Cache-timing attack against HQC Senyang Huang, Rui Qi Sim, Chitchanok Chuengsatiansup, Qian Guo, Thomas Johansson
2023/101 (PDF ) Practical Preimage Attack on 3-Round Keccak-256 Xiaoen Lin, Le He, Hongbo Yu
2023/100 (PDF ) Meteor: Improved Secure 3-Party Neural Network Inference with Reducing Online Communication Costs Ye Dong, Xiaojun Chen, Weizhan Jing, Kaiyun Li, Weiping Wang
2023/099 (PDF ) Scalable Multiparty Garbling Gabrielle Beck, Aarushi Goel, Aditya Hegde, Abhishek Jain, Zhengzhong Jin, Gabriel Kaptchuk
2023/098 (PDF ) Belief Propagation Meets Lattice Reduction: Security Estimates for Error-Tolerant Key Recovery from Decryption Errors Julius Hermelink, Erik Mårtensson, Simona Samardjiska, Peter Pessl, Gabi Dreo Rodosek
2023/097 (PDF ) Universally Composable NIZKs: Circuit-Succinct, Non-Malleable and CRS-Updatable Behzad Abdolmaleki, Noemi Glaeser, Sebastian Ramacher, Daniel Slamanig
2023/096 (PDF ) MPC With Delayed Parties Over Star-Like Networks Mariana Gama, Emad Heydari Beni, Emmanuela Orsini, Nigel P. Smart, Oliver Zajonc
2023/095 (PDF ) On TLS for the Internet of Things, in a Post Quantum world Michael Scott
2023/094 (PDF ) Portunus: Re-imagining access control in distributed systems Watson Ladd, Marloes Venema, Tanya Verma
2023/093 (PDF ) Automated Side-Channel Attacks using Black-Box Neural Architecture Search Pritha Gupta, Jan Peter Drees, Eyke Hüllermeier
2023/092 (PDF ) Estimation of Shor's Circuit for 2048-bit Integers based on Quantum Simulator Junpei Yamaguchi, Masafumi Yamazaki, Akihiro Tabuchi, Takumi Honda, Tetsuya Izu, Noboru Kunihiro
2023/091 (PDF ) Satisfiability Modulo Finite Fields Alex Ozdemir, Gereon Kremer, Cesare Tinelli, Clark Barrett
2023/090 (PDF ) Unlimited Results: Breaking Firmware Encryption of ESP32-V3 Karim M. Abdellatif, Olivier Hériveaux, Adrian Thillard
2023/089 (PDF ) Compilation and Backend-Independent Vectorization for Multi-Party Computation Benjamin Levy, Ben Sherman, Muhammad Ishaq, Lindsey Kennard, Ana Milanova, Vassilis Zikas
2023/088 (PDF ) Individual Cryptography Stefan Dziembowski, Sebastian Faust, Tomasz Lizurej
2023/087 (PDF ) Verification of Correctness and Security Properties for CRYSTALS-KYBER Katharina Kreuzer
2023/086 (PDF ) Flyover: A Repayment Protocol for Fast Bitcoin Transfers over Federated Pegs Javier Álvarez Cid-Fuentes, Diego Angel Masini, Sergio Demian Lerner
2023/085 (PDF ) The Security of ChaCha20-Poly1305 in the Multi-user Setting Jean Paul Degabriele, Jérôme Govinden, Felix Günther, Kenneth G. Paterson
2023/084 (PDF ) Single-tiered hybrid PoW consensus protocol to encourage decentralization in bitcoin GyuChol.Kim
2023/083 (PDF ) MacORAMa: Optimal Oblivious RAM with Integrity Surya Mathialagan, Neekon Vafa
2023/082 (PDF ) Specialized Proof of Confidential Knowledge (SPoCK) Tarak Ben Youssef, Riad S. Wahby
2023/081 (PDF ) Parakeet: Practical Key Transparency for End-to-End Encrypted Messaging Harjasleen Malvai, Lefteris Kokoris-Kogias, Alberto Sonnino, Esha Ghosh, Ercan Oztürk, Kevin Lewi, Sean Lawlor
2023/080 (PDF ) PLASMA: Private, Lightweight Aggregated Statistics against Malicious Adversaries with Full Security Dimitris Mouris, Pratik Sarkar, Nektarios Georgios Tsoutsos
2023/079 (PDF ) The challenges of proving solvency while preserving privacy. Tabacaru Robert, Anghel Florin, Asandoaiei David, Simion Emil
2023/078 (PDF ) An Efficient Multi-Signature Scheme for Blockchain Mostefa Kara, Abdelkader Laouid, Mohammad Hammoudeh
2023/077 (PDF ) Lattice-Based Blind Signatures: Short, Efficient, and Round-Optimal Ward Beullens, Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler
2023/076 (PDF ) Bake It Till You Make It: Heat-induced Leakage from Masked Neural Networks Dev M. Mehta, Mohammad Hashemi, David S. Koblah, Domenic Forte, Fatemeh Ganji
2023/075 (PDF ) Silicon Echoes: Non-Invasive Trojan and Tamper Detection using Frequency-Selective Impedance Analysis Tahoura Mosavirik, Saleh Khalaj Monfared, Maryam Saadat Safa, Shahin Tajik
2023/074 (PDF ) Random Sources in Private Computation Geoffroy Couteau, Adi Rosén
2023/073 (PDF ) FssNN: Communication-Efficient Secure Neural Network Training via Function Secret Sharing Peng Yang, Zoe L. Jiang, Shiqi Gao, Jiehang Zhuang, Hongxiao Wang, Junbin Fang, Siuming Yiu, Yulin Wu
2023/072 (PDF ) Non-Interactive Secure Computation of Inner-Product from LPN and LWE Geoffroy Couteau, Maryam Zarezadeh
2023/071 (PDF ) A security analysis comparison between Signal, WhatsApp and Telegram Corina-Elena Bogos, Răzvan Mocanu, Emil Simion
2023/070 (PDF ) A new side-channel attack on RSA prime numbers generation Isac Iulian-George, Emil Simion
2023/069 (PDF ) On the (Im)plausibility of Public-Key Quantum Money from Collision-Resistant Hash Functions Prabhanjan Ananth, Zihan Hu, Henry Yuen
2023/068 (PDF ) Obfuscating Decision Trees Shalini Banerjee, Steven D. Galbraith, Giovanni Russello
2023/067 (PDF ) Blind signatures from Zero-knowledge arguments Paulo L. Barreto, Gustavo H. M. Zanon
2023/066 (PDF ) Plonkup scheme with multiple queries Alexandr Bulkin, Tim Dokchitser
2023/065 (PDF ) A Practical TFHE-Based Multi-Key Homomorphic Encryption with Linear Complexity and Low Noise Growth Jakub Klemsa, Melek Önen, Yavuz Akın
2023/064 (PDF ) Computation of Hilbert class polynomials and modular polynomials from supersingular elliptic curves Antonin Leroux
2023/063 (PDF ) Threshold Signatures in the Multiverse Leemon Baird, Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, Yinuo Zhang
2023/062 (PDF ) Post-Quantum Secure Deterministic Wallet: Stateless, Hot/Cold Setting, and More Secure Mingxing Hu
2023/061 (PDF ) Key-and-Signature Compact Multi-Signatures: A Compiler with Realizations Shaoquan Jiang, Dima Alhadidi, Hamid Fazli Khojir
2023/060 (PDF ) Silph: A Framework for Scalable and Accurate Generation of Hybrid MPC Protocols Edward Chen, Jinhao Zhu, Alex Ozdemir, Riad S. Wahby, Fraser Brown, Wenting Zheng
2023/059 (PDF ) Oil and Vinegar: Modern Parameters and Implementations Ward Beullens, Ming-Shing Chen, Shih-Hao Hung, Matthias J. Kannwischer, Bo-Yuan Peng, Cheng-Jhih Shih, Bo-Yin Yang
2023/058 (PDF ) SCALLOP: scaling the CSI-FiSh Luca De Feo, Tako Boris Fouotsa, Péter Kutas, Antonin Leroux, Simon-Philipp Merz, Lorenz Panny, Benjamin Wesolowski
2023/057 (PDF ) DY Fuzzing: Formal Dolev-Yao Models Meet Protocol Fuzz Testing Max Ammann, Lucca Hirschi, Steve Kremer
2023/056 (PDF ) Quantum Annealing for Subset Product and Noisy Subset Product Trey Li
2023/055 (PDF ) An analysis of a scheme proposed for electronic voting systems Nicu Neculache, Vlad-Andrei Petcu, Emil Simion
2023/054 (PDF ) On the Incoercibility of Digital Signatures Ashley Fraser, Lydia Garms, Elizabeth A. Quaglia
2023/053 (PDF ) P3V: Privacy-Preserving Path Validation System for Multi-Authority Sliced Networks Weizhao Jin, Erik Kline, T. K. Satish Kumar, Lincoln Thurlow, Srivatsan Ravi
2023/052 (PDF ) Putting the Online Phase on a Diet: Covert Security from Short MACs Sebastian Faust, Carmit Hazay, David Kretzler, Benjamin Schlosser
2023/051 (PDF ) A proof of the Scholz conjecture on addition chains Theophilus Agama
2023/050 (PDF ) A Practical Template Attack on CRYSTALS-Dilithium Alexandre Berzati, Andersson Calle Viera, Maya Chartouni, Steven Madec, Damien Vergnaud, David Vigilant
2023/049 (PDF ) Implementing and Benchmarking Word-Wise Homomorphic Encryption Schemes on GPU Hao Yang, Shiyu Shen, Wangchen Dai, Lu Zhou, Zhe Liu, Yunlei Zhao
2023/048 (PDF ) On-Line/Off-Line DCR-based Homomorphic Encryption and Applications Marc Joye
2023/047 (PDF ) Side-Channel Resistant Implementation Using Arbiter PUF Raja Adhithan RadhaKrishnan
2023/046 (PDF ) Cognitive Cryptography using behavioral features from linguistic-biometric data Jose Contreras
2023/045 (PDF ) A note on machine learning applied in ransomware detection Manuela Horduna, Simona-Maria Lăzărescu, Emil Simion
2023/044 (PDF ) Complete Knowledge: Preventing Encumbrance of Cryptographic Secrets Mahimna Kelkar, Kushal Babel, Philip Daian, James Austgen, Vitalik Buterin, Ari Juels
2023/043 (PDF ) RDS: FPGA Routing Delay Sensors for Effective Remote Power Analysis Attacks David Spielmann, Ognjen Glamocanin, Mirjana Stojilovic
2023/042 (PDF ) On Protecting SPHINCS+ Against Fault Attacks Aymeric Genêt
2023/041 (PDF ) Quantum-Safe Protocols and Application in Data Security of Medical Records Adrian-Daniel Stefan, Ionut-Petrisor Anghel, Emil Simion
2023/040 (PDF ) A Closer Look at the Chaotic Ring Oscillators based TRNG Design Shuqin Su, Bohan Yang, Vladimir Rožić, Mingyuan Yang, Min Zhu, Shaojun Wei, Leibo Liu
2023/039 (PDF ) Server-Supported Decryption for Mobile Devices Johanna Maria Kirss, Peeter Laud, Nikita Snetkov, Jelizaveta Vakarjuk
2023/038 (PDF ) On the Amortized Communication Complexity of Byzantine Broadcast Atsuki Momose, Ling Ren, Elaine Shi, Jun Wan, Zhuolun Xiang
2023/037 (PDF ) Efficient Isogeny Proofs Using Generic Techniques Kelong Cong, Yi-Fu Lai, Shai Levin
2023/036 (PDF ) Differential analysis of the ternary hash function Troika Christina Boura, Margot Funk, Yann Rotella
2023/035 (PDF ) Glitch-free is not Enough - Revisiting Glitch-Extended Probing Model Daniel Lammers, Nicolai Müller, Amir Moradi
2023/034 (PDF ) PROLEAD_SW - Probing-Based Software Leakage Detection for ARM Binaries Jannik Zeitschner, Nicolai Müller, Amir Moradi
2023/033 (PDF ) Fast amortized KZG proofs Dankrad Feist, Dmitry Khovratovich
2023/032 (PDF ) A Gentle Tutorial for Lattice-Based Cryptanalysis Joseph Surin, Shaanan Cohney
2023/031 (PDF ) Sassafras and Semi-Anonymous Single Leader Election Jeffrey Burdges, Handan Kılınç Alper, Alistair Stewart, Sergey Vasilyev
2023/030 (PDF ) Earn While You Reveal: Private Set Intersection that Rewards Participants Aydin Abadi, Steven Murdoch
2023/029 (PDF ) Public Verification for Private Hash Matching Sarah Scheffler, Anunay Kulshrestha, Jonathan Mayer
2023/028 (PDF ) Information-Theoretic Distributed Point Functions Elette Boyle, Niv Gilboa, Yuval Ishai, Victor I. Kolobov
2023/027 (PDF ) Verification of the (1–δ)-Correctness Proof of CRYSTALS-KYBER with Number Theoretic Transform Katharina Kreuzer
2023/026 (PDF ) Fermat Factorization in the Wild Hanno Böck
2023/025 (PDF ) Quantum Attacks on Beyond-Birthday-Bound MACs Hong-Wei Sun, Bin-Bin Cai, Su-Juan Qin, Qiao-Yan Wen, Fei Gao
2023/024 (PDF ) It Runs and it Hides: A Function-Hiding Construction for Private-Key Multi-Input Functional Encryption Alexandros Bakas, Antonis Michalas
2023/023 (PDF ) New Algorithm for Exhausting Optimal Permutations for Generalized Feistel Networks Stéphanie Delaune, Patrick Derbez, Arthur Gontier, Charles Prud'homme
2023/022 (PDF ) Recommendation for a holistic secure embedded ISA extension Florian Stolz, Marc Fyrbiak, Pascal Sasdrich, Tim Güneysu
2023/021 (PDF ) DLPFA: Deep Learning based Persistent Fault Analysis against Block Ciphers Yukun Cheng, Changhai Ou, Fan Zhang, Shihui Zheng
2023/020 (PDF ) The Scholz conjecture on addition chain is true for infinitely many integers with ℓ(2n) = ℓ(n) Amadou TALL
2023/019 (PDF ) Autoencoder-enabled Model Portability for Reducing Hyperparameter Tuning Efforts in Side-channel Analysis Marina Krček, Guilherme Perin
2023/018 (PDF ) New record in the number of qubits for a quantum implementation of AES Zhenqiang Li, Fei Gao, Sujuan Qin, Qiaoyan Wen
2023/017 (PDF ) Cryptographic Group and Semigroup Actions Oliver W. Gnilke, Jens Zumbrägel
2023/016 (PDF ) Simple Threshold (Fully Homomorphic) Encryption From LWE With Polynomial Modulus Katharina Boudgoust, Peter Scholl
2023/015 (PDF ) Unconditionally Secure NIZK in the Fine-Grained Setting Yuyu Wang, Jiaxin Pan
2023/014 (PDF ) Amortized Bootstrapping Revisited: Simpler, Asymptotically-faster, Implemented Antonio Guimarães, Hilder V. L. Pereira, Barry van Leeuwen
2023/013 (PDF ) M-SIDH and MD-SIDH: countering SIDH attacks by masking information Tako Boris Fouotsa, Tomoki Moriya, Christophe Petit
2023/012 (PDF ) Delegated Private Matching for Compute Dimitris Mouris, Daniel Masny, Ni Trieu, Shubho Sengupta, Prasad Buddhavarapu, Benjamin Case
2023/011 (PDF ) Using the RSA or RSA-B accumulator in anonymous credential schemes Sietse Ringers
2023/010 (PDF ) Verifying Classic McEliece: examining the role of formal methods in post-quantum cryptography standardisation Martin Brain, Carlos Cid, Rachel Player, Wrenna Robson
2023/009 (PDF ) Efficient Privacy-Preserving Viral Strain Classification via k-mer Signatures and FHE Adi Akavia, Ben Galili, Hayim Shaul, Mor Weiss, Zohar Yakhini
2023/008 (PDF ) AutoPOI: Automated Points Of Interest Selection for Side-channel Analysis Mick G.D. Remmerswaal, Lichao Wu, Sébastien Tiran, Nele Mentens
2023/007 (PDF ) Post-Quantum Security of Key Encapsulation Mechanism against CCA Attacks with a Single Decapsulation Query Haodong Jiang, Zhi Ma, Zhenfeng Zhang
2023/006 (PDF ) Exploring multi-task learning in the context of two masked AES implementations Thomas Marquet, Elisabeth Oswald
2023/005 (PDF ) Secure Single-Server Fuzzy Deduplication without Interactive Proof-of-Ownership in Cloud Shuai Cheng, Shengke Zeng, Haoyu Zeng, Yawen Feng, Jixiang Xiao
2023/004 (PDF ) Quantum Artificial Intelligence on Cryptanalysis Hyunji Kim, Sejin Lim, Anubhab Baksi, Dukyoung Kim, Seyoung Yoon, Kyungbae Jang, Hwajeong Seo
2023/003 (PDF ) How to Use Sigstore without Sigstore Yan-Cheng Chang
2023/002 (PDF ) Ethical identity, ring VRFs, and zero-knowledge continuations Jeffrey Burdges, Handan Kılınç Alper, Alistair Stewart, Sergey Vasilyev
2023/001 (PDF ) Time is money, friend! Timing Side-channel Attack against Garbled Circuit Constructions Mohammad Hashemi, Domenic Forte, Fatemeh Ganji
2022/1781 (PDF ) COA-Secure Obfuscation and Applications Ran Canetti, Suvradip Chakraborty, Dakshita Khurana, Nishanth Kumar, Oxana Poburinnaya, Manoj Prabhakaran
2022/1780 (PDF ) More Efficient Key Ranking for Optimal Collision Side-Channel Attacks Cezary Glowacz
2022/1779 (PDF ) Batching, Aggregation, and Zero-Knowledge Proofs in Bilinear Accumulators Shravan Srinivasan, Ioanna Karantaidou, Foteini Baldimtsi, Charalampos Papamanthou
2022/1778 (PDF ) Asynchronous Delegated Private Set Intersection with Hiding of Intersection Size Wyatt Howe, Andrei Lapets, Frederick Jansen, Tanner Braun, Ben Getchell
2022/1777 (PDF ) Weightwise perfectly balanced functions and nonlinearity Agnese Gini, Pierrick Méaux
2022/1776 (PDF ) Offset-Based BBB-Secure Tweakable Block-ciphers with Updatable Caches Arghya Bhattacharjee, Ritam Bhaumik, Mridul Nandi
2022/1775 (PDF ) Candidate Trapdoor Claw-Free Functions from Group Actions with Applications to Quantum Protocols Navid Alamati, Giulio Malavolta, Ahmadreza Rahimi
2022/1774 (PDF ) PECO: methods to enhance the privacy of DECO protocol Manuel B. Santos
2022/1773 (PDF ) SoK: Decentralized Finance (DeFi) Attacks Liyi Zhou, Xihan Xiong, Jens Ernstberger, Stefanos Chaliasos, Zhipeng Wang, Ye Wang, Kaihua Qin, Roger Wattenhofer, Dawn Song, Arthur Gervais
2022/1772 (PDF ) You Can Sign but Not Decrypt: Hierarchical Integrated Encryption and Signature Min Zhang, Binbin Tu, Yu Chen
2022/1771 (PDF ) Security analysis for BIKE, Classic McEliece and HQC against the quantum ISD algorithms Asuka Wakasugi, Mitsuru Tada
2022/1770 (PDF ) Cryptographic Primitives with Hinting Property Navid Alamati, Sikhar Patranabis
2022/1769 (PDF ) PoRt: Non-Interactive Continuous Availability Proof of Replicated Storage Reyhaneh Rabaninejad, Bin Liu, Antonis Michalas
2022/1768 (PDF ) Continuous Group Key Agreement with Flexible Authorization and Its Applications Kaisei Kajita, Keita Emura, Kazuto Ogawa, Ryo Nojima, Go Ohtake
2022/1767 (PDF ) Do Not Trust in Numbers: Practical Distributed Cryptography With General Trust Orestis Alpos, Christian Cachin
2022/1766 (PDF ) Systematically Quantifying Cryptanalytic Non-Linearities in Strong PUFs Durba Chatterjee, Kuheli Pratihar, Aritra Hazra, Ulrich Rührmair, Debdeep Mukhopadhyay
2022/1765 (PDF ) Effective Network Parameter Reduction Schemes for Neural Distinguisher Jiashuo Liu, Jiongjiong Ren, Shaozhen Chen
2022/1764 (PDF ) Wi-Fi Security: Do We Still Have to Look Back? Karim Lounis
2022/1763 (PDF ) cq: Cached quotients for fast lookups Liam Eagen, Dario Fiore, Ariel Gabizon
2022/1762 (PDF ) On the impossibility of surviving (iterated) deletion of weakly dominated strategies in rational MPC Johannes Blömer, Jan Bobolz, Henrik Bröcher
2022/1761 (PDF ) A Family of Block Ciphers Based on Multiple Quasigroups Umesh Kumar, V. Ch. Venkaiah
2022/1760 (PDF ) Fully Succinct Batch Arguments for NP from Indistinguishability Obfuscation Rachit Garg, Kristin Sheridan, Brent Waters, David J. Wu
2022/1759 (PDF ) Bingo: Adaptively Secure Packed Asynchronous Verifiable Secret Sharing and Asynchronous Distributed Key Generation Ittai Abraham, Philipp Jovanovic, Mary Maller, Sarah Meiklejohn, Gilad Stern
2022/1758 (PDF ) SuperNova: Proving universal machine executions without universal circuits Abhiram Kothapalli, Srinath Setty
2022/1757 (PDF ) An Injectivity Analysis of CRYSTALS-Kyber and Implications on Quantum Security Xiaohui Ding, Muhammed F. Esgin, Amin Sakzad, Ron Steinfeld
2022/1756 (PDF ) CRS-Updatable Asymmetric Quasi-Adaptive NIZK Arguments Behzad Abdolmaleki, Daniel Slamanig
2022/1755 (PDF ) Towards Secure Evaluation of Online Functionalities (Corrected and Extended Version) Andreas Klinger, Ulrike Meyer
2022/1754 (PDF ) An SVP attack on Vortex zhenfei zhang
2022/1753 (PDF ) DSKE: Digital Signature with Key Extraction Orestis Alpos, Zhipeng Wang, Alireza Kavousi, Sze Yiu Chau, Duc Le, Christian Cachin
2022/1752 (PDF ) IsoLock: Thwarting Link-Prediction Attacks on Routing Obfuscation by Graph Isomorphism Shaza Elsharief, Lilas Alrahis, Johann Knechtel, Ozgur Sinanoglu
2022/1751 (PDF ) On The Pseudorandomness of the Decoding Problem via the Oracle Comparison Problem Maxime Bombar, Alain Couvreur, Thomas Debris-Alazard
2022/1750 (PDF ) Faster Dual Lattice Attacks by Using Coding Theory Kevin Carrier, Yixin Shen, Jean-Pierre Tillich
2022/1749 (PDF ) Computational Hardness of the Permuted Kernel and Subcode Equivalence Problems Paolo Santini, Marco Baldi, Franco Chiaraluce
2022/1748 (PDF ) RMC-PVC: A Multi-Client Reusable Verifiable Computation Protocol (Long version) Pascal Lafourcade, Gael Marcadet, Léo Robert
2022/1747 (PDF ) Duoram: A Bandwidth-Efficient Distributed ORAM for 2- and 3-Party Computation Adithya Vadapalli, Ryan Henry, Ian Goldberg
2022/1746 (PDF ) Clipaha: A Scheme to Perform Password Stretching on the Client Francisco Blas Izquierdo Riera, Magnus Almgren, Pablo Picazo-Sanchez, Christian Rohner
2022/1745 (PDF ) Leakage Resilient l-more Extractable Hash and Applications to Non-Malleable Cryptography Aggelos Kiayias, Feng-Hao Liu, Yiannis Tselekounis
2022/1744 (PDF ) Worst and Average Case Hardness of Decoding via Smoothing Bounds Thomas Debris-Alazard, Nicolas Resch
2022/1743 (PDF ) Ring Signatures with User-Controlled Linkability Dario Fiore, Lydia Garms, Dimitris Kolonelos, Claudio Soriente, Ida Tucker
2022/1742 (PDF ) A Simple Noncommutative UOV Scheme Lih-Chung Wang, Po-En Tseng, Yen-Liang Kuan, Chun-Yen Chou
2022/1741 (PDF ) Demystifying the comments made on “A Practical Full Key Recovery Attack on TFHE and FHEW by Inducing Decryption Errors” Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay
2022/1740 (PDF ) A Holistic Approach Towards Side-Channel Secure Fixed-Weight Polynomial Sampling Markus Krausz, Georg Land, Jan Richter-Brockmann, Tim Güneysu
2022/1739 (PDF ) On blindness of several ElGamal-type blind signatures Alexandra Babueva, Liliya Akhmetzyanova, Evgeny Alekseev, Oleg Taraskin
2022/1738 (PDF ) Removing the Field Size Loss from Duc et al.'s Conjectured Bound for Masked Encodings Julien Béguinot, Wei Cheng, Sylvain Guilley, Yi Liu, Loïc Masure, Olivier Rioul, François-Xavier Standaert
2022/1737 (PDF ) Regularizers to the Rescue: Fighting Overfitting in Deep Learning-based Side-channel Analysis Azade Rezaeezade, Lejla Batina
2022/1736 (PDF ) An algorithm for efficient detection of $(N,N)$-splittings and its application to the isogeny problem in dimension 2 Maria Corte-Real Santos, Craig Costello, Sam Frengley
2022/1735 (PDF ) BlindHub: Bitcoin-Compatible Privacy-Preserving Payment Channel Hubs Supporting Variable Amounts Xianrui Qin, Shimin Pan, Arash Mirzaei, Zhimei Sui, Oğuzhan Ersoy, Amin Sakzad, Muhammed F. Esgin, Joseph K. Liu, Jiangshan Yu, Tsz Hon Yuen
2022/1734 (PDF ) Mind Your Path: On (Key) Dependencies in Differential Characteristics Thomas Peyrin, Quan Quan Tan
2022/1733 (PDF ) New and Improved Constructions for Partially Equivocable Public Key Encryption Benoît Libert, Alain Passelègue, Mahshid Riahinia
2022/1732 (PDF ) TreeSync: Authenticated Group Management for Messaging Layer Security Théophile Wallez, Jonathan Protzenko, Benjamin Beurdouche, Karthikeyan Bhargavan
2022/1731 (PDF ) Linear Cryptanalysis of Reduced-Round Simeck Using Super Rounds Reham Almukhlifi, Poorvi Vora
2022/1730 (PDF ) Merkle Tree Ladder Mode: Reducing the Size Impact of NIST PQC Signature Algorithms in Practice Andrew Fregly, Joseph Harvey, Burton S. Kaliski Jr., Swapneel Sheth
2022/1729 (PDF ) Acsesor: A New Framework for Auditable Custodial Secret Storage and Recovery Melissa Chase, Hannah Davis, Esha Ghosh, Kim Laine
2022/1728 (PDF ) Efficient Zero Knowledge Arguments for Bilinear Matrix Relations over Finite Fields and Knowledge-Soundness Enhancement via Operations over Extended Field Yuan Tian
2022/1727 (PDF ) Find Thy Neighbourhood: Privacy-Preserving Local Clustering Pranav Shriram A, Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal
2022/1726 (PDF ) Optimization for SPHINCS+ using Intel Secure Hash Algorithm Extensions Thomas Hanson, Qian Wang, Santosh Ghosh, Fernando Virdia, Anne Reinders, Manoj R. Sastry
2022/1725 (PDF ) A note on SPHINCS+ parameter sets Stefan Kölbl
2022/1724 (PDF ) Formal Analysis of SPDM: Security Protocol and Data Model version 1.2 Cas Cremers, Alexander Dax, Aurora Naska
2022/1723 (PDF ) Asymptotically Optimal Message Dissemination with Applications to Blockchains Chen-Da Liu-Zhang, Christian Matt, Søren Eller Thomsen
2022/1722 (PDF ) On Side-Channel and CVO Attacks against TFHE and FHEW Michael Walter
2022/1721 (PDF ) Glimpse: On-demand Light Client with Constant-size Storage for DeFi Giulia Scaffino, Lukas Aumayr, Zeta Avarikioti, Matteo Maffei
2022/1720 (PDF ) Red Team vs. Blue Team: A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations Endres Puschner, Thorben Moos, Steffen Becker, Christian Kison, Amir Moradi, Christof Paar
2022/1719 (PDF ) Two-Round Concurrent 2PC from Sub-Exponential LWE Behzad Abdolmaleki, Saikrishna Badrinarayanan, Rex Fernando, Giulio Malavolta, Ahmadreza Rahimi, Amit Sahai
2022/1718 (PDF ) Identity-based Matchmaking Encryption with Stronger Security and Instantiation on Lattices Yuejun Wang, Baocang Wang, Qiqi Lai, Yu Zhan
2022/1717 (PDF ) Scaling Blockchain-Based Tokens with Joint Cryptographic Accumulators Trevor Miller
2022/1716 (PDF ) Area-time Efficient Implementation of NIST Lightweight Hash Functions Targeting IoT Applications Safiullah Khan, Wai-Kong Lee, Angshuman Karmakar, Jose Maria Bermudo Mera, Abdul Majeed, Seong Oun Hwang
2022/1715 (PDF ) An Algebraic Attack Against McEliece-like Cryptosystems Based on BCH Codes Freja Elbro, Christian Majenz
2022/1714 (PDF ) Meet-in-the-Middle Preimage Attacks on Sponge-based Hashing Lingyue Qin, Jialiang Hua, Xiaoyang Dong, Hailun Yan, Xiaoyun Wang
2022/1713 (PDF ) Breaking a Fifth-Order Masked Implementation of CRYSTALS-Kyber by Copy-Paste Elena Dubrova, Kalle Ngo, Joel Gärtner
2022/1712 (PDF ) KEMTLS vs. Post-Quantum TLS: Performance On Embedded Systems Ruben Gonzalez, Thom Wiggers
2022/1711 (PDF ) Nonce- and Redundancy-encrypting Modes with Farfalle Seth Hoffert
2022/1710 (PDF ) Formal Analysis of Session-Handling in Secure Messaging: Lifting Security from Sessions to Conversations Cas Cremers, Charlie Jacomme, Aurora Naska
2022/1709 (PDF ) Dory: Asynchronous BFT with Reduced Communication and Improved Efficiency You Zhou, Zongyang Zhang, Haibin Zhang, Sisi Duan, Bin Hu, Licheng Wang, Jianwei Liu
2022/1708 (PDF ) Expert Mental Models of SSI Systems and Implications for End-User Understanding Alexandra Mai
2022/1707 (PDF ) Private Access Control for Function Secret Sharing Sacha Servan-Schreiber, Simon Beyzerov, Eli Yablon, Hyojae Park
2022/1706 (PDF ) Optimized Implementation of Encapsulation and Decapsulation of Classic McEliece on ARMv8 Minjoo Sim, Siwoo Eum, Hyeokdong Kwon, Hyunjun Kim, Hwajeong Seo
2022/1705 (PDF ) Careful with MAc-then-SIGn: A Computational Analysis of the EDHOC Lightweight Authenticated Key Exchange Protocol Felix Günther, Marc Ilunga Tshibumbu Mukendi
2022/1704 (PDF ) Some applications of higher dimensional isogenies to elliptic curves (overview of results) Damien Robert
2022/1703 (PDF ) Doubly Efficient Private Information Retrieval and Fully Homomorphic RAM Computation from Ring LWE Wei-Kai Lin, Ethan Mook, Daniel Wichs
2022/1702 (PDF ) SCB Mode: Semantically Secure Length-Preserving Encryption Fabio Banfi
2022/1701 (PDF ) On Zero-Knowledge Proofs over the Quantum Internet Mark Carney
2022/1700 (PDF ) Comparative Study of HDL algorithms for Intrusion Detection System in Internet of Vehicles Manoj Srinivas Botla, Jai Bala Srujan Melam, Raja Stuthi Paul Pedapati, Srijanee Mookherji, Vanga Odelu, Rajendra Prasath
2022/1699 (PDF ) SoK: Use of Cryptography in Malware Obfuscation Hassan Asghar, Benjamin Zi Hao Zhao, Muhammad Ikram, Giang Nguyen, Dali Kaafar, Sean Lamont, Daniel Coscia
2022/1698 (PDF ) Digital Signature from Syndrome Decoding Problem Abdelhaliem Babiker
2022/1697 (PDF ) RISC-V Instruction Set Extensions for Lightweight Symmetric Cryptography Hao Cheng, Johann Großschädl, Ben Marshall, Dan Page, Thinh Pham
2022/1696 (PDF ) Post-Quantum Anonymity of Kyber Varun Maram, Keita Xagawa
2022/1695 (PDF ) ELSA: Secure Aggregation for Federated Learning with Malicious Actors Mayank Rathee, Conghao Shen, Sameer Wagh, Raluca Ada Popa
2022/1694 (PDF ) Security Analysis of a Color Image Encryption Scheme Based on Dynamic Substitution and Diffusion Operations George Teseleanu
2022/1693 (PDF ) More Efficient Adaptively Secure Lattice-based IBE with Equality Test in the Standard Model Kyoichi Asano, Keita Emura, Atsushi Takayasu
2022/1692 (PDF ) Secret Key Recovery Attacks on Masked and Shuffled Implementations of CRYSTALS-Kyber and Saber Linus Backlund, Kalle Ngo, Joel Gärtner, Elena Dubrova
2022/1691 (PDF ) TokenWeaver: Privacy Preserving and Post-Compromise Secure Attestation Cas Cremers, Charlie Jacomme, Eyal Ronen
2022/1690 (PDF ) Private Re-Randomization for Module LWE and Applications to Quasi-Optimal ZK-SNARKs Ron Steinfeld, Amin Sakzad, Muhammed F. Esgin, Veronika Kuchta
2022/1689 (PDF ) Efficient Zero-Knowledge Arguments for Some Matrix Relations over Ring and Non-malleable Enhancement Yuan Tian
2022/1688 (PDF ) Funshade: Functional Secret Sharing for Two-Party Secure Thresholded Distance Evaluation Alberto Ibarrondo, Hervé Chabanne, Melek Önen
2022/1687 (PDF ) Stronger Security and Generic Constructions for Adaptor Signatures Wei Dai, Tatsuaki Okamoto, Go Yamamoto
2022/1686 (PDF ) Practical Quantum-Safe Voting from Lattices, Extended Ian Black, Emma McFall, Juliet Whidden, Bryant Xie, Ryann Cartor
2022/1685 (PDF ) CoRA: Collaborative Risk-Aware Authentication Mastooreh Salajegheh, Shashank Agrawal, Maliheh Shirvanian, Mihai Christodorescu, Payman Mohassel
2022/1684 (PDF ) Division in the Plactic Monoid Chris Monico
2022/1683 (PDF ) Powers of Tau in Asynchrony Sourav Das, Zhuolun Xiang, Ling Ren
2022/1682 (PDF ) Interactive Authentication Deepak Maram, Mahimna Kelkar, Ittay Eyal
2022/1681 (PDF ) Backdooring Post-Quantum Cryptography: Kleptographic Attacks on Lattice-based KEMs Prasanna Ravi, Shivam Bhasin, Anupam Chattopadhyay, Aikata, Sujoy Sinha Roy
2022/1680 (PDF ) Authenticated Encryption with Key Identification Julia Len, Paul Grubbs, Thomas Ristenpart
2022/1679 (PDF ) Integer Polynomial Recovery from Outputs and its Application to Cryptanalysis of a Protocol for Secure Sorting Srinivas Vivek, Shyam Murthy, Deepak Kumaraswamy
2022/1678 (PDF ) Practical Asynchronous Distributed Key Generation: Improved Efficiency, Weaker Assumption, and Standard Model Haibin Zhang, Sisi Duan, Chao Liu, Boxin Zhao, Xuanji Meng, Shengli Liu, Yong Yu, Fangguo Zhang, Liehuang Zhu
2022/1677 (PDF ) Quagmire ciphers and group theory: What is a Porta cipher? Thomas Kaeding
2022/1676 (PDF ) (Concurrently Secure) Blind Schnorr from Schnorr Georg Fuchsbauer, Mathias Wolf
2022/1675 (PDF ) SoK: Getting started with open-source fault simulation tools Asmita Adhikary, Ileana Buhan
2022/1674 (PDF ) Practical Multi-Key Homomorphic Encryption for More Flexible and Efficient Secure Federated Aggregation (preliminary work) Alberto Pedrouzo-Ulloa, Aymen Boudguiga, Olive Chakraborty, Renaud Sirdey, Oana Stan, Martin Zuber
2022/1673 (PDF ) DeV-IP: A k-out-n Decentralized and verifiable BFV for Inner Product evaluation Jose Contreras, Hardik Gajera
2022/1672 (PDF ) An Auditable Confidentiality Protocol for Blockchain Transactions Aoxuan Li, Gabriele D’Angelo, Jacky Tang, Frank Fang, Baron Gong
2022/1671 (PDF ) Quantum Neural Network based Distinguisher for Differential Cryptanalysis on Simplified Block Ciphers Hyunji Kim, Kyungbae Jang, Sejin Lim, Yeajun Kang, Wonwoong Kim, Hwajeong Seo
2022/1670 (PDF ) Compactly Committing Authenticated Encryption Using Encryptment and Tweakable Block Cipher Shoichi Hirose, Kazuhiko Minematsu
2022/1669 (PDF ) Jolt: Recovering TLS Signing Keys via Rowhammer Faults Koksal Mus, Yarkın Doröz, M. Caner Tol, Kristi Rahman, Berk Sunar
2022/1668 (PDF ) On the families of algebraic graphs with the fastest growth of cycle indicator and their applications Vasyl Ustimenko
2022/1667 (PDF ) Applying Castryck-Decru Attack on the Masked Torsion Point Images SIDH variant Jesús-Javier Chi-Domínguez
2022/1666 (PDF ) Cryptanalysis of Ivanov-Krouk-Zyablov cryptosystem Kirill Vedenev, Yury Kosolapov
2022/1665 (PDF ) GCKSign: Simple and Efficient Signatures from Generalized Compact Knapsacks Joo Woo, Kwangsu Lee, Jong Hwan Park
2022/1664 (PDF ) NTRU+: Compact Construction of NTRU Using Simple Encoding Method Jonghyun Kim, Jong Hwan Park
2022/1663 (PDF ) REDOG and Its Performance Analysis Jon-Lark Kim, Jihoon Hong, Terry Shue Chien Lau, YounJae Lim, Byung-Sun Won
2022/1662 (PDF ) Revisiting cycles of pairing-friendly elliptic curves Marta Bellés-Muñoz, Jorge Jiménez Urroz, Javier Silva
2022/1661 (PDF ) Enhancing the Dual Attack against MLWE: Constructing More Short Vectors Using Its Algebraic Structure Han Wu, Guangwu Xu
2022/1660 (PDF ) Owner Identity Verification in the Internet of Connected Vehicles: Zero Trust Based Solution Mashrukh Zayed, Adnan Anwar, Ziaur Rahman, Sk. Shezan Arefin, Rafiqul Islam
2022/1659 (PDF ) A Deep Learning aided Key Recovery Framework for Large-State Block Ciphers Yi Chen, Zhenzhen Bao, Yantian Shen, Hongbo Yu
2022/1658 (PDF ) A new Privacy Preserving and Scalable Revocation Method for Self Sovereign Identity - The Perfect Revocation Method does not exist yet Andreas Freitag
2022/1657 (PDF ) CycloneNTT: An NTT/FFT Architecture Using Quasi-Streaming of Large Datasets on DDR- and HBM-based FPGA Platforms Kaveh Aasaraai, Emanuele Cesena, Rahul Maganti, Nicolas Stalder, Javier Varela, Kevin Bowers
2022/1656 (PDF ) Proactive Refresh for Accountable Threshold Signatures Dan Boneh, Aditi Partap, Lior Rotem
2022/1655 (PDF ) Just How Fair is an Unreactive World? Srinivasan Raghuraman, Yibin Yang
2022/1654 (PDF ) On the Complete Non-Malleability of the Fujisaki-Okamoto Transform Daniele Friolo, Matteo Salvino, Daniele Venturi
2022/1653 (PDF ) Reversing, Breaking, and Fixing the French Legislative Election E-Voting Protocol Alexandre Debant, Lucca Hirschi
2022/1652 (PDF ) Improved Universal Circuits using Lookup Tables Yann Disser, Daniel Günther, Thomas Schneider, Maximilian Stillger, Arthur Wigandt, Hossein Yalame
2022/1651 (PDF ) TiGER: Tiny bandwidth key encapsulation mechanism for easy miGration based on RLWE(R) Seunghwan Park, Chi-Gon Jung, Aesun Park, Joongeun Choi, Honggoo Kang
2022/1650 (PDF ) LightSwap: An Atomic Swap Does Not Require Timeouts At Both Blockchains Philipp Hoenisch, Subhra Mazumdar, Pedro Moreno-Sanchez, Sushmita Ruj
2022/1649 (PDF ) Robustness of Affine and Extended Affine Equivalent Surjective S-Box(es) against Differential Cryptanalysis Shah Fahd, Mehreen Afzal, Dawood Shah, Waseem Iqbal, Atiya Hai
2022/1648 (PDF ) Compute, but Verify: Efficient Multiparty Computation over Authenticated Inputs Moumita Dutta, Chaya Ganesh, Sikhar Patranabis, Nitin Singh
2022/1647 (PDF ) Quantum Algorithm for Oracle Subset Product Trey Li
2022/1646 (PDF ) Blockin: Multi-Chain Sign-In Standard with Micro-Authorizations Matt Davison, Ken King, Trevor Miller
2022/1645 (PDF ) The Return of the SDitH Carlos Aguilar-Melchor, Nicolas Gama, James Howe, Andreas Hülsing, David Joseph, Dongze Yue
2022/1644 (PDF ) An attack on a key exchange protocol based on max-times and min-times algebras Matvei Kotov, Alexander Treier, Ivan Buchinskiy
2022/1643 (PDF ) End-to-End Secure Messaging with Traceability Only for Illegal Content James Bartusek, Sanjam Garg, Abhishek Jain, Guru-Vamsi Policharla
2022/1642 (PDF ) Proofs of Proof-of-Stake with Sublinear Complexity Shresth Agrawal, Joachim Neu, Ertem Nusret Tas, Dionysis Zindros
2022/1641 (PDF ) AlgSAT --- a SAT Method for Search and Verification of Differential Characteristics from Algebraic Perspective Huina Li, Haochen Zhang, Guozhen Liu, Kai Hu, Jian Guo, Weidong Qiu
2022/1640 (PDF ) Differential Meet-In-The-Middle Cryptanalysis Christina Boura, Nicolas David, Patrick Derbez, Gregor Leander, María Naya-Plasencia
2022/1639 (PDF ) Post-Quantum Hybrid KEMTLS Performance in Simulated and Real Network Environments Alexandre Augusto Giron, João Pedro Adami do Nascimento, Ricardo Custódio, Lucas Pandolfo Perin
2022/1638 (PDF ) The Security of Quasigroups Based Substitution Permutation Networks George Teseleanu
2022/1637 (PDF ) Polynomial-Time Cryptanalysis of the Subspace Flooding Assumption for Post-Quantum $i\mathcal{O}$ Aayush Jain, Huijia Lin, Paul Lou, Amit Sahai
2022/1636 (PDF ) Threshold Signatures with Private Accountability Dan Boneh, Chelsea Komlo
2022/1635 (PDF ) FPT: a Fixed-Point Accelerator for Torus Fully Homomorphic Encryption Michiel Van Beirendonck, Jan-Pieter D'Anvers, Ingrid Verbauwhede
2022/1634 (PDF ) Division of Regulatory Power: Collaborative Regulation for Privacy-Preserving Blockchains Tianyu Zhaolu, Zhiguo Wan, Huaqun Wang
2022/1633 (PDF ) Vortex : Building a Lattice-based SNARK scheme with Transparent Setup Alexandre Belling, Azam Soleimanian
2022/1632 (PDF ) Cryptography with Weights: MPC, Encryption and Signatures Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, Yinuo Zhang
2022/1631 (PDF ) Enhancing Ring-LWE Hardness using Dedekind Index Theorem Charanjit S Jutla, Chengyu Lin
2022/1630 (PDF ) Finding Collisions for Round-Reduced Romulus-H Marcel Nageler, Felix Pallua, Maria Eichlseder
2022/1629 (PDF ) Temporary Block Withholding Attacks on Filecoin's Expected Consensus Tong Cao, Xin Li
2022/1628 (PDF ) Analyzing the Leakage Resistance of the NIST's Lightweight Crypto Competition's Finalists Corentin Verhamme, Gaëtan Cassiers, François-Xavier Standaert
2022/1627 (PDF ) The Random Fault Model Siemen Dhooghe
2022/1626 (PDF ) MinRoot: Candidate Sequential Function for Ethereum VDF Dmitry Khovratovich, Mary Maller, Pratyush Ranjan Tiwari
2022/1625 (PDF ) Efficient Threshold FHE with Application to Real-Time Systems Siddhartha Chowdhury, Sayani Sinha, Animesh Singh, Shubham Mishra, Chandan Chaudhary, Sikhar Patranabis, Pratyay Mukherjee, Ayantika Chatterjee, Debdeep Mukhopadhyay
2022/1624 (PDF ) Algorithms for switching between block-wise and arithmetic masking Evgeny Alekseev, Andrey Bozhko
2022/1623 (PDF ) WOTSwana: A Generalized Sleeve Construction for Multiple Proofs of Ownership David Chaum, Mario Larangeira, Mario Yaksetig
2022/1622 (PDF ) Anonymous Tokens with Hidden Metadata Bit from Algebraic MACs F. Betül Durak, Serge Vaudenay, Melissa Chase
2022/1621 (PDF ) cuXCMP: CUDA-Accelerated Private Comparison Based on Homomorphic Encryption Hao Yang, Shiyu Shen, Zhe Liu, Yunlei Zhao
2022/1620 (PDF ) Another Round of Breaking and Making Quantum Money: How to Not Build It from Lattices, and More Jiahui Liu, Hart Montgomery, Mark Zhandry
2022/1619 (PDF ) The Performance Analysis of Post-Quantum Cryptography for Vehicular Communications Abel C. H. Chen
2022/1618 (PDF ) Witness-Succinct Universally-Composable SNARKs Chaya Ganesh, Yashvanth Kondi, Claudio Orlandi, Mahak Pancholi, Akira Takahashi, Daniel Tschudi
2022/1617 (PDF ) A New Higher Order Differential of RAGHAV Naoki Shibayama, Yasutaka Igarashi
2022/1616 (PDF ) Secret Sharing for Generic Access Structures James Smith
2022/1615 (PDF ) Efficient Methods for Implementation of Generalized Access Structures James Smith
2022/1614 (PDF ) Throughput Limitation of the Off-chain Payment Networks Shayan Hamidi Dehshali, Seyed Mahdi Hosseini, Soheil Zibakhsh Shabgahi, Behnam Bahrak
2022/1613 (PDF ) Classic McEliece Key Generation on RAM constrained devices Rainer Urian, Raphael Schermann
2022/1612 (PDF ) On Black-Box Constructions of Time and Space Efficient Sublinear Arguments from Symmetric-Key Primitives Laasya Bangalore, Rishabh Bhadauria, Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
2022/1611 (PDF ) Efficient Aggregatable BLS Signatures with Chaum-Pedersen Proofs Jeff Burdges, Oana Ciobotaru, Syed Lavasani, Alistair Stewart
2022/1610 (PDF ) ADMM and Reproducing Sum-Product Decoding Algorithm Applied to QC-MDPC Code-based McEliece Cryptosystems Kohtaro Watanabe, Motonari Ohtsuka, Yuta Tsukie
2022/1609 (PDF ) Forking Sums of Permutations for Optimally Secure and Highly Efficient PRFs Avijit Dutta, Jian Guo, Eik List
2022/1608 (PDF ) Ligero: Lightweight Sublinear Arguments Without a Trusted Setup Scott Ames, Carmit Hazay, Yuval Ishai, Muthuramakrishnan Venkitasubramaniam
2022/1607 (PDF ) A Universally Composable PAKE with Zero Communication Cost (And Why It Shouldn't Be Considered UC-Secure) Lawrence Roy, Jiayu Xu
2022/1606 (PDF ) AUC: Accountable Universal Composability Mike Graf, Ralf Küsters, Daniel Rausch
2022/1605 (PDF ) Sweep-UC: Swapping Coins Privately Lucjan Hanzlik, Julian Loss, Sri AravindaKrishnan Thyagarajan, Benedikt Wagner
2022/1604 (PDF ) Quantum Rebound Attacks on Reduced-Round ARIA-Based Hash Functions Seungjun Baek, Jongsung Kim
2022/1603 (PDF ) Slid Pairs of the Fruit-80 Stream Cipher Pang Kok An, Shekh Faisal Abdul-Latip, Hazlin Abdul Rani
2022/1602 (PDF ) Survey on Fully Homomorphic Encryption, Theory, and Applications Chiara Marcolla, Victor Sucasas, Marc Manzano, Riccardo Bassoli, Frank H.P. Fitzek, Najwa Aaraj
2022/1601 (PDF ) Revisiting the Concrete Hardness of SelfTargetMSIS in CRYSTALS-Dilithium Geng Wang, Wenwen Xia, Gongyu Shi, Ming Wan, Yuncong Zhang, Dawu Gu
2022/1600 (PDF ) Secret-Shared Joins with Multiplicity from Aggregation Trees Saikrishna Badrinarayanan, Sourav Das, Gayathri Garimella, Srinivasan Raghuraman, Peter Rindal
2022/1599 (PDF ) Streaming Functional Encryption Jiaxin Guan, Alexis Korb, Amit Sahai
2022/1598 (PDF ) Efficiently Testable Circuits Mirza Ahad Baig, Suvradip Chakraborty, Stefan Dziembowski, Małgorzata Gałązka, Tomasz Lizurej, Krzysztof Pietrzak
2022/1597 (PDF ) A Closer Look at a Recent Pipelined True Random Number Generator Design Markus Dichtl
2022/1596 (PDF ) LowMS: a new rank metric code-based KEM without ideal structure Nicolas Aragon, Victor Dyseryn, Philippe Gaborit, Pierre Loidreau, Julian Renner, Antonia Wachter-Zeh
2022/1595 (PDF ) Efficient Secure Three-Party Sorting with Applications to Data Analysis and Heavy Hitters Gilad Asharov, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Ariel Nof, Benny Pinkas, Katsumi Takahashi, Junichi Tomida
2022/1594 (PDF ) Compact FE for Unbounded Attribute-Weighted Sums for Logspace from SXDH Pratish Datta, Tapas Pal, Katsuyuki Takashima
2022/1593 (PDF ) Proofs of discrete logarithm equality across groups Melissa Chase, Michele Orrù, Trevor Perrin, Greg Zaverucha
2022/1592 (PDF ) Powers-of-Tau to the People: Decentralizing Setup Ceremonies Valeria Nikolaenko, Sam Ragsdale, Joseph Bonneau, Dan Boneh
2022/1591 (PDF ) ISAP+: ISAP with Fast Authentication Arghya Bhattacharjee, Avik Chakraborti, Nilanjan Datta, Cuauhtemoc Mancillas-López, Mridul Nandi
2022/1590 (PDF ) Misuse-resistant MGM2 mode Liliya Akhmetzyanova, Evgeny Alekseev, Alexandra Babueva, Andrey Bozhko, Stanislav Smyshlyaev
2022/1589 (PDF ) Cryptanalysis of a privacy-preserving behavior-oriented authentication scheme Sigurd Eskeland, Ahmed Fraz Baig
2022/1588 (PDF ) Factoring using multiplicative relations modulo n: a subexponential algorithm inspired by the index calculus Katherine E. Stange
2022/1587 (PDF ) Applications of the indirect sum in the design of several special classes of bent functions outside the completed $\mathcal{MM}$ class Fengrong Zhang, Enes Pasalic, Amar Bapić, Baocang Wang
2022/1586 (PDF ) Practical Asynchronous Proactive Secret Sharing and Key Refresh Christoph U. Günther, Sourav Das, Lefteris Kokoris-Kogias
2022/1585 (PDF ) Attribute-based Anonymous Credential: Optimization for Single-Use and Multi-Use Kwan Yin Chan, Tsz Hon Yuen
2022/1584 (PDF ) Instantiability of Classical Random-Oracle-Model Encryption Transforms Alice Murphy, Adam O'Neill, Mohammad Zaheri
2022/1583 (PDF ) Asynchronous Multi-Party Quantum Computation Vipul Goyal, Chen-Da Liu-Zhang, Justin Raizes, João Ribeiro
2022/1582 (PDF ) FSMx-Ultra: Finite State Machine Extraction from Gate-Level Netlist for Security Assessment Rasheed Kibria, Farimah Farahmandi, Mark Tehranipoor
2022/1581 (PDF ) Truncator: Time-space Tradeoff of Cryptographic Primitives Foteini Baldimtsi, Konstantinos Chalkias, Panagiotis Chatzigiannis, Mahimna Kelkar
2022/1580 (PDF ) Multi-ciphertext security degradation for lattices Daniel J. Bernstein
2022/1579 (PDF ) New Properties of Double Boomerang Connectivity Table Qianqian Yang, Ling Song, Siwei Sun, Danping Shi, Lei Hu
2022/1578 (PDF ) Weighted Secret Sharing from Wiretap Channels Fabrice Benhamouda, Shai Halevi, Lev Stambler
2022/1577 (PDF ) Rescue-Prime Optimized Tomer Ashur, Al Kindi, Willi Meier, Alan Szepieniec, Bobbin Threadbare
2022/1576 (PDF ) Folding Schemes with Selective Verification Carla Ràfols, Alexandros Zacharakis
2022/1575 (PDF ) On Linearization Attack of Entropic Quasigroups Cryptography Daniel Nager
2022/1574 (PDF ) Security Analysis of Delay-Based Strong PUFs with Multiple Delay Lines Anita Aghaie, Amir Moradi, Johannes Tobisch, Nils Wisiol
2022/1573 (PDF ) Solving Small Exponential ECDLP in EC-based Additively Homomorphic Encryption and Applications Fei Tang, Guowei Ling, Chaochao Cai, Jinyong Shan, Xuanqi Liu, Peng Tang, Weidong Qiu
2022/1572 (PDF ) Layered ROLLO-I: Faster rank-metric code-based KEM using ideal LRPC codes Chanki Kim, Young-Sik Kim, Jong-Seon No
2022/1571 (PDF ) Practical Settlement Bounds for Longest-Chain Consensus Peter Gaži, Ling Ren, Alexander Russell
2022/1570 (PDF ) Set (Non-)Membership NIZKs from Determinantal Accumulators Helger Lipmaa, Roberto Parisella
2022/1569 (PDF ) DAG-$\Sigma$: A DAG-based Sigma Protocol for Relations in CNF Gongxian Zeng, Junzuo Lai, Zhengan Huang, Yu Wang, Zhiming Zheng
2022/1568 (PDF ) Extendable Threshold Ring Signatures with Enhanced Anonymity Gennaro Avitabile, Vincenzo Botta, Dario Fiore
2022/1567 (PDF ) Full Round Zero-sum Distinguishers on TinyJAMBU-128 and TinyJAMBU-192 Keyed-permutation in the Known-key setting Orr Dunkelman, Shibam Ghosh, Eran Lambooij
2022/1566 (PDF ) Characterisation of Bijectivity Preserving Componentwise Modification of S-Boxes Kaisa Nyberg
2022/1565 (PDF ) Baloo: Nearly Optimal Lookup Arguments Arantxa Zapico, Ariel Gabizon, Dmitry Khovratovich, Mary Maller, Carla Ràfols
2022/1564 (PDF ) Efficient privacy preserving top-k recommendation using homomorphic sorting Pranav Verma, Anish Mathuria, Sourish Dasgupta
2022/1563 (PDF ) A Practical Full Key Recovery Attack on TFHE and FHEW by Inducing Decryption Errors Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay
2022/1562 (PDF ) A Systematization of Voter Registration Security Jack Cable, Andrés Fábrega, Sunoo Park, Michael A. Specter
2022/1561 (PDF ) Vogue: Faster Computation of Private Heavy Hitters Pranav Jangir, Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal, Somya Sangal
2022/1560 (PDF ) Verifiable Private Information Retrieval Shany Ben-David, Yael Tauman Kalai, Omer Paneth
2022/1559 (PDF ) Take your MEDS: Digital Signatures from Matrix Code Equivalence Tung Chou, Ruben Niederhagen, Edoardo Persichetti, Tovohery Hajatiana Randrianarisoa, Krijn Reijnders, Simona Samardjiska, Monika Trimoska
2022/1558 (PDF ) Quantum Speed-Up for Multidimensional (Zero Correlation) Linear and Integral Distinguishers Akinori Hosoyamada
2022/1557 (PDF ) Less is more: refinement proofs for probabilistic proofs Kunming Jiang, Devora Chait-Roth, Zachary DeStefano, Michael Walfish, Thomas Wies
2022/1556 (PDF ) Intermediate Certificate Suppression in Post-Quantum TLS: An Approximate Membership Querying Approach Dimitrios Sikeridis, Sean Huntley, David Ott, Michael Devetsikiotis
2022/1555 (PDF ) Avoiding Lock Outs: Proactive FIDO Account Recovery using Managerless Group Signatures Sunpreet S. Arora, Saikrishna Badrinarayanan, Srinivasan Raghuraman, Maliheh Shirvanian, Kim Wagner, Gaven Watson
2022/1554 (PDF ) Executing and Proving over Dirty Ledgers Christos Stefo, Zhuolun Xiang, Lefteris Kokoris-Kogias
2022/1553 (PDF ) Lower Bound Framework for Differentially Private and Oblivious Data Structures Giuseppe Persiano, Kevin Yeo
2022/1552 (PDF ) XMSS-SM3 and MT-XMSS-SM3: Instantiating Extended Merkle Signature Schemes with SM3 Siwei Sun, Tianyu Liu, Zhi Guan, Yifei He, Jiwu Jing, Lei Hu, Zhenfeng Zhang, Hailun Yan
2022/1551 (PDF ) Extensible Decentralized Secret Sharing and Application to Schnorr Signatures Michele Battagliola, Riccardo Longo, Alessio Meneghetti
2022/1550 (PDF ) Modifications of Bijective S-Boxes with Linear Structures Kaisa Nyberg
2022/1549 (PDF ) The SAT-Based Automatic Searching and Experimental Verification for Differential Characteristics with Application to Midori64 Yingying Li, Qichun Wang
2022/1548 (PDF ) Trellis: Robust and Scalable Metadata-private Anonymous Broadcast Simon Langowski, Sacha Servan-Schreiber, Srinivas Devadas
2022/1547 (PDF ) A Masked Pure-Hardware Implementation of Kyber Cryptographic Algorithm Tendayi Kamucheka, Alexander Nelson, David Andrews, Miaoqing Huang
2022/1546 (PDF ) Threshold Implementations in Software: Micro-architectural Leakages in Algorithms John Gaspoz, Siemen Dhooghe
2022/1545 (PDF ) On Structure-Preserving Cryptography and Lattices Dennis Hofheinz, Kristina Hostakova, Roman Langrehr, Bogdan Ursu
2022/1544 (PDF ) Towards Efficient Decentralized Federated Learning Christodoulos Pappas, Dimitrios Papadopoulos, Dimitris Chatzopoulos, Eleni Panagou, Spyros Lalis, Manolis Vavalis
2022/1543 (PDF ) Four-Round Black-Box Non-Malleable Commitments from One-Way Permutations Michele Ciampi, Emmanuela Orsini, Luisa Siniscalchi
2022/1542 (PDF ) Scalable and Transparent Proofs over All Large Fields, via Elliptic Curves (ECFFT part II) Eli Ben-Sasson, Dan Carmon, Swastik Kopparty, David Levit
2022/1541 (PDF ) Secure Auctions in the Presence of Rational Adversaries Chaya Ganesh, Bhavana Kanukurthi, Girisha Shankar
2022/1540 (PDF ) Exploiting algebraic structures in probing security Maxime Plançon
2022/1539 (PDF ) Oblivious-Transfer Complexity of Noisy Coin-Toss via Secure Zero Communication Reductions Saumya Goyal, Varun Narayanan, Manoj Prabhakaran
2022/1538 (PDF ) DME: a full encryption, signature and KEM multivariate public key cryptosystem Ignacio Luengo, Martín Avendaño
2022/1537 (PDF ) On Extremal Algebraic Graphs and Multivariate Cryptosystems Vasyl Ustimenko
2022/1536 (PDF ) Privacy-Preserving Blueprints Markulf Kohlweiss, Anna Lysyanskaya, An Nguyen
2022/1535 (PDF ) Reverse Firewalls for Oblivious Transfer Extension and Applications to Zero-Knowledge Suvradip Chakraborty, Chaya Ganesh, Pratik Sarkar
2022/1534 (PDF ) Masked Iterate-Fork-Iterate: A new Design Paradigm for Tweakable Expanding Pseudorandom Function Elena Andreeva, Benoit Cogliati, Virginie Lallemand, Marine Minier, Antoon Purnal, Arnab Roy
2022/1533 (PDF ) How to Hide MetaData in MLS-Like Secure Group Messaging: Simple, Modular, and Post-Quantum Keitaro Hashimoto, Shuichi Katsumata, Thomas Prest
2022/1532 (PDF ) Function-Hiding Dynamic Decentralized Functional Encryption for Inner Products Ky Nguyen, David Pointcheval, Robert Schädlich
2022/1531 (PDF ) The Key Lattice Framework for Concurrent Group Messaging Kelong Cong, Karim Eldefrawy, Nigel P. Smart, Ben Terner
2022/1530 (PDF ) Multivariate lookups based on logarithmic derivatives Ulrich Haböck
2022/1529 (PDF ) Key-Recovery Fault Injection Attack on the Classic McEliece KEM Sabine Pircher, Johannes Geier, Julian Danner, Daniel Mueller-Gritschneder, Antonia Wachter-Zeh
2022/1528 (PDF ) Graph-Theoretic Algorithms for the Alternating Trilinear Form Equivalence Problem Ward Beullens
2022/1527 (PDF ) Pattern Matching in Encrypted Stream from Inner Product Encryption Élie Bouscatié, Guilhem Castagnos, Olivier Sanders
2022/1526 (PDF ) Threshold-Optimal MPC With Friends and Foes Nikolas Melissaris, Divya Ravi, Sophia Yakoubov
2022/1525 (PDF ) Endemic Oblivious Transfer via Random Oracles, Revisited Zhelei Zhou, Bingsheng Zhang, Hong-Sheng Zhou, Kui Ren
2022/1524 (PDF ) Shielding Probabilistically Checkable Proofs: Zero-Knowledge PCPs from Leakage Resilience Mor Weiss
2022/1523 (PDF ) Your Reputation's Safe with Me: Framing-Free Distributed Zero-Knowledge Proofs Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss
2022/1522 (PDF ) Two new infinite families of APN functions in trivariate form Kangquan Li, Nikolay Kaleyski
2022/1521 (PDF ) An Assessment of Differential-Neural Distinguishers Aron Gohr, Gregor Leander, Patrick Neumann
2022/1520 (PDF ) Censorship-Resilient and Confidential Collateralized Second-Layer Payments Kari Kostiainen, Sven Gnap, Ghassan Karame
2022/1519 (PDF ) Collusion-resistant broadcast encryption based on hidden RSA subgroups Sigurd Eskeland
2022/1518 (PDF ) An Experimentally Verified Attack on 820-Round Trivium (Full Version) Cheng Che, Tian Tian
2022/1517 (PDF ) From Auditable Quantum Authentication to Best-of-Both-Worlds Multiparty Quantum Computation with Public Verifiable Identifiable Abort Mi-Ying (Miryam) Huang, Er-Cheng Tang
2022/1516 (PDF ) Obfuscation of Evasive Algebraic Set Membership Steven D. Galbraith, Trey Li
2022/1515 (PDF ) Succinct Vector, Polynomial, and Functional Commitments from Lattices Hoeteck Wee, David J. Wu
2022/1514 (PDF ) Pseudorandom (Function-Like) Quantum State Generators: New Definitions and Applications Prabhanjan Ananth, Aditya Gulati, Luowen Qian, Henry Yuen
2022/1513 (PDF ) Player-Replaceability and Forensic Support are Two Sides of the Same (Crypto) Coin Peiyao Sheng, Gerui Wang, Kartik Nayak, Sreeram Kannan, Pramod Viswanath
2022/1512 (PDF ) Building MPCitH-based Signatures from MQ, MinRank, Rank SD and PKP Thibauld Feneuil
2022/1511 (PDF ) Round-Optimal Oblivious Transfer and MPC from Computational CSIDH Saikrishna Badrinarayanan, Daniel Masny, Pratyay Mukherjee, Sikhar Patranabis, Srinivasan Raghuraman, Pratik Sarkar
2022/1510 (PDF ) Witness Encryption for Succinct Functional Commitments and Applications Matteo Campanelli, Dario Fiore, Hamidreza Khoshakhlagh
2022/1509 (PDF ) sVote with Control Components Voting Protocol. Computational Proof of Complete Verifiability and Privacy. Enrique Larraia, Tamara Finogina, Nuria Costa
2022/1508 (PDF ) Non-Interactive Publicly-Verifiable Delegation of Committed Programs Riddhi Ghosal, Amit Sahai, Brent Waters
2022/1507 (PDF ) AGE Is Not Just a Number: Label Distribution in Deep Learning-based Side-channel Analysis Lichao Wu, Léo Weissbart, Marina Krček, Huimin Li, Guilherme Perin, Lejla Batina, Stjepan Picek
2022/1506 (PDF ) ORTOA: One Round Trip Oblivious Access Sujaya Maiyya, Yuval Steinhart, Divyakant Agrawal, Prabhanjan Ananth, Amr El Abbadi
2022/1505 (PDF ) Efficient Registration-Based Encryption Noemi Glaeser, Dimitris Kolonelos, Giulio Malavolta, Ahmadreza Rahimi
2022/1504 (PDF ) On Perfectly Secure Two-Party Computation for Symmetric Functionalities with Correlated Randomness Bar Alon, Olga Nissenbaum, Eran Omri, Anat Paskin-Cherniavsky, Arpita Patra
2022/1503 (PDF ) The Parallel Reversible Pebbling Game: Analyzing the Post-Quantum Security of iMHFs Jeremiah Blocki, Blake Holman, Seunghoon Lee
2022/1502 (PDF ) Beyond Uber: Instantiating Generic Groups via PGGs Balthazar Bauer, Pooya Farshim, Patrick Harasser, Adam O'Neill
2022/1501 (PDF ) MinRank in the Head: Short Signatures from Zero-Knowledge Proofs Gora Adj, Luis Rivera-Zamarripa, Javier Verbel
2022/1500 (PDF ) Registered Attribute-Based Encryption Susan Hohenberger, George Lu, Brent Waters, David J. Wu
2022/1499 (PDF ) WrapQ: Side-Channel Secure Key Management for Post-Quantum Cryptography Markku-Juhani O. Saarinen
2022/1498 (PDF ) Simple, Fast, Efficient, and Tightly-Secure Non-Malleable Non-Interactive Timed Commitments Peter Chvojka, Tibor Jager
2022/1497 (PDF ) Lattice-Based Quantum Advantage from Rotated Measurements Yusuf Alnawakhtha, Atul Mantri, Carl A. Miller, Daochen Wang
2022/1496 (PDF ) Multiplicative Partially Homomorphic CRT Secret Sharing Shlomi Dolev, Yaniv Kleinman
2022/1495 (PDF ) Peregrine: Toward Fastest FALCON Based on GPV Framework Eun-Young Seo, Young-Sik Kim, Joon-Woo Lee, Jong-Seon No
2022/1494 (PDF ) The DAG KNIGHT Protocol: A Parameterless Generalization of Nakamoto Consensus Yonatan Sompolinsky, Michael Sutton
2022/1493 (PDF ) Enhanced pqsigRM: Code-Based Digital Signature Scheme with Short Signature and Fast Verification for Post-Quantum Cryptography Jinkyu Cho, Jong-Seon No, Yongwoo Lee, Zahyun Koo, Young-Sik Kim
2022/1492 (PDF ) A Control Theoretic Approach to Infrastructure-Centric Blockchain Tokenomics Oguzhan Akcin, Robert P. Streit, Benjamin Oommen, Sriram Vishwanath, Sandeep Chinchali
2022/1491 (PDF ) LMS-SM3 and HSS-SM3: Instantiating Hash-based Post-Quantum Signature Schemes with SM3 Siwei Sun, Tianyu Liu, Zhi Guan, Yifei He, Jiwu Jing, Lei Hu, Zhenfeng Zhang, Hailun Yan
2022/1490 (PDF ) Efficient Gaussian sampling for RLWE-based cryptography through a fast Fourier transform Marcio Barbado Junior
2022/1489 (PDF ) On new results on Extremal Algebraic Graph Theory and their connections with Algebraic Cryptography Vasyl Ustimenko
2022/1488 (PDF ) Quagmire ciphers and group theory: What is a Beaufort cipher? Thomas Kaeding
2022/1487 (PDF ) An efficient verifiable state for zk-EVM and beyond from the Anemoi hash function Jianwei Liu, Harshad Patil, Akhil Sai Peddireddy, Kevin Singh, Haifeng Sun, Huachuang Sun, Weikeng Chen
2022/1486 (PDF ) Correlation Intractability and SNARGs from Sub-exponential DDH Arka Rai Choudhuri, Sanjam Garg, Abhishek Jain, Zhengzhong Jin, Jiaheng Zhang
2022/1485 (PDF ) Policy-Based Redactable Signatures Zachary A Kissel
2022/1484 (PDF ) Efficient and Universally Composable Non-Interactive Zero-Knowledge Proofs of Knowledge with Security Against Adaptive Corruptions Anna Lysyanskaya, Leah Namisa Rosenbloom
2022/1483 (PDF ) Towards Practical Secure Neural Network Inference: The Journey So Far and the Road Ahead Zoltán Ádám Mann, Christian Weinert, Daphnee Chabal, Joppe W. Bos
2022/1482 (PDF ) Multi-Point HashDH OPRF using Multiplicative Blinding with Application to Private Set Intersection Minglang Dong
2022/1481 (PDF ) Provably Post-Quantum Secure Messaging with Strong Compromise Resilience and Immediate Decryption Cas Cremers, Mang Zhao
2022/1480 (PDF ) A Pairing-Free Signature Scheme from Correlation Intractable Hash Function and Strong Diffie-Hellman Assumption Benoit Chevallier-Mames
2022/1479 (PDF ) A Note on Constructing SIDH-PoK-based Signatures after Castryck-Decru Attack Jesús-Javier Chi-Domínguez
2022/1478 (PDF ) Limits on revocable proof systems, with applications to stateless blockchains Miranda Christ, Joseph Bonneau
2022/1477 (PDF ) A Post-Quantum Digital Signature Scheme from QC-LDPC Codes Christian Picozzi, Alessio Meneghetti, Giovanni Tognolini
2022/1476 (PDF ) The EVIL Machine: Encode, Visualize and Interpret the Leakage Valence Cristiani, Maxime Lecomte, Philippe Maurine
2022/1475 (PDF ) Quagmire ciphers and group theory: Recovering keywords from the key table Thomas Kaeding
2022/1474 (PDF ) Quantum security of subset cover problems Samuel Bouaziz--Ermann, Alex B. Grilo, Damien Vergnaud
2022/1473 (PDF ) How to Meet Ternary LWE Keys on Babai’s Nearest Plane Minki Hhan, Jiseung Kim, Changmin Lee, Yongha Son
2022/1472 (PDF ) Cryptographic Protection of Random Access Memory: How Inconspicuous can Hardening Against the most Powerful Adversaries be? Roberto Avanzi, Ionut Mihalcea, David Schall, Héctor Montaner, Andreas Sandberg
2022/1471 (PDF ) Bid-Matching Problem and Score-Based Consensus for Peer-to-Peer Energy Trading Xiangyu Su, Xavier Défago, Mario Larangeira, Kazuyuki Mori, Takuya Oda, Yuta Okumura, Yasumasa Tamura, Keisuke Tanaka
2022/1470 (PDF ) Casting out Primes: Bignum Arithmetic for Zero-Knowledge Proofs Daniel Lubarov, Jordi Baylina Melé
2022/1469 (PDF ) Supersingular Curves You Can Trust Andrea Basso, Giulio Codogni, Deirdre Connolly, Luca De Feo, Tako Boris Fouotsa, Guido Maria Lido, Travis Morrison, Lorenz Panny, Sikhar Patranabis, Benjamin Wesolowski
2022/1468 (PDF ) Vulnerability Assessment of Ciphers To Fault Attacks Using Reinforcement Learning Hao Guo, Sayandeep Saha, Satwik Patnaik, Vasudev Gohil, Debdeep Mukhopadhyay, Jeyavijayan (JV) Rajendran
2022/1467 (PDF ) A Cipher-Agnostic Neural Training Pipeline with Automated Finding of Good Input Differences Emanuele Bellini, David Gerault, Anna Hambitzer, Matteo Rossi
2022/1466 (PDF ) I want to ride my BICYCL: BICYCL Implements CryptographY in CLass groups Cyril Bouvier, Guilhem Castagnos, Laurent Imbert, Fabien Laguillaumie
2022/1465 (PDF ) Private Collaborative Data Cleaning via Non-Equi PSI Erik-Oliver Blass, Florian Kerschbaum
2022/1464 (PDF ) Parallel Isogeny Path Finding with Limited Memory Emanuele Bellini, Jorge Chavez-Saab, Jesús-Javier Chi-Domínguez, Andre Esser, Sorina Ionica, Luis Rivera-Zamarripa, Francisco Rodríguez-Henríquez, Monika Trimoska, Floyd Zweydinger
2022/1463 (PDF ) How to Obfuscate MPC Inputs Ian McQuoid, Mike Rosulek, Jiayu Xu
2022/1461 (PDF ) ACORN: Input Validation for Secure Aggregation James Bell, Adrià Gascón, Tancrède Lepoint, Baiyu Li, Sarah Meiklejohn, Mariana Raykova, Cathie Yun
2022/1460 (PDF ) Towards Practical Multi-key TFHE: Parallelizable, Key-Compatible, Quasi-linear Complexity Hyesun Kwak, Seonhong Min, Yongsoo Song
2022/1459 (PDF ) Circuit Privacy for FHEW/TFHE-Style Fully Homomorphic Encryption in Practice Kamil Kluczniak
2022/1458 (PDF ) Speeding-Up Elliptic Curve Cryptography Algorithms Diana Maimut, Alexandru Cristian Matei
2022/1457 (PDF ) Secure Non-Interactive Reducibility is Decidable Kaartik Bhushan, Ankit Kumar Misra, Varun Narayanan, Manoj Prabhakaran
2022/1456 (PDF ) Resistance of Ascon Family against Conditional Cube Attacks in Nonce-Misuse Setting Donghoon Chang, Deukjo Hong, Jinkeon Kang, Meltem Sönmez Turan
2022/1455 (PDF ) Cuckoo Hashing in Cryptography: Optimal Parameters, Robustness and Applications Kevin Yeo
2022/1454 (PDF ) Unjamming Lightning: A Systematic Approach Clara Shikhelman, Sergei Tikhomirov
2022/1453 (PDF ) Assisted MPC Philipp Muth, Stefan Katzenbeisser
2022/1452 (PDF ) A Side-Channel Attack on a Hardware Implementation of CRYSTALS-Kyber Yanning Ji, Ruize Wang, Kalle Ngo, Elena Dubrova, Linus Backlund
2022/1451 (PDF ) Attribute-Based Signatures for Range of Inner Product and Its Applications Masahito Ishizaka, Kazuhide Fukushima
2022/1450 (PDF ) Deterministic Wallets for Adaptor Signatures Andreas Erwig, Siavash Riahi
2022/1449 (PDF ) ParaDiSE: Efficient Threshold Authenticated Encryption in Fully Malicious Model Shashank Agrawal, Wei Dai, Atul Luykx, Pratyay Mukherjee, Peter Rindal
2022/1448 (PDF ) Byzantine Consensus under Fully Fluctuating Participation Dahlia Malkhi, Atsuki Momose, Ling Ren
2022/1447 (PDF ) flookup: Fractional decomposition-based lookups in quasi-linear time independent of table size Ariel Gabizon, Dmitry Khovratovich
2022/1446 (PDF ) Radical isogenies and modular curves Valentina Pribanić
2022/1445 (PDF ) Minimizing Even-Mansour Ciphers for Sequential Indifferentiability (Without Key Schedules) Shanjie Xu, Qi Da, Chun Guo
2022/1444 (PDF ) Finding Three-Subset Division Property for Ciphers with Complex Linear Layers (Full Version) Debasmita Chakraborty
2022/1443 (PDF ) DOT-M: A Dual Offline Transaction Scheme of Central Bank Digital Currency for Trusted Mobile Devices Bo Yang, Yanchao Zhang, Dong Tong
2022/1442 (PDF ) FairPoS: Input Fairness in Proof-of-Stake with Adaptive Security James Hsin-yu Chiang, Bernardo David, Ittay Eyal, Tiantian Gong
2022/1441 (PDF ) Tighter Post-quantum Proof for Plain FDH, PFDH and GPV-IBE Yu Liu, Haodong Jiang, Yunlei Zhao
2022/1440 (PDF ) An Efficient and Decentralized Blockchain-based Commercial Alternative (Full Version) Marwan Zeggari, Renaud Lambiotte, Aydin Abadi, Louise Axon, Mohamad Kassab
2022/1439 (PDF ) Cryptographic Smooth Neighbors Giacomo Bruno, Maria Corte-Real Santos, Craig Costello, Jonathan Komada Eriksen, Michael Naehrig, Michael Meyer, Bruno Sterner
2022/1438 (PDF ) Plug-and-play sanitization for TFHE Florian Bourse, Malika Izabachène
2022/1437 (PDF ) Secure Multiparty Computation from Threshold Encryption based on Class Groups Lennart Braun, Ivan Damgård, Claudio Orlandi
2022/1436 (PDF ) Efficient and Generic Transformations for Chosen-Ciphertext Secure Predicate Encryption Marloes Venema, Leon Botros
2022/1435 (PDF ) Eagle: Efficient Privacy Preserving Smart Contracts Carsten Baum, James Hsin-yu Chiang, Bernardo David, Tore Kasper Frederiksen
2022/1434 (PDF ) Weightwise almost perfectly balanced functions: secondary constructions for all $n$ and better weightwise nonlinearities Agnese Gini, Pierrick Méaux
2022/1433 (PDF ) BG: A Modular Treatment of BFT Consensus Xiao Sui, Sisi Duan, Haibin Zhang
2022/1432 (PDF ) A Lattice-based Ring Signature Scheme Secure against Key Exposure Xiaoling Yu, Yuntao Wang
2022/1431 (PDF ) Half-Tree: Halving the Cost of Tree Expansion in COT and DPF Xiaojie Guo, Kang Yang, Xiao Wang, Wenhao Zhang, Xiang Xie, Jiang Zhang, Zheli Liu
2022/1430 (PDF ) Indistinguishability Obfuscation via Mathematical Proofs of Equivalence Abhishek Jain, Zhengzhong Jin
2022/1429 (PDF ) Collusion Resistant Copy-Protection for Watermarkable Functionalities Jiahui Liu, Qipeng Liu, Luowen Qian, Mark Zhandry
2022/1428 (PDF ) TrustBoost: Boosting Trust among Interoperable Blockchains Xuechao Wang, Peiyao Sheng, Sreeram Kannan, Kartik Nayak, Pramod Viswanath
2022/1427 (PDF ) Improved Quantum Analysis of SPECK and LowMC (Full Version) Kyungbae Jang, Anubhab Baksi, Hyunji Kim, Hwajeong Seo, Anupam Chattopadhyay
2022/1426 (PDF ) Decentralized Anonymous IoT Data Sharing with Key-Private Proxy Re-Encryption Esra Günsay, Oğuz Yayla
2022/1425 (PDF ) Towards Automating Cryptographic Hardware Implementations: a Case Study of HQC Carlos Aguilar-Melchor, Jean-Christophe Deneuville, Arnaud Dion, James Howe, Romain Malmain, Vincent Migliore, Mamuri Nawan, Kashif Nawaz
2022/1424 (PDF ) DeFi That Defies: Imported Off-Chain Metrics and Pseudonymous On-Chain Activity David W. Kravitz, Mollie Z. Halverson
2022/1423 (PDF ) The Superlinearity Problem in Post-Quantum Blockchains Sunoo Park, Nicholas Spooner
2022/1422 (PDF ) Unlinkable Policy-based Sanitizable Signatures Ismail Afia, Riham AlTawy
2022/1421 (PDF ) Transparent Batchable Time-lock Puzzles and Applications to Byzantine Consensus Shravan Srinivasan, Julian Loss, Giulio Malavolta, Kartik Nayak, Charalampos Papamanthou, Sri AravindaKrishnan Thyagarajan
2022/1420 (PDF ) Diamonds are Forever, Loss-Versus-Rebalancing is Not Conor McMenamin, Vanesa Daza, Bruno Mazorra
2022/1419 (PDF ) Speed-Stacking: Fast Sublinear Zero-Knowledge Proofs for Disjunctions Aarushi Goel, Mathias Hall-Andersen, Gabriel Kaptchuk, Nicholas Spooner
2022/1418 (PDF ) Da Yan Concentrator and Extender of Random Data (DYCE) Anna M. Johnston, Puru Kulkarni
2022/1417 (PDF ) Efficient Dynamic Proof of Retrievability for Cold Storage Tung Le, Pengzhi Huang, Attila A. Yavuz, Elaine Shi, Thang Hoang
2022/1416 (PDF ) Side-Channel Attack Countermeasures Based On Clock Randomization Have a Fundamental Flaw Martin Brisfors, Michail Moraitis, Elena Dubrova
2022/1415 (PDF ) FABEO: Fast Attribute-Based Encryption with Optimal Security Doreen Riepel, Hoeteck Wee
2022/1414 (PDF ) INT-RUP Security of SAEB and TinyJAMBU Nilanjan Datta, Avijit Dutta, Shibam Ghosh
2022/1413 (PDF ) How to Compress Encrypted Data Nils Fleischhacker, Kasper Green Larsen, Mark Simkin
2022/1412 (PDF ) Boolean Polynomial Evaluation for the Masses Charles Bouillaguet
2022/1411 (PDF ) Cryptographic Administration for Secure Group Messaging David Balbás, Daniel Collins, Serge Vaudenay
2022/1410 (PDF ) Breaking and Protecting the Crystal: Side-Channel Analysis of Dilithium in Hardware Hauke Steffen, Georg Land, Lucie Kogelheide, Tim Güneysu
2022/1409 (PDF ) SNARGs and PPAD Hardness from the Decisional Diffie-Hellman Assumption Yael Tauman Kalai, Alex Lombardi, Vinod Vaikuntanathan
2022/1408 (PDF ) BRAKE: Biometric Resilient Authenticated Key Exchange Pia Bauspieß, Tjerand Silde, Alexandre Tullot, Anamaria Costache, Christian Rathgeb, Jascha Kolberg, Christoph Busch
2022/1407 (PDF ) Threshold Linear Secret Sharing to the Rescue of MPC-in-the-Head Thibauld Feneuil, Matthieu Rivain
2022/1406 (PDF ) Leveling Dilithium against Leakage: Revisited Sensitivity Analysis and Improved Implementations Melissa Azouaoui, Olivier Bronchain, Gaëtan Cassiers, Clément Hoffmann, Yulia Kuzovkova, Joost Renes, Markus Schönauer, Tobias Schneider, François-Xavier Standaert, Christine van Vredendaal
2022/1405 (PDF ) Subverting Deniability Marcel Armour, Elizabeth A. Quaglia
2022/1404 (PDF ) Reducing an LWE Instance by Modular Hints and its Applications to Primal Attack, Dual Attack and BKW Attack Han Wu, Xiaoyun Wang, Guangwu Xu
2022/1403 (PDF ) On the Dual Attack of LWE Schemes in the Presence of Hints Han Wu, Xiaoyun Wang, Guangwu Xu
2022/1402 (PDF ) Sorting Attacks Resilient Authentication Protocol for CMOS Image Sensor Based PUF Chandan Kumar, Mahendra Rathor, Urbi Chatterjee
2022/1401 (PDF ) PIRANA: Faster (Multi-query) PIR via Constant-weight Codes Jian Liu, Jingyu Li, Di Wu, Kui Ren
2022/1400 (PDF ) EdMSM: Multi-Scalar-Multiplication for recursive SNARKs and more Youssef El Housni, Gautam Botrel
2022/1399 (PDF ) Low-latency implementation of the GIFT cipher on RISC-V architectures Gheorghe Pojoga, Kostas Papagiannopoulos
2022/1398 (PDF ) MILP-aided Cryptanalysis of the FUTURE Block Cipher Murat Burhan İlter, Ali Aydin Selcuk
2022/1397 (PDF ) Synchronous Perfectly Secure Message Transmission with Optimal Asynchronous Fallback Guarantees Giovanni Deligios, Chen-Da Liu-Zhang
2022/1396 (PDF ) FPGA Acceleration of Multi-Scalar Multiplication: CycloneMSM Kaveh Aasaraai, Don Beaver, Emanuele Cesena, Rahul Maganti, Nicolas Stalder, Javier Varela
2022/1395 (PDF ) Non-Interactive Anonymous Router with Quasi-Linear Router Computation Rex Fernando, Elaine Shi, Pratik Soni, Nikhil Vanjani
2022/1394 (PDF ) Risky Translations: Securing TLBs against Timing Side Channels Florian Stolz, Jan Philipp Thoma, Pascal Sasdrich, Tim Güneysu
2022/1393 (PDF ) Efficient Zero-Knowledge Proofs on Signed Data with Applications to Verifiable Computation on Data Streams Dario Fiore, Ida Tucker
2022/1392 (PDF ) A Faster Third-Order Masking of Lookup Tables Anju Alexander, Annapurna Valiveti, Srinivas Vivek
2022/1391 (PDF ) Efficient Noise Generation Protocols for Differentially Private Multiparty Computation Reo Eriguchi, Atsunori Ichikawa, Noboru Kunihiro, Koji Nuida
2022/1390 (PDF ) Multiplicative and Verifiably Multiplicative Secret Sharing for Multipartite Adversary Structures Reo Eriguchi, Noboru Kunihiro, Koji Nuida
2022/1389 (PDF ) Practical Asynchronous High-threshold Distributed Key Generation and Distributed Polynomial Sampling Sourav Das, Zhuolun Xiang, Lefteris Kokoris-Kogias, Ling Ren
2022/1388 (PDF ) MIPS Assembly Language Implementation of GIFT-64-128 Encryption William Diehl
2022/1387 (PDF ) AIM: Symmetric Primitive for Shorter Signatures with Stronger Security Seongkwang Kim, Jincheol Ha, Mincheol Son, Byeonghak Lee, Dukjae Moon, Joohee Lee, Sangyub Lee, Jihoon Kwon, Jihoon Cho, Hyojin Yoon, Jooyoung Lee
2022/1386 (PDF ) A multivariate noise-free HE proposal Gerald Gavin, Sandrine Tainturier
2022/1385 (PDF ) Deep Reinforcement Learning-based Rebalancing Policies for Profit Maximization of Relay Nodes in Payment Channel Networks Nikolaos Papadis, Leandros Tassiulas
2022/1384 (PDF ) Non-uniformity and Quantum Advice in the Random Oracle Model Qipeng Liu
2022/1383 (PDF ) Sublinear-round Broadcast without trusted setup against dishonest majority Andreea B. Alexandru, Julian Loss, Charalampos Papamanthou, Giorgos Tsimos
2022/1382 (PDF ) Quagmire ciphers, group theory, and information: Key amplification in crib-based attacks Thomas Kaeding
2022/1381 (PDF ) How to backdoor LWE-like cryptosystems Tobias Hemmert
2022/1380 (PDF ) Post-Quantum Zero-Knowledge with Space-Bounded Simulation Prabhanjan Ananth, Alex B. Grilo
2022/1379 (PDF ) Zero-Knowledge Optimal Monetary Policy under Stochastic Dominance David Cerezo Sánchez
2022/1378 (PDF ) A Fast Hash Family for Memory Integrity Qiming Li, Sampo Sovio
2022/1377 (PDF ) Improved Differential and Linear Trail Bounds for ASCON Solane El Hirch, Silvia Mella, Alireza Mehrdad, Joan Daemen
2022/1376 (PDF ) Modeling Effective Lifespan of Payment Channels Soheil Zibakhsh Shabgahi, Seyed Mahdi Hosseini, Seyed Pooya Shariatpanahi, Behnam Bahrak
2022/1375 (PDF ) From the Hardness of Detecting Superpositions to Cryptography: Quantum Public Key Encryption and Commitments Minki Hhan, Tomoyuki Morimae, Takashi Yamakawa
2022/1374 (PDF ) Efficient Public Key Searchable Encryption Schemes from Standard Hard Lattice Problems for Cloud Computing Lijun Qi, Jincheng Zhuang
2022/1373 (PDF ) ZKBdf: A ZKBoo-based Quantum-Secure Verifiable Delay Function with Prover-secret Teik Guan Tan, Vishal Sharma, Zengpeng Li, Pawel Szalachowski, Jianying Zhou
2022/1372 (PDF ) Security and Quantum Computing: An Overview Prasannna Ravi, Anupam Chattopadhyay, Shivam Bhasin
2022/1371 (PDF ) On the Security of KOS Benjamin E. Diamond
2022/1370 (PDF ) A New Post-Quantum Key Agreement Protocol and Derived Cryptosystem Based on Rectangular Matrices Hugo Daniel Scolnik, Juan Pedro Hecht
2022/1369 (PDF ) Network-Agnostic Security Comes for Free in DKG and MPC Renas Bacho, Daniel Collins, Chen-Da Liu-Zhang, Julian Loss
2022/1368 (PDF ) Functional Commitments for All Functions, with Transparent Setup and from SIS Leo de Castro, Chris Peikert
2022/1367 (PDF ) Agile Cryptography: A Composable Approach Christian Badertscher, Michele Ciampi, Aggelos Kiayias
2022/1366 (PDF ) Two remarks on the vectorization problem Wouter Castryck, Natan Vander Meeren
2022/1365 (PDF ) Functional Commitments for Circuits from Falsifiable Assumptions David Balbás, Dario Catalano, Dario Fiore, Russell W. F. Lai
2022/1364 (PDF ) On Polynomial Functions Modulo $p^e$ and Faster Bootstrapping for Homomorphic Encryption Robin Geelen, Ilia Iliashenko, Jiayi Kang, Frederik Vercauteren
2022/1363 (PDF ) Bootstrapping for BGV and BFV Revisited Robin Geelen, Frederik Vercauteren
2022/1362 (PDF ) ALLOSAUR: Accumulator with Low-Latency Oblivious Sublinear Anonymous credential Updates with Revocations Samuel Jaques, Michael Lodder, Hart Montgomery
2022/1361 (PDF ) Correlation Electromagnetic Analysis on an FPGA Implementation of CRYSTALS-Kyber Rafael Carrera Rodriguez, Florent Bruguier, Emanuele Valea, Pascal Benoit
2022/1360 (PDF ) One for All, All for One: A Unified Evaluation Framework for Univariate DPA Attacks Jiangshan Long, Chenxu Wang, Changhai Ou, Zhu Wang, Yongbin Zhou, Ming Tang
2022/1359 (PDF ) Probabilistic Hash-and-Sign with Retry in the Quantum Random Oracle Model Haruhisa Kosuge, Keita Xagawa
2022/1358 (PDF ) Commitments to Quantum States Sam Gunn, Nathan Ju, Fermi Ma, Mark Zhandry
2022/1357 (PDF ) A Theory of Composition for Differential Obliviousness Mingxun Zhou, Elaine Shi, T-H. Hubert Chan, Shir Maimon
2022/1356 (PDF ) A fully classical LLL algorithm for modules Gabrielle De Micheli, Daniele Micciancio
2022/1355 (PDF ) HyperPlonk: Plonk with Linear-Time Prover and High-Degree Custom Gates Binyi Chen, Benedikt Bünz, Dan Boneh, Zhenfei Zhang
2022/1354 (PDF ) Embracing Hellman: A Simple Proof-of-Space Search consensus algorithm with stable block times using Logarithmic Embargo Marijn F. Stollenga
2022/1353 (PDF ) Anonymous Permutation Routing Paul Bunn, Eyal Kushilevitz, Rafail Ostrovsky
2022/1352 (PDF ) aPlonK : Aggregated PlonK from Multi-Polynomial Commitment Schemes Miguel Ambrona, Marc Beunardeau, Anne-Laure Schmitt, Raphaël R. Toledo
2022/1351 (PDF ) Better Steady than Speedy: Full break of SPEEDY-7-192 Christina Boura, Nicolas David, Rachelle Heim Boissier, Maria Naya-Plasencia
2022/1350 (PDF ) Rai-Choo! Evolving Blind Signatures to the Next Level Lucjan Hanzlik, Julian Loss, Benedikt Wagner
2022/1349 (PDF ) Invertibility of multiple random functions and its application to symmetric ciphers Xiutao Feng, Xiaoshan GAO, Zhangyi WANG, Xiangyong ZENG
2022/1348 (PDF ) ABE for DFA from LWE against Bounded Collusions, Revisited Hoeteck Wee
2022/1347 (PDF ) Trace and Revoke with Optimal Parameters from Polynomial Hardness Shweta Agrawal, Simran Kumari, Anshu Yadav, Shota Yamada
2022/1346 (PDF ) Generic Signature from Noisy Systems Trey Li
2022/1345 (PDF ) Refined Security Estimation for LWE with Hints via a Geometric Approach Dana Dachman-Soled, Huijing Gong, Tom Hanson, Hunter Kippen
2022/1344 (PDF ) Discrete Exponential Equations and Noisy Systems Trey Li
2022/1343 (PDF ) Improved Progressive BKZ with Lattice Sieving Wenwen Xia, Leizhang Wang, GengWang, Dawu Gu, Baocang Wang
2022/1342 (PDF ) Safely Doubling your Block Ciphers for a Post-Quantum World Ritam Bhaumik, André Chailloux, Paul Frixons, María Naya-Plasencia
2022/1341 (PDF ) LaBRADOR: Compact Proofs for R1CS from Module-SIS Ward Beullens, Gregor Seiler
2022/1340 (PDF ) Understanding the Duplex and Its Security Bart Mennink
2022/1339 (PDF ) Stronger and Simpler Updatable Encryption Huanhuan Chen, Yao Jiang Galteland, Kaitai Liang
2022/1338 (PDF ) Privacy-Preserving Authenticated Key Exchange: Stronger Privacy and Generic Constructions Sebastian Ramacher, Daniel Slamanig, Andreas Weninger
2022/1337 (PDF ) How to Enumerate LWE Keys as Narrow as in Kyber/Dilithium Timo Glaser, Alexander May
2022/1336 (PDF ) One-Wayness in Quantum Cryptography Tomoyuki Morimae, Takashi Yamakawa
2022/1335 (PDF ) Revisiting Higher-Order Differential-Linear Attacks from an Algebraic Perspective Kai Hu, Thomas Peyrin, Quan Quan Tan, Trevor Yap
2022/1334 (PDF ) Post-Quantum Signature from Subset Product with Errors Trey Li
2022/1333 (PDF ) Fast Fully Oblivious Compaction and Shuffling Sajin Sasy, Aaron Johnson, Ian Goldberg
2022/1332 (PDF ) On the Classic Protocol for MPC Schnorr Signatures Nikolaos Makriyannis
2022/1331 (PDF ) Additive-Homomorphic Functional Commitments and Applications to Homomorphic Signatures Dario Catalano, Dario Fiore, Ida Tucker
2022/1330 (PDF ) Hybrid Dual and Meet-LWE Attack Lei Bi, Xianhui Lu, Junjie Luo, Kunpeng Wang
2022/1329 (PDF ) New Time-Memory Trade-Offs for Subset Sum -- Improving ISD in Theory and Practice Andre Esser, Floyd Zweydinger
2022/1328 (PDF ) Revisiting Nearest-Neighbor-Based Information Set Decoding Andre Esser
2022/1327 (PDF ) Post-Quantum Public Key Cryptosystem from Subset Product with Errors Trey Li
2022/1326 (PDF ) Survey: Non-malleable code in the split-state model Divesh Aggarwal, Marshall Ball, Maciej Obremski
2022/1325 (PDF ) Efficient and Complete Formulas for Binary Curves Thomas Pornin
2022/1324 (PDF ) Adaptive Multiparty NIKE Venkata Koppula, Brent Waters, Mark Zhandry
2022/1323 (PDF ) On Constructing One-Way Quantum State Generators, and More Shujiao Cao, Rui Xue
2022/1322 (PDF ) Efficient Linkable Ring Signature from Vector Commitment inexplicably named Multratug Anton A. Sokolov
2022/1321 (PDF ) cuZK: Accelerating Zero-Knowledge Proof with A Faster Parallel Multi-Scalar Multiplication Algorithm on GPUs Tao Lu, Chengkun Wei, Ruijing Yu, Yi Chen, Li Wang, Chaochao Chen, Zeke Wang, Wenzhi Chen
2022/1320 (PDF ) Boosting Batch Arguments and RAM Delegation Yael Tauman Kalai, Alex Lombardi, Vinod Vaikuntanathan, Daniel Wichs
2022/1319 (PDF ) Post-Quantum Key Exchange from Subset Product With Errors Trey Li
2022/1318 (PDF ) General Partially Fair Multi-Party Computation with VDFs Bolton Bailey, Andrew Miller, Or Sattath
2022/1317 (PDF ) On the Optimal Succinctness and Efficiency of Functional Encryption and Attribute-Based Encryption Aayush Jain, Huijia Lin, Ji Luo
2022/1316 (PDF ) TurboPack: Honest Majority MPC with Constant Online Communication Daniel Escudero, Vipul Goyal, Antigoni Polychroniadou, Yifan Song
2022/1315 (PDF ) Hitchhiker’s Guide to a Practical Automated TFHE Parameter Setup for Custom Applications Jakub Klemsa
2022/1314 (PDF ) Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses Vincent Cheval, Cas Cremers, Alexander Dax, Lucca Hirschi, Charlie Jacomme, Steve Kremer
2022/1313 (PDF ) Bounded Surjective Quadratic Functions over $\mathbb F_p^n$ for MPC-/ZK-/FHE-Friendly Symmetric Primitives Lorenzo Grassi
2022/1312 (PDF ) Multiple Modular Unique Factorization Domain Subset Product with Errors Trey Li
2022/1311 (PDF ) Fully Adaptive Decentralized Multi-Authority ABE Pratish Datta, Ilan Komargodski, Brent Waters
2022/1310 (PDF ) Power Residue Symbol Order Detecting Algorithm for Subset Product over Algebraic Integers Trey Li
2022/1309 (PDF ) MPC as a service using Ethereum Registry Smart Contracts - dCommon CIP Matt Shams(Anis), Bingsheng Zhang, Justinas Zaliaduonis
2022/1308 (PDF ) Jacobi Symbol Parity Checking Algorithm for Subset Product Trey Li
2022/1307 (PDF ) BLOOM: Bimodal Lattice One-Out-of-Many Proofs and Applications Vadim Lyubashevsky, Ngoc Khanh Nguyen
2022/1306 (PDF ) Single-shuffle Full-open Card-based Protocols Imply Private Simultaneous Messages Protocols Kazumasa Shinagawa, Koji Nuida
2022/1305 (PDF ) Subset Product with Errors over Unique Factorization Domains and Ideal Class Groups of Dedekind Domains Trey Li
2022/1304 (PDF ) Unifying Quantum Verification and Error-Detection: Theory and Tools for Optimisations Theodoros Kapourniotis, Elham Kashefi, Dominik Leichtle, Luka Music, Harold Ollivier
2022/1303 (PDF ) Towards perfect CRYSTALS in Helium Hanno Becker, Fabien Klein
2022/1302 (PDF ) Private Certifier Intersection Bishakh Chandra Ghosh, Sikhar Patranabis, Dhinakaran Vinayagamurthy, Venkatraman Ramakrishna, Krishnasuri Narayanam, Sandip Chakraborty
2022/1300 (PDF ) Garrison: A Novel Watchtower Scheme for Bitcoin Arash Mirzaei, Amin Sakzad, Jiangshan Yu, Ron Steinfeld
2022/1299 (PDF ) Addax: A fast, private, and accountable ad exchange infrastructure Ke Zhong, Yiping Ma, Yifeng Mao, Sebastian Angel
2022/1298 (PDF ) BLEACH: Cleaning Errors in Discrete Computations over CKKS Nir Drucker, Guy Moshkowich, Tomer Pelleg, Hayim Shaul
2022/1297 (PDF ) Toward a Post-Quantum Zero-Knowledge Verifiable Credential System for Self-Sovereign Identity Simone Dutto, Davide Margaria, Carlo Sanna, Andrea Vesco
2022/1296 (PDF ) Efficient Asymmetric Threshold ECDSA for MPC-based Cold Storage Constantin Blokh, Nikolaos Makriyannis, Udi Peled
2022/1295 (PDF ) Daric: A Storage Efficient Payment Channel With Penalization Mechanism Arash Mirzaei, Amin Sakzad, Jiangshan Yu, Ron Steinfeld
2022/1294 (PDF ) What Can Cryptography Do For Decentralized Mechanism Design? Elaine Shi, Hao Chung, Ke Wu
2022/1293 (PDF ) Improving the Efficiency of Report and Trace Ring Signatures Xavier Bultel, Ashley Fraser, Elizabeth A. Quaglia
2022/1292 (PDF ) Bet-or-Pass: Adversarially Robust Bloom Filters Moni Naor, Noa Oved
2022/1291 (PDF ) sMGM: parameterizable AEAD-mode Liliya Akhmetzyanova, Evgeny Alekseev, Alexandra Babueva, Andrey Bozhko, Stanislav Smyshlyaev
2022/1290 (PDF ) Bool Network: An Open, Distributed, Secure Cross-chain Notary Platform Zeyuan Yin, Bingsheng Zhang, Jingzhong Xu, Kaiyu Lu, Kui Ren
2022/1289 (PDF ) Exploring RNS for Isogeny-based Cryptography David Jacquemin, Ahmet Can Mert, Sujoy Sinha Roy
2022/1288 (PDF ) Round-Optimal Black-Box Secure Computation from Two-Round Malicious OT Yuval Ishai, Dakshita Khurana, Amit Sahai, Akshayaram Srinivasan
2022/1287 (PDF ) On a Conjecture From a Failed CryptoAnalysis Shengtong Zhang
2022/1286 (PDF ) ZEBRA: Anonymous Credentials with Practical On-chain Verification and Applications to KYC in DeFi Deevashwer Rathee, Guru Vamsi Policharla, Tiancheng Xie, Ryan Cottone, Dawn Song
2022/1285 (PDF ) Lower Bounds for the Number of Decryption Updates in Registration-Based Encryption Mohammad Mahmoody, Wei Qi, Ahmadreza Rahimi
2022/1284 (PDF ) (Inner-Product) Functional Encryption with Updatable Ciphertexts Valerio Cini, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks, Erkan Tairi
2022/1283 (PDF ) A Note on Reimplementing the Castryck-Decru Attack and Lessons Learned for SageMath Rémy Oudompheng, Giacomo Pope
2022/1282 (PDF ) Comparing Key Rank Estimation Methods Rebecca Young, Luke Mather, Elisabeth Oswald
2022/1281 (PDF ) LARP: A Lightweight Auto-Refreshing Pseudonym Protocol for V2X Zheng Yang, Tien Tuan Anh Dinh, Chao Yin, Yingying Yao, Dianshi Yang, Xiaolin Chang, Jianying Zhou
2022/1280 (PDF ) Group Time-based One-time Passwords and its Application to Efficient Privacy-Preserving Proof of Location Zheng Yang, Chenglu Jin, Jianting Ning, Zengpeng Li, Tien Tuan Anh Dinh, Jianying Zhou
2022/1279 (PDF ) Improved Neural Distinguishers with Multi-Round and Multi-Splicing Construction Jiashuo Liu, Jiongjiong Ren, Shaozhen Chen, ManMan Li
2022/1278 (PDF ) Fast Evaluation of S-boxes with Garbled Circuits Erik Pohle, Aysajan Abidin, Bart Preneel
2022/1277 (PDF ) Compact GF(2) systemizer and optimized constant-time hardware sorters for Key Generation in Classic McEliece Yihong Zhu, Wenping Zhu, Chen Chen, Min Zhu, Zhengdong Li, Shaojun Wei, Leibo Liu
2022/1276 (PDF ) Second-Order Low-Randomness $d+1$ Hardware Sharing of the AES Siemen Dhooghe, Aein Rezaei Shahmirzadi, Amir Moradi
2022/1275 (PDF ) DiAE: Re-rolling the DiSE Alexandre Duc, Robin Müller, Damian Vizár
2022/1274 (PDF ) Self Masking for Hardering Inversions Paweł Cyprys, Shlomi Dolev, Shlomo Moran
2022/1273 (PDF ) A Conjecture From a Failed Cryptanalysis David Naccache, Ofer Yifrach-Stav
2022/1272 (PDF ) PPAD is as Hard as LWE and Iterated Squaring Nir Bitansky, Arka Rai Choudhuri, Justin Holmgren, Chethan Kamath, Alex Lombardi, Omer Paneth, Ron D. Rothblum
2022/1271 (PDF ) Privacy-preserving Federated Singular Value Decomposition Bowen LIU, Qiang TANG
2022/1270 (PDF ) Typing High-Speed Cryptography against Spectre v1 Basavesh Ammanaghatta Shivakumar, Gilles Barthe, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, Swarn Priya, Peter Schwabe, Lucas Tabary-Maujean
2022/1269 (PDF ) Collusion-Resistant Functional Encryption for RAMs Prabhanjan Ananth, Kai-Min Chung, Xiong Fan, Luowen Qian
2022/1268 (PDF ) Cryptographic Role-Based Access Control, Reconsidered Bin Liu, Antonis Michalas, Bogdan Warinschi
2022/1266 (PDF ) Asymptotically Free Broadcast in Constant Expected Time via Packed VSS Ittai Abraham, Gilad Asharov, Shravani Patil, Arpita Patra
2022/1265 (PDF ) Universal Ring Signatures in the Standard Model Pedro Branco, Nico Döttling, Stella Wohnig
2022/1264 (PDF ) Rotatable Zero Knowledge Sets: Post Compromise Secure Auditable Dictionaries with application to Key Transparency Brian Chen, Yevgeniy Dodis, Esha Ghosh, Eli Goldin, Balachandar Kesavan, Antonio Marcedone, Merry Ember Mou
2022/1263 (PDF ) Steganography-Free Zero-Knowledge Behzad Abdolmaleki, Nils Fleischhacker, Vipul Goyal, Abhishek Jain, Giulio Malavolta
2022/1262 (PDF ) Vectorized Batch Private Information Retrieval Muhammad Haris Mughees, Ling Ren
2022/1261 (PDF ) Breaking RSA Generically is Equivalent to Factoring, with Preprocessing Dana Dachman-Soled, Julian Loss, Adam O'Neill
2022/1260 (PDF ) On Committing Authenticated Encryption John Chan, Phillip Rogaway
2022/1259 (PDF ) Horizontal racewalking using radical isogenies Wouter Castryck, Thomas Decru, Marc Houben, Frederik Vercauteren
2022/1258 (PDF ) Tightly Secure Chameleon Hash Functions in the Multi-User Setting and Their Applications Xiangyu Liu, Shengli Liu, Dawu Gu
2022/1257 (PDF ) One-Time Programs from Commodity Hardware Harry Eldridge, Aarushi Goel, Matthew Green, Abhishek Jain, Maximilian Zinkus
2022/1256 (PDF ) EvalRound Algorithm in CKKS Bootstrapping Seonghak Kim, Minji Park, Jaehyung Kim, Taekyung Kim, Chohong Min
2022/1255 (PDF ) An ECDSA Nullifier Scheme for Unique Pseudonymity within Zero Knowledge Proofs Aayush Gupta, Kobi Gurkan
2022/1254 (PDF ) Protecting the most significant bits in scalar multiplication algorithms Estuardo Alpirez Bock, Lukasz Chmielewski, Konstantina Miteloudi
2022/1253 (PDF ) A Modular Approach to the Incompressibility of Block-Cipher-Based AEADs Akinori Hosoyamada, Takanori Isobe, Yosuke Todo, Kan Yasuda
2022/1252 (PDF ) Functional Encryption with Secure Key Leasing Fuyuki Kitagawa, Ryo Nishimaki
2022/1251 (PDF ) Flashproofs: Efficient Zero-Knowledge Arguments of Range and Polynomial Evaluation with Transparent Setup Nan Wang, Sid Chi-Kin Chau
2022/1250 (PDF ) Eureka: A General Framework for Black-box Differential Privacy Estimators Yun Lu, Yu Wei, Malik Magdon-Ismail, Vassilis Zikas
2022/1249 (PDF ) On Rejection Sampling in Lyubashevsky's Signature Scheme Julien Devevey, Omar Fawzi, Alain Passelègue, Damien Stehlé
2022/1248 (PDF ) Fully-Secure MPC with Minimal Trust Yuval Ishai, Arpita Patra, Sikhar Patranabis, Divya Ravi, Akshayaram Srinivasan
2022/1247 (PDF ) Peek into the Black-Box: Interpretable Neural Network using SAT Equations in Side-Channel Analysis Trevor Yap, Adrien Benamira, Shivam Bhasin, Thomas Peyrin
2022/1246 (PDF ) Identity-Based Matchmaking Encryption from Standard Assumptions Jie Chen, Yu Li, Jinming Wen, Jian Weng
2022/1245 (PDF ) On Generalizations of the Lai-Massey Scheme: the Blooming of Amaryllises Lorenzo Grassi
2022/1244 (PDF ) A Modular Approach to the Security Analysis of Two-Permutation Constructions Yu Long Chen
2022/1243 (PDF ) Hybrid scalar/vector implementations of Keccak and SPHINCS+ on AArch64 Hanno Becker, Matthias J. Kannwischer
2022/1242 (PDF ) Data Protection Law and Multi-Party Computation: Applications to Information Exchange between Law Enforcement Agencies Amos Treiber, Dirk Müllmann, Thomas Schneider, Indra Spiecker genannt Döhmann
2022/1241 (PDF ) Continued Fractions Applied to a Family of RSA-like Cryptosystems George Teseleanu, Paul Cotan
2022/1240 (PDF ) Sherlock Holmes Zero-Knowledge Protocols George Teseleanu
2022/1239 (PDF ) Improving Bounds on Elliptic Curve Hidden Number Problem for ECDH Key Exchange Jun Xu, Santanu Sarkar, Huaxiong Wang, Lei Hu
2022/1238 (PDF ) Secure Quantum Bit Commitment Ping Wang, Yiting Su, Fangguo Zhang
2022/1237 (PDF ) On the Worst-Case Inefficiency of CGKA Alexander Bienstock, Yevgeniy Dodis, Sanjam Garg, Garrison Grogan, Mohammad Hajiabadi, Paul Rösler
2022/1236 (PDF ) Rate-1 Non-Interactive Arguments for Batch-NP and Applications Lalita Devadas, Rishab Goyal, Yael Kalai, Vinod Vaikuntanathan
2022/1235 (PDF ) QCCA-Secure Generic Transformations in the Quantum Random Oracle Model Tianshu Shan, Jiangxia Ge, Rui Xue
2022/1234 (PDF ) Towards Tight Security Bounds for OMAC, XCBC and TMAC Soumya Chattopadhyay, Ashwin Jha, Mridul Nandi
2022/1233 (PDF ) Forward-Secure Encryption with Fast Forwarding Yevgeniy Dodis, Daniel Jost, Harish Karthikeyan
2022/1232 (PDF ) The Abe-Okamoto Partially Blind Signature Scheme Revisited Julia Kastner, Julian Loss, Jiayu Xu
2022/1231 (PDF ) Continuously Non-Malleable Codes against Bounded-Depth Tampering Gianluca Brian, Sebastian Faust, Elena Micheli, Daniele Venturi
2022/1230 (PDF ) Group Action Key Encapsulation and Non-Interactive Key Exchange in the QROM Julien Duman, Dominik Hartmann, Eike Kiltz, Sabrina Kunzweiler, Jonas Lehmann, Doreen Riepel
2022/1229 (PDF ) Cumulatively All-Lossy-But-One Trapdoor Functions from Standard Assumptions Benoît Libert, Ky Nguyen, Alain Passelègue
2022/1228 (PDF ) SCARF: A Low-Latency Block Cipher for Secure Cache-Randomization Federico Canale, Tim Güneysu, Gregor Leander, Jan Thoma, Yosuke Todo, Rei Ueno
2022/1227 (PDF ) How to Sample a Discrete Gaussian (and more) from a Random Oracle George Lu, Brent Waters
2022/1226 (PDF ) Algebraic Relation of Three MinRank Algebraic Modelings Hao Guo, Jintai Ding
2022/1225 (PDF ) Hybrid Post-Quantum Signatures in Hardware Security Keys Diana Ghinea, Fabian Kaczmarczyck, Jennifer Pullman, Julien Cretin, Stefan Kölbl, Rafael Misoczki, Jean-Michel Picod, Luca Invernizzi, Elie Bursztein
2022/1224 (PDF ) From Plaintext-extractability to IND-CCA Security Ehsan Ebrahimi
2022/1223 (PDF ) Efficient Proofs of Software Exploitability for Real-world Processors Matthew Green, Mathias Hall-Andersen, Eric Hennenfent, Gabriel Kaptchuk, Benjamin Perez, Gijs Van Laer
2022/1222 (PDF ) Homomorphic Encryption on GPU Ali Şah Özcan, Can Ayduman, Enes Recep Türkoğlu, Erkay Savaş
2022/1221 (PDF ) Multi-User Security of the Sum of Truncated Random Permutations (Full Version) Wonseok Choi, Hwigyeom Kim, Jooyoung Lee, Yeongmin Lee
2022/1220 (PDF ) Permissionless Clock Synchronization with Public Setup Juan Garay, Aggelos Kiayias, Yu Shen
2022/1219 (PDF ) Anonymous Random Allocation and Its Applications Azam Soleimanian
2022/1218 (PDF ) Stretching Cube Attacks: Improved Methods to Recover Massive Superpolies Jiahui He, Kai Hu, Bart Preneel, Meiqin Wang
2022/1217 (PDF ) Privacy-Preserving Authenticated Key Exchange in the Standard Model You Lyu, Shengli Liu, Shuai Han, Dawu Gu
2022/1216 (PDF ) A summary on the FRI low degree test Ulrich Haböck
2022/1215 (PDF ) Continuous Authentication in Secure Messaging Benjamin Dowling, Felix Günther, Alexandre Poirrier
2022/1214 (PDF ) Updatable NIZKs from Non-Interactive Zaps Karim Baghery, Navid Ghaedi Bardeh
2022/1213 (PDF ) Nostradamus goes Quantum Barbara Jiabao Benedikt, Marc Fischlin, Moritz Huppert
2022/1212 (PDF ) VoteXX: A Solution to Improper Influence in Voter-Verifiable Elections David Chaum, Richard T. Carback, Jeremy Clark, Chao Liu, Mahdi Nejadgholi, Bart Preneel, Alan T. Sherman, Mario Yaksetig, Zeyuan Yin, Filip Zagórski, Bingsheng Zhang
2022/1211 (PDF ) Arithmetization of Functional Program Execution via Interaction Nets in Halo 2 Anthony Hart
2022/1210 (PDF ) On the Field-Based Division Property: Applications to MiMC, Feistel MiMC and GMiMC (Full Version) Jiamin Cui, Kai Hu, Meiqin Wang, Puwen Wei
2022/1209 (PDF ) Puncturable Key Wrapping and Its Applications Matilda Backendal, Felix Günther, Kenneth G. Paterson
2022/1208 (PDF ) Notes on Reusable Garbling Hu Yupu, Dong Siyue, Wang Baocang, Liu Jun
2022/1207 (PDF ) Attaining GOD Beyond Honest Majority With Friends and Foes Aditya Hegde, Nishat Koti, Varsha Bhat Kukkala, Shravani Patil, Arpita Patra, Protik Paul
2022/1206 (PDF ) On the Optimal Communication Complexity of Error-Correcting Multi-Server PIR Reo Eriguchi, Kaoru Kurosawa, Koji Nuida
2022/1205 (PDF ) Accountable Light Client Systems for PoS Blockchains Oana Ciobotaru, Fatemeh Shirazi, Alistair Stewart, Sergey Vasilyev
2022/1204 (PDF ) The Pseudorandom Oracle Model and Ideal Obfuscation Aayush Jain, Huijia Lin, Ji Luo, Daniel Wichs
2022/1203 (PDF ) On Module Unique-SVP and NTRU Joël Felderhoff, Alice Pellet-Mary, Damien Stehlé
2022/1202 (PDF ) Disorientation faults in CSIDH Gustavo Banegas, Juliane Krämer, Tanja Lange, Michael Meyer, Lorenz Panny, Krijn Reijnders, Jana Sotáková, Monika Trimoska
2022/1201 (PDF ) Consistent, Efficient and Leakage-Model Free Mutual Information Estimation Arnab Roy, Aakash Chowdhury, Elisabeth Oswald
2022/1200 (PDF ) SEEK: model extraction attack against hybrid secure inference protocols Si Chen, Junfeng Fan
2022/1199 (PDF ) Structure Evaluation of AES-like Ciphers against Mixture Differential Cryptanalysis Xiaofeng Xie, Tian Tian
2022/1198 (PDF ) To Be, or Not to Be Stateful: Post-Quantum Secure Boot using Hash-Based Signatures Alexander Wagner, Felix Oberhansl, Marc Schink
2022/1197 (PDF ) On Squaring Modulo Mersenne Numbers David Naccache, Ofer Yifrach-Stav
2022/1196 (PDF ) Embedded Identity Traceable Identity-Based IPFE from Pairings and Lattices Subhranil Dutta, Tapas Pal, Amit Kumar Singh, Sourav Mukhopadhyay
2022/1195 (PDF ) A Deep Neural Differential Distinguisher for ARX based Block Cipher Debranjan Pal, Upasana Mandal, Mainak Chaudhury, Abhijit Das, Dipanwita Roy Chowdhury
2022/1194 (PDF ) Multi-Authority ABE from Lattices without Random Oracles Brent Waters, Hoeteck Wee, David J. Wu
2022/1193 (PDF ) Knowledge Encryption and Its Applications to Simulatable Protocols With Low Round-Complexity Yi Deng, Xinxuan Zhang
2022/1192 (PDF ) (Augmented) Broadcast Encryption from Identity Based Encryption with Wildcard Anaïs Barthoulot, Olivier Blazy, Sébastien Canard
2022/1191 (PDF ) A New Framework for Quantum Oblivious Transfer Amit Agarwal, James Bartusek, Dakshita Khurana, Nishant Kumar
2022/1190 (PDF ) Statistical Security in Two-Party Computation Revisited Saikrishna Badrinarayanan, Sikhar Patranabis, Pratik Sarkar
2022/1189 (PDF ) CSI-SharK: CSI-FiSh with Sharing-friendly Keys Shahla Atapoor, Karim Baghery, Daniele Cozzo, Robi Pedersen
2022/1188 (PDF ) High-order masking of NTRU Jean-Sebastien Coron, François Gérard, Matthias Trannoy, Rina Zeitoun
2022/1187 (PDF ) Strongly Anonymous Ratcheted Key Exchange Benjamin Dowling, Eduard Hauck, Doreen Riepel, Paul Rösler
2022/1186 (PDF ) Adversarial Correctness and Privacy for Probabilistic Data Structures Mia Filić, Kenneth G. Paterson, Anupama Unnikrishnan, Fernando Virdia
2022/1185 (PDF ) PEA: Practical private epistasis analysis using MPC Kay Hamacher, Tobias Kussel, Thomas Schneider, Oleksandr Tkachenko
2022/1184 (PDF ) On digital signatures based on isomorphism problems: QROM security, ring signatures, and implementations Markus Bläser, Zhili Chen, Dung Hoang Duong, Antoine Joux, Ngoc Tuong Nguyen, Thomas Plantard, Youming Qiao, Willy Susilo, Gang Tang
2022/1183 (PDF ) Fast and Efficient Hardware Implementation of HQC Sanjay Deshpande, Chuanqi Xu, Mamuri Nawan, Kashif Nawaz, Jakub Szefer
2022/1182 (PDF ) Machine-Checked Proofs of Privacy Against Malicious Boards for Selene & Co Constantin Cătălin Drăgan, François Dupressoir, Ehsan Estaji, Kristian Gjøsteen, Thomas Haines, Peter Y. A. Ryan, Peter B. Rønne, Morten Rotvold Solberg
2022/1181 (PDF ) On the computational hardness needed for quantum cryptography Zvika Brakerski, Ran Canetti, Luowen Qian
2022/1180 (PDF ) Cryptographic multilinear maps using pro-p groups Delaram Kahrobaei, Mima Stanojkovski
2022/1179 (PDF ) Trustless Cross-chain Communication for Zendoo Sidechains Alberto Garoffolo, Dmytro Kaidalov, Roman Oliynykov
2022/1178 (PDF ) Cryptography with Certified Deletion James Bartusek, Dakshita Khurana
2022/1177 (PDF ) Liberating TFHE: Programmable Bootstrapping with General Quotient Polynomials Marc Joye, Michael Walter
2022/1176 (PDF ) Anonymous Public Key Encryption under Corruptions Zhengan Huang, Junzuo Lai, Shuai Han, Lin Lyu, Jian Weng
2022/1174 (PDF ) Ibex: Privacy-preserving ad conversion tracking and bidding (full version) Ke Zhong, Yiping Ma, Sebastian Angel
2022/1173 (PDF ) Secure Maximum Weight Matching Approximation on General Graphs (Full Version) Andreas Brüggemann, Malte Breuer, Andreas Klinger, Thomas Schneider, Ulrike Meyer
2022/1172 (PDF ) On the Security of Keyed Hashing Based on Public Permutations Jonathan Fuchs, Yann Rotella, Joan Daemen
2022/1171 (PDF ) No More Attacks on Proof-of-Stake Ethereum? Francesco D'Amato, Joachim Neu, Ertem Nusret Tas, David Tse
2022/1170 (PDF ) TRIFORS: LINKable Trilinear Forms Ring Signature Giuseppe D'Alconzo, Andrea Gangemi
2022/1169 (PDF ) DyCAPS: Asynchronous Proactive Secret Sharing for Dynamic Committees Bin Hu, Zongyang Zhang, Han Chen, You Zhou, Huazu Jiang, Jianwei Liu
2022/1168 (PDF ) Multi-Input Quadratic Functional Encryption: Stronger Security, Broader Functionality Shweta Agrawal, Rishab Goyal, Junichi Tomida
2022/1167 (PDF ) META-BTS: Bootstrapping Precision Beyond the Limit Youngjin Bae, Jung Hee Cheon, Wonhee Cho, Jaehyung Kim, Taekyung Kim
2022/1166 (PDF ) McEliece-type encryption based on Gabidulin codes with no hidden structure Wenshuo Guo, Fang-Wei Fu
2022/1165 (PDF ) A Subexponential Quantum Algorithm for the Semidirect Discrete Logarithm Problem Christopher Battarbee, Delaram Kahrobaei, Ludovic Perret, Siamak F. Shahandashti
2022/1164 (PDF ) Point-Halving and Subgroup Membership in Twisted Edwards Curves Thomas Pornin
2022/1163 (PDF ) A Third is All You Need: Extended Partial Key Exposure Attack on CRT-RSA with Additive Exponent Blinding Yuanyuan Zhou, Joop van de Pol, Yu Yu, François-Xavier Standaert
2022/1162 (PDF ) Pairings in Rank-1 Constraint Systems Youssef El Housni
2022/1161 (PDF ) Group-based Cryptography in the Quantum Era Delaram Kahrobaei, Ramón Flores, Marialaura Noce
2022/1160 (PDF ) The Scholz conjecture on addition chain is true for $v(n)= 4$ Amadou TALL
2022/1159 (PDF ) Decomposing Linear Layers Christof Beierle, Patrick Felke, Gregor Leander, Sondre Rønjom
2022/1158 (PDF ) Differential Cryptanalysis of K-Cipher Mohammad Mahzoun, Liliya Kraleva, Raluca Posteuca, Tomer Ashur
2022/1157 (PDF ) Classically Verifiable NIZK for QMA with Preprocessing Tomoyuki Morimae, Takashi Yamakawa
2022/1156 (PDF ) On the security of data markets: controlled Private Function Evaluation István Vajda
2022/1155 (PDF ) Hawk: Module LIP makes Lattice Signatures Fast, Compact and Simple Léo Ducas, Eamonn W. Postlethwaite, Ludo N. Pulles, Wessel van Woerden
2022/1154 (PDF ) Efficient Constant-Time Implementation of SM4 with Intel GFNI instruction set extension and Arm NEON coprocessor Weiji Guo
2022/1153 (PDF ) Sharp: Short Relaxed Range Proofs Geoffroy Couteau, Dahmun Goudarzi, Michael Klooß, Michael Reichle
2022/1152 (PDF ) Fully Collusion Resistant Trace-and-Revoke Functional Encryption for Arbitrary Identities Fucai Luo, Saif Al-Kuwari, Haiyan Wang, Xingfu Yan
2022/1151 (PDF ) A Survey on Exotic Signatures for Post-Quantum Blockchain: Challenges & Research Directions Maxime Buser, Rafael Dowsley, Muhammed F. Esgin, Clémentine Gritti, Shabnam Kasra Kermanshahi, Veronika Kuchta, Jason T. LeGrow, Joseph K. Liu, Raphael C.-W. Phan, Amin Sakzad, Ron Steinfeld, Jiangshan Yu
2022/1150 (PDF ) Farasha: A Provable Permutation-based Parallelizable PRF Najwa Aaraj, Emanuele Bellin, Ravindra Jejurikar, Marc Manzano, Raghvendra Rohit, Eugenio Salazar
2022/1149 (PDF ) Secure Anycast Channels with Applications to 4G and 5G Handovers Karl Norrman
2022/1148 (PDF ) On Security Against Time Traveling Adversaries Lúcás Críostóir Meier
2022/1147 (PDF ) Finding the Impossible: Automated Search for Full Impossible Differential, Zero-Correlation, and Integral Attacks Hosein Hadipour, Sadegh Sadeghi, Maria Eichlseder
2022/1146 (PDF ) A Sponge-Based PRF with Good Multi-user Security Arghya Bhattacharjee, Ritam Bhaumik, Mridul Nandi
2022/1145 (PDF ) Yafa-108/146: Implementing ed25519-embedding Cocks-Pinch curves in arkworks-rs Rami Akeela, Weikeng Chen
2022/1144 (PDF ) On the Higher bit Version of Approximate Inhomogeneous Short Integer Solution Problem Anaëlle Le Dévéhat, Hiroki Shizuya, Shingo Hasegawa
2022/1143 (PDF ) Threshold Linearly Homomorphic Encryption on $\mathbf{Z}/2^k\mathbf{Z}$ Guilhem Castagnos, Fabien Laguillaumie, Ida Tucker
2022/1142 (PDF ) Secure Message Authentication in the Presence of Leakage and Faults Francesco Berti, Chun Guo, Thomas Peters, Yaobin Shen, François-Xavier Standaert
2022/1141 (PDF ) An Optimal Universal Construction for the Threshold Implementation of Bijective S-boxes Enrico Piccione, Samuele Andreoli, Lilya Budaghyan, Claude Carlet, Siemen Dhooghe, Svetla Nikova, George Petrides, Vincent Rijmen
2022/1140 (PDF ) Witness Encryption and Null-IO from Evasive LWE Vinod Vaikuntanathan, Hoeteck Wee, Daniel Wichs
2022/1139 (PDF ) Formal Security Definition of Metadata-Private Messaging Shengtong Zhang, Arvid Lunnemark, Sualeh Asif
2022/1138 (PDF ) Designated-Verifier Linkable Ring Signatures with unconditional anonymity Danai Balla, Pourandokht Behrouz, Panagiotis Grontas, Aris Pagourtzis, Marianna Spyrakou, Giannis Vrettos
2022/1137 (PDF ) Private Computation On Set Intersection With Sublinear Communication Jonas Janneck, Anselme Tueno, Jörn Kußmaul, Matthew Akram
2022/1136 (PDF ) The Tropical Version of ElGamal Encryption Any Muanalifah, Ayus Riana Isnawati
2022/1135 (PDF ) Full Quantum Equivalence of Group Action DLog and CDH, and More Hart Montgomery, Mark Zhandry
2022/1134 (PDF ) An improved method for predicting truncated multiple recursive generators with unknown parameters Han-Bing Yu, Qun-Xiong Zheng, Yi-Jian Liu, Jing-Guo Bi, Yu-Fei Duan, Jing-Wen Xue, You Wu, Yue Cao, Rong Cheng, Lin Wang, Bai-Shun Sun
2022/1133 (PDF ) Secure Batch Deduplication Without Dual Servers in Backup System Haoyu Zheng, Shengke Zeng, Hongwei Li, Zhijun Li
2022/1132 (PDF ) Kryvos: Publicly Tally-Hiding Verifiable E-Voting Nicolas Huber, Ralf Kuesters, Toomas Krips, Julian Liedtke, Johannes Mueller, Daniel Rausch, Pascal Reisert, Andreas Vogt
2022/1131 (PDF ) CINI MINIS: Domain Isolation for Fault and Combined Security Jakob Feldtkeller, Jan Richter-Brockmann, Pascal Sasdrich, Tim Güneysu
2022/1130 (PDF ) Subterm-based proof techniques for improving the automation and scope of security protocol analysis Cas Cremers, Charlie Jacomme, Philip Lukert
2022/1128 (PDF ) On the (im)possibility of ElGamal blind signatures Liliya Akhmetzyanova, Evgeny Alekseev, Alexandra Babueva, Stanislav Smyshlyaev
2022/1127 (PDF ) GUC-Secure Commitments via Random Oracles: New Impossibility and Feasibility Zhelei Zhou, Bingsheng Zhang, Hong-Sheng Zhou, Kui Ren
2022/1126 (PDF ) Explicit infinite families of bent functions outside $\mathcal{MM}^\#$ Enes Pasalic, Amar Bapić, Fengrong Zhang, Yongzhuang Wei
2022/1125 (PDF ) A one-time single-bit fault leaks all previous NTRU-HRSS session keys to a chosen-ciphertext attack Daniel J. Bernstein
2022/1124 (PDF ) Unbounded Quadratic Functional Encryption and More from Pairings Junichi Tomida
2022/1123 (PDF ) DEEPAND: In-Depth Modeling of Correlated AND Gates for NLFSR-based Lightweight Block Ciphers Amit Jana, Mostafizar Rahman, Dhiman Saha
2022/1122 (PDF ) Practical Related-Key Forgery Attacks on the Full TinyJAMBU-192/256 Orr Dunkelman, Eran Lambooij, Shibam Ghosh
2022/1121 (PDF ) Practical Attacks on Full-round FRIET Senpeng wang, Dengguo Feng, Bin Hu, Jie Guan, Tairong Shi
2022/1120 (PDF ) VMEO: Vector Modeling Errors and Operands for Approximate adders Vishesh Mishra, Urbi Chatterjee
2022/1119 (PDF ) PESCA: A Privacy-Enhancing Smart-Contract Architecture Wei Dai
2022/1118 (PDF ) PentaGOD: Stepping beyond Traditional GOD with Five Parties Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal
2022/1117 (PDF ) Two-Round Multi-Signatures from Okamoto Signatures Kwangsu Lee, Hyoseung Kim
2022/1116 (PDF ) Automatic Certified Verification of Cryptographic Programs with COQCRYPTOLINE Ming-Hsien Tsai, Yu-Fu Fu, Xiaomu Shi, Jiaxiang Liu, Bow-Yaw Wang, Bo-Yin Yang
2022/1115 (PDF ) Vizard: A Metadata-hiding Data Analytic System with End-to-End Policy Controls Chengjun Cai, Yichen Zang, Cong Wang, Xiaohua Jia, Qian Wang
2022/1114 (PDF ) Multi-User Dynamic Searchable Symmetric Encryption with Corrupted Participants Javad Ghareh Chamani, Yun Wang, Dimitrios Papadopoulos, Mingyang Zhang, Rasool Jalili
2022/1113 (PDF ) A new algorithm for solving the rSUM problem Valerii Sopin
2022/1112 (PDF ) Ergodic dynamical systems over the Cartesian power of the ring of p-adic integers Valerii Sopin
2022/1111 (PDF ) A tale of two models: formal verification of KEMTLS via Tamarin Sofía Celi, Jonathan Hoyland, Douglas Stebila, Thom Wiggers
2022/1110 (PDF ) Invisible Formula Attacks David Naccache, Ofer Yifrach-Stav
2022/1109 (PDF ) A Note on Copy-Protection from Random Oracles Prabhanjan Ananth, Fatih Kaleoglu
2022/1108 (PDF ) Nonmalleable Digital Lockers and Robust Fuzzy Extractors in the Plain Model Daniel Apon, Chloe Cachet, Benjamin Fuller, Peter Hall, Feng-Hao Liu
2022/1107 (PDF ) Projective Geometry of Hessian Elliptic Curves and Genus 2 Triple Covers of Cubics Rémy Oudompheng
2022/1106 (PDF ) Towards Practical Topology-Hiding Computation Shuaishuai Li
2022/1105 (PDF ) Arithmetization of Σ¹₁ relations with polynomial bounds in Halo 2 Anthony Hart, Morgan Thomas
2022/1104 (PDF ) $\mu$Cash: Transparent Anonymous Transactions Liam Eagen
2022/1103 (PDF ) Speeding-Up Parallel Computation of Large Smooth-Degree Isogeny using Precedence-Constrained Scheduling Kittiphon Phalakarn, Vorapong Suppakitpaisarn, M. Anwar Hasan
2022/1102 (PDF ) Proofs of Quantumness from Trapdoor Permutations Tomoyuki Morimae, Takashi Yamakawa
2022/1101 (PDF ) Solutions to quantum weak coin flipping Atul Singh Arora, Jérémie Roland, Chrysoula Vlachou, Stephan Weis
2022/1100 (PDF ) Short Non-Malleable Codes from Related-Key Secure Block Ciphers, Revisited Gianluca Brian, Antonio Faonio, João Ribeiro, Daniele Venturi
2022/1099 (PDF ) One-Hot Conversion: Towards Faster Table-based A2B Conversion Jan-Pieter D'Anvers
2022/1098 (PDF ) SoK: Security Evaluation of SBox-Based Block Ciphers Joelle Lim, Derrick Ng, Ruth Ng
2022/1097 (PDF ) Post-Quantum Security of the (Tweakable) FX Construction, and Applications Gorjan Alagic, Chen Bai, Jonathan Katz, Christian Majenz, Patrick Struck
2022/1096 (PDF ) TWo-IN-one-SSE: Fast, Scalable and Storage-Efficient Searchable Symmetric Encryption for Conjunctive and Disjunctive Boolean Queries Arnab Bag, Debadrita Talapatra, Ayushi Rastogi, Sikhar Patranabis, Debdeep Mukhopadhyay
2022/1095 (PDF ) Toffoli gate count Optimized Space-Efficient Quantum Circuit for Binary Field Multiplication KIM, SUNYEOP, KIM, INSUNG, Seonggyeom Kim, Seokhie Hong
2022/1094 (PDF ) Secure Integrated Sensing and Communication Onur Gunlu, Matthieu Bloch, Rafael F. Schaefer, Aylin Yener
2022/1093 (PDF ) Efficient Pipelining Exploration for a High-performance CRYSTALS-Kyber Accelerator Ziying Ni, Ayesha Khalid, Dur-e-Shahwar Kundi, Máire O’Neill, Weiqiang Liu
2022/1092 (PDF ) On NTRU-ν-um Modulo $X^N − 1$ Marc Joye
2022/1091 (PDF ) Mul-IBS: A Multivariate Identity-Based Signature Scheme Compatible with IoT-based NDN Architecture Sumit Kumar Debnath, Sihem Mesnager, Vikas Srivastava, Saibal Kumar Pal, Nibedita Kundu
2022/1090 (PDF ) How fast do you heal? A taxonomy for post-compromise security in secure-channel establishment Olivier Blazy, Ioana Boureanu, Pascal Lafourcade, Cristina Onete, Léo Robert
2022/1088 (PDF ) Tighter trail bounds for Xoodoo Joan Daemen, Silvia Mella, Gilles Van Assche
2022/1087 (PDF ) I Know What Your Layers Did: Layer-wise Explainability of Deep Learning Side-channel Analysis Guilherme Perin, Lichao Wu, Stjepan Picek
2022/1086 (PDF ) KaLi: A Crystal for Post-Quantum Security using Kyber and Dilithium Aikata Aikata, Ahmet Can Mert, Malik Imran, Samuel Pagliarini, Sujoy Sinha Roy
2022/1084 (PDF ) Glass-Vault: A Generic Transparent Privacy-preserving Exposure Notification Analytics Platform Lorenzo Martinico, Aydin Abadi, Thomas Zacharias, Thomas Win
2022/1083 (PDF ) EnigMap: Signal Should Use Oblivious Algorithms for Private Contact Discovery Afonso Tinoco, Sixiang Gao, Elaine Shi
2022/1082 (PDF ) Assisted Private Information Retrieval Natnatee Dokmai, L. Jean Camp, Ryan Henry
2022/1081 (PDF ) Pairing-free secure-channel establishment in mobile networks with fine-grained lawful interception Xavier Bultel, Cristina Onete
2022/1079 (PDF ) The inspection model for zero-knowledge proofs and efficient Zerocash with secp256k1 keys Huachuang Sun, Haifeng Sun, Kevin Singh, Akhil Sai Peddireddy, Harshad Patil, Jianwei Liu, Weikeng Chen
2022/1078 (PDF ) Skip Ratchet: A Hierarchical Hash System Brooklyn Zelenka
2022/1077 (PDF ) New Bounds on the Multiplicative Complexity of Boolean Functions Meltem Sonmez Turan
2022/1076 (PDF ) Range Search over Encrypted Multi-Attribute Data Francesca Falzon, Evangelia Anna Markatou, Zachary Espiritu, Roberto Tamassia
2022/1075 (PDF ) Secure Branching Program Evaluation Jonas Janneck, Anas Boudi, Anselme Tueno, Matthew Akram
2022/1074 (PDF ) On Quantum Ciphertext Indistinguishability, Recoverability, and OAEP Juliane Krämer, Patrick Struck
2022/1073 (PDF ) Fixing Issues and Achieving Maliciously Secure Verifiable Aggregation in ``VeriFL: Communication-Efficient and Fast Verifiable Aggregation for Federated Learning'' Xiaojie Guo
2022/1072 (PDF ) Recursion over Public-Coin Interactive Proof Systems; Faster Hash Verification Alexandre Belling, Azam Soleimanian, Olivier Bégassat
2022/1071 (PDF ) Performance Evaluation of NIST LWC Finalists on AVR ATmega and ARM Cortex-M3 Microcontrollers Yuhei Watanabe, Hideki Yamamoto, Hirotaka Yoshida
2022/1070 (PDF ) Efficient Unique Ring Signatures From Lattices Tuong Ngoc Nguyen, Anh The Ta, Huy Quoc Le, Dung Hoang Duong, Willy Susilo, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto
2022/1069 (PDF ) A Theoretical Framework for the Analysis of Physical Unclonable Function Interfaces and its Relation to the Random Oracle Model Marten van Dijk, Chenglu Jin
2022/1068 (PDF ) Evaluating isogenies in polylogarithmic time Damien Robert
2022/1067 (PDF ) Lattice Enumeration with Discrete Pruning: Improvement, Cost Estimation and Optimal Parameters Luan Luan, Chunxiang Gu, Yonghui Zheng, Yanan Shi
2022/1066 (PDF ) FairBlock: Preventing Blockchain Front-running with Minimal Overheads Peyman Momeni, Sergey Gorbunov, Bohan Zhang
2022/1065 (PDF ) A Note on the Theoretical and Practical Security of Block Ciphers Öznur MUT SAĞDIÇOĞLU, Serhat Sağdıçoğlu, Ebru Küçükkubaş
2022/1064 (PDF ) Lattice Reduction Meets Key-Mismatch: New Misuse Attack on Lattice-Based NIST Candidate KEMs Ruiqi Mi, Haodong Jiang, Zhenfeng Zhang
2022/1063 (PDF ) Rapidash: Foundations of Side-Contract-Resilient Fair Exchange Hao Chung, Elisaweta Masserova, Elaine Shi, Sri AravindaKrishnan Thyagarajan
2022/1062 (PDF ) A Password-Based Access Control Framework for Time-Sequence Aware Media Cloudization Haiyan Wang
2022/1061 (PDF ) Breaking Category Five SPHINCS+ with SHA-256 Ray Perlner, John Kelsey, David Cooper
2022/1060 (PDF ) Programmable Distributed Point Functions Elette Boyle, Niv Gilboa, Yuval Ishai, Victor I. Kolobov
2022/1059 (PDF ) Classification of all DO planar polynomials with prime field coefficients over GF(3^n) for n up to 7 Diana Davidova, Nikolay Kaleyski
2022/1058 (PDF ) Evaluating the Security of Merkle-Damgård Hash Functions and Combiners in Quantum Settings Zhenzhen Bao, Jian Guo, Shun Li, Phuong Pham
2022/1057 (PDF ) Rebound Attacks on SKINNY Hashing with Automatic Tools Shun Li, Guozhen Liu, Phuong Pham
2022/1056 (PDF ) Linear-Time Probabilistic Proofs with Sublinear Verification for Algebraic Automata Over Every Field Jonathan Bootle, Alessandro Chiesa, Ziyi Guan, Siqi Liu
2022/1055 (PDF ) Exploring Integrity of AEADs with Faults: Definitions and Constructions Sayandeep Saha, Mustafa Khairallah, Thomas Peyrin
2022/1054 (PDF ) SIDH with masked torsion point images Tako Boris Fouotsa
2022/1053 (PDF ) Secure and Private Distributed Source Coding with Private Keys and Decoder Side Information Onur Gunlu, Rafael F. Schaefer, Holger Boche, H. Vincent Poor
2022/1052 (PDF ) Double-Odd Jacobi Quartic Thomas Pornin
2022/1051 (PDF ) How to Verifiably Encrypt Many Bits for an Election? Henri Devillez, Olivier Pereira, Thomas Peters
2022/1050 (PDF ) RapidUp: Multi-Domain Permutation Protocol for Lookup Tables Héctor Masip Ardevol, Jordi Baylina Melé, Daniel Lubarov, José L. Muñoz-Tapia
2022/1049 (PDF ) Post Quantum Design in SPDM for Device Authentication and Key Establishment Jiewen Yao, Krystian Matusiewicz, Vincent Zimmer
2022/1048 (PDF ) Practical Sublinear Proofs for R1CS from Lattices Ngoc Khanh Nguyen, Gregor Seiler
2022/1047 (PDF ) Perfectly Secure Synchronous MPC with Asynchronous Fallback Guarantees Against General Adversaries Ananya Appan, Anirudh Chandramouli, Ashish Choudhury
2022/1046 (PDF ) Post-Quantum Multi-Recipient Public Key Encryption Joël Alwen, Dominik Hartmann, Eike Kiltz, Marta Mularczyk, Peter Schwabe
2022/1045 (PDF ) On UC-Secure Range Extension and Batch Verification for ECVRF Christian Badertscher, Peter Gaži, Iñigo Querejeta-Azurmendi, Alexander Russell
2022/1044 (PDF ) Oblivious Revocable Functions and Encrypted Indexing Kevin Lewi, Jon Millican, Ananth Raghunathan, Arnab Roy
2022/1043 (PDF ) A Study of Error Floor Behavior in QC-MDPC Codes Sarah Arpin, Tyler Raven Billingsley, Daniel Rayor Hast, Jun Bo Lau, Ray Perlner, Angela Robinson
2022/1042 (PDF ) Weak Subtweakeys in SKINNY Daniël Kuijsters, Denise Verbakel, Joan Daemen
2022/1041 (PDF ) Lattice-Based Cryptography in Miden VM Alan Szepieniec, Frederik Vercauteren
2022/1040 (PDF ) A framework for constructing Single Secret Leader Election from MPC Michael Backes, Pascal Berrang, Lucjan Hanzlik, Ivan Pryvalov
2022/1039 (PDF ) Theoretical Limits of Provable Security Against Model Extraction by Efficient Observational Defenses Ari Karchmer
2022/1038 (PDF ) Breaking SIDH in polynomial time Damien Robert
2022/1037 (PDF ) RPM: Robust Anonymity at Scale Donghang Lu, Aniket Kate
2022/1036 (PDF ) MuSig-L: Lattice-Based Multi-Signature With Single-Round Online Phase Cecilia Boschini, Akira Takahashi, Mehdi Tibouchi
2022/1035 (PDF ) Efficient Pseudorandom Correlation Generators from Ring-LPN Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Scholl
2022/1034 (PDF ) Finding All Impossible Differentials When Considering the DDT Kai Hu, Thomas Peyrin, Meiqin Wang
2022/1033 (PDF ) A Complete Characterization of Security for Linicrypt Block Cipher Modes Tommy Hollenberg, Mike Rosulek, Lawrence Roy
2022/1032 (PDF ) On Non-uniform Security for Black-box Non-Interactive CCA Commitments Rachit Garg, Dakshita Khurana, George Lu, Brent Waters
2022/1031 (PDF ) Revisiting Algebraic Attacks on MinRank and on the Rank Decoding Problem Magali Bardet, Pierre Briaud, Maxime Bros, Philippe Gaborit, Jean-Pierre Tillich
2022/1030 (PDF ) Oblivious Extractors and Improved Security in Biometric-based Authentication Systems Ivan De Oliveira Nunes, Peter Rindal, Maliheh Shirvanian
2022/1029 (PDF ) FIDO2, CTAP 2.1, and WebAuthn 2: Provable Security and Post-Quantum Instantiation Nina Bindel, Cas Cremers, Mang Zhao
2022/1028 (PDF ) New Unbounded Verifiable Data Streaming for Batch Query with Almost Optimal Overhead Jiaojiao Wu, Jianfeng Wang, Xinwei Yong, Xinyi Huang, Xiaofeng Chen
2022/1027 (PDF ) Maliciously Secure Massively Parallel Computation for All-but-One Corruptions Rex Fernando, Yuval Gelles, Ilan Komargodski, Elaine Shi
2022/1026 (PDF ) An attack on SIDH with arbitrary starting curve Luciano Maino, Chloe Martindale
2022/1025 (PDF ) Parallelizable Delegation from LWE Cody Freitag, Rafael Pass, Naomi Sirkin
2022/1024 (PDF ) Multi-Input Attribute Based Encryption and Predicate Encryption Shweta Agrawal, Anshu Yadav, Shota Yamada
2022/1023 (PDF ) SIM: Secure Interval Membership Testing and Applications to Secure Comparison Albert Yu, Donghang Lu, Aniket Kate, Hemanta K. Maji
2022/1022 (PDF ) New Low-Memory Algebraic Attacks on LowMC in the Picnic Setting Fukang Liu, Willi Meier, Santanu Sarkar, Takanori Isobe
2022/1021 (PDF ) Practical Statistically-Sound Proofs of Exponentiation in any Group Charlotte Hoffmann, Pavel Hubáček, Chethan Kamath, Karen Klein, Krzysztof Pietrzak
2022/1020 (PDF ) Uncle Maker: (Time)Stamping Out The Competition in Ethereum Aviv Yaish, Gilad Stern, Aviv Zohar
2022/1019 (PDF ) Masked-degree SIDH Tomoki Moriya
2022/1018 (PDF ) Time-Deniable Signatures Gabrielle Beck, Arka Rai Choudhuri, Matthew Green, Abhishek Jain, Pratyush Ranjan Tiwari
2022/1017 (PDF ) PERKS: Persistent and Distributed Key Acquisition for Secure Storage from Passwords Gareth T. Davies, Jeroen Pijnenburg
2022/1016 (PDF ) Public Key Authenticated Encryption with Keyword Search from LWE Leixiao Cheng, Fei Meng
2022/1015 (PDF ) Quantum Cryptanalysis of $5$ rounds Feistel schemes and Benes schemes Maya Chartouny, Jacques Patarin, Ambre Toulemonde
2022/1014 (PDF ) Correlated Pseudorandomness from Expand-Accumulate Codes Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Nicolas Resch, Peter Scholl
2022/1013 (PDF ) Dynamic Local Searchable Symmetric Encryption Brice Minaud, Michael Reichle
2022/1012 (PDF ) Nonce-Misuse Resilience of Romulus-N and GIFT-COFB Akiko Inoue, Chun Guo, Kazuhiko Minematsu
2022/1011 (PDF ) Structure-Aware Private Set Intersection, With Applications to Fuzzy Matching Gayathri Garimella, Mike Rosulek, Jaspal Singh
2022/1010 (PDF ) Orion: Zero Knowledge Proof with Linear Prover Time Tiancheng Xie, Yupeng Zhang, Dawn Song
2022/1009 (PDF ) Time-Space Tradeoffs for Sponge Hashing: Attacks and Limitations for Short Collisions Cody Freitag, Ashrujit Ghoshal, Ilan Komargodski
2022/1008 (PDF ) Multimodal Private Signatures Khoa Nguyen, Fuchun Guo, Willy Susilo, Guomin Yang
2022/1007 (PDF ) zkQMC: Zero-Knowledge Proofs For (Some) Probabilistic Computations Using Quasi-Randomness Zachary DeStefano, Dani Barrack, Michael Dixon
2022/1006 (PDF ) A Forward-secure Efficient Two-factor Authentication Protocol Steven J. Murdoch, Aydin Abadi
2022/1005 (PDF ) PUF-COTE: A PUF Construction with Challenge Obfuscation and Throughput Enhancement Boyapally Harishma, Durba Chatterjee, Kuheli Pratihar, Sayandeep Saha, Debdeep Mukhopadhyay
2022/1004 (PDF ) Interactive Non-Malleable Codes Against Desynchronizing Attacks in the Multi-Party Setting Nils Fleischhacker, Suparno Ghoshal, Mark Simkin
2022/1003 (PDF ) Orbis Specification Language: a type theory for zk-SNARK programming Morgan Thomas
2022/1002 (PDF ) Zswap: zk-SNARK Based Non-Interactive Multi-Asset Swaps Felix Engelmann, Thomas Kerber, Markulf Kohlweiss, Mikhail Volkhov
2022/1001 (PDF ) Quantum Security of FOX Construction based on Lai-Massey Scheme Amit Kumar Chauhan, Somitra Sanadhya
2022/1000 (PDF ) Statistical Decoding 2.0: Reducing Decoding to LPN Kevin Carrier, Thomas Debris-Alazard, Charles Meyer-Hilfiger, Jean-Pierre Tillich
2022/999 (PDF ) PipeMSM: Hardware Acceleration for Multi-Scalar Multiplication Charles. F. Xavier
2022/998 (PDF ) On the Hardness of the Finite Field Isomorphism Problem Dipayan Das, Antoine Joux
2022/997 (PDF ) Key-Recovery Attacks on CRAFT and WARP (Full Version) Ling Sun, Wei Wang, Meiqin Wang
2022/996 (PDF ) Fast Hashing to $G_2$ in Direct Anonymous Attestation Yu Dai, Fangguo Zhang, Chang-An Zhao
2022/995 (PDF ) Sequential Digital Signatures for Cryptographic Software-Update Authentication Bertram Poettering, Simon Rastikian
2022/994 (PDF ) Faster Sounder Succinct Arguments and IOPs Justin Holmgren, Ron Rothblum
2022/993 (PDF ) A New Look at Blockchain Leader Election: Simple, Efficient, Sustainable and Post-Quantum Muhammed F. Esgin, Oguzhan Ersoy, Veronika Kuchta, Julian Loss, Amin Sakzad, Ron Steinfeld, Wayne Yang, Raymond K. Zhao
2022/992 (PDF ) An $\mathcal{O}(n)$ Algorithm for Coefficient Grouping Fukang Liu
2022/991 (PDF ) Coefficient Grouping: Breaking Chaghri and More Fukang Liu, Ravi Anand, Libo Wang, Willi Meier, Takanori Isobe
2022/990 (PDF ) Efficient Computation of (2^n,2^n)-Isogenies Sabrina Kunzweiler
2022/989 (PDF ) Quantum-Resistant Password-Based Threshold Single-Sign-On Authentication with Updatable Server Private Key Jingwei Jiang, Ding Wang, Guoyin Zhang, Zhiyuan Chen
2022/988 (PDF ) Modeling and Simulating the Sample Complexity of solving LWE using BKW-Style Algorithms Qian Guo, Erik Mårtensson, Paul Stankovski Wagner
2022/987 (PDF ) A Signature-Based Gröbner Basis Algorithm with Tail-Reduced Reductors (M5GB) Manuel Hauke, Lukas Lamster, Reinhard Lüftenegger, Christian Rechberger
2022/986 (PDF ) Quantum Attacks on Lai-Massey Structure Shuping Mao, Tingting Guo, Peng Wang, Lei Hu
2022/985 (PDF ) Privacy when Everyone is Watching: An SOK on Anonymity on the Blockchain Roy Rinberg, Nilaksh Agarwal
2022/984 (PDF ) ToSHI - Towards Secure Heterogeneous Integration: Security Risks, Threat Assessment, and Assurance Nidish Vashistha, Md Latifur Rahman, Md Saad Ul Haque, Azim Uddin, Md Sami Ul Islam Sami, Amit Mazumder Shuo, Paul Calzada, Farimah Farahmandi, Navid Asadizanjani, Fahim Rahman, Mark Tehranipoor
2022/983 (PDF ) Do Not Bound to a Single Position: Near-Optimal Multi-Positional Mismatch Attacks Against Kyber and Saber Qian Guo, Erik Mårtensson
2022/982 (PDF ) Random-Index Oblivious RAM Shai Halevi, Eyal Kushilevitz
2022/981 (PDF ) FrodoPIR: Simple, Scalable, Single-Server Private Information Retrieval Alex Davidson, Gonçalo Pestana, Sofía Celi
2022/980 (PDF ) Fast norm computation in smooth-degree Abelian number fields Daniel J. Bernstein
2022/978 (PDF ) Non-Malleable Multi-Party Computation Fuchun Lin
2022/977 (PDF ) Allocating Rotational Cryptanalysis based Preimage Attack on 4-round Keccak-224 for Quantum Setting Runsong Wang, Xuelian Li, Juntao Gao, Hui Li, Baocang Wang
2022/976 (PDF ) Paras - A Private NFT Protocol Vanishree Rao
2022/975 (PDF ) An efficient key recovery attack on SIDH Wouter Castryck, Thomas Decru
2022/974 (PDF ) PEReDi: Privacy-Enhanced, Regulated and Distributed Central Bank Digital Currencies Aggelos Kiayias, Markulf Kohlweiss, Amirreza Sarencheh
2022/973 (PDF ) MR-DSS – Smaller MinRank-based (Ring-)Signatures Emanuele Bellini, Andre Esser, Carlo Sanna, Javier Verbel
2022/972 (PDF ) Keyed Streebog is a secure PRF and MAC Vitaly Kiryukhin
2022/971 (PDF ) Long Live The Honey Badger: Robust Asynchronous DPSS and its Applications Thomas Yurek, Zhuolun Xiang, Yu Xia, Andrew Miller
2022/970 (PDF ) Related-key attacks on the compression function of Streebog Vitaly Kiryukhin
2022/969 (PDF ) Certified Everlasting Functional Encryption Taiga Hiroka, Tomoyuki Morimae, Ryo Nishimaki, Takashi Yamakawa
2022/967 (PDF ) On the Computational Hardness of the Code Equivalence Problem in Cryptography Alessandro Barenghi, Jean-Francois Biasse, Edoardo Persichetti, Paolo Santini
2022/966 (PDF ) On Linear Complexity of Finite Sequences : Coding Theory and Applications to Cryptography Edoardo Persichetti, Tovohery Randrianarisoa
2022/965 (PDF ) PROLEAD - A Probing-Based Hardware Leakage Detection Tool Nicolai Müller, Amir Moradi
2022/964 (PDF ) Hybrid Decoding -- Classical-Quantum Trade-Offs for Information Set Decoding Andre Esser, Sergi Ramos-Calderer, Emanuele Bellini, José Ignacio Latorre, Marc Manzano
2022/963 (PDF ) Resolving the Doubts: On the Construction and Use of ResNets for Side-channel Analysis Sengim Karayalcin, Stjepan Picek
2022/962 (PDF ) Group Signatures with Designated Traceability over Openers' Attributes Hiroaki Anada, Masayuki Fukumitsu, Shingo Hasegawa
2022/961 (PDF ) Secure and Efficient Implicit Certificates: Improving the Performance for Host Identity Protocol in IoT Zhaokang Lu, Jianzhu Lu
2022/960 (PDF ) Scan, Shuffle, Rescan: Machine-Assisted Election Audits With Untrusted Scanners Douglas W. Jones, Sunoo Park, Ronald L. Rivest, Adam Sealfon
2022/959 (PDF ) MEGA: Malleable Encryption Goes Awry Matilda Backendal, Miro Haller, Kenneth G. Paterson
2022/958 (PDF ) Get Me out of This Payment! Bailout: An HTLC Re-routing Protocol Oguzhan Ersoy, Pedro Moreno-Sanchez, Stefanie Roos
2022/957 (PDF ) Caulk+: Table-independent lookup arguments Jim Posen, Assimakis A. Kattis
2022/956 (PDF ) Improved Plantard Arithmetic for Lattice-based Cryptography Junhao Huang, Jipeng Zhang, Haosong Zhao, Zhe Liu, Ray C. C. Cheung, Çetin Kaya Koç, Donglong Chen
2022/955 (PDF ) A Small GIFT-COFB: Lightweight Bit-Serial Architectures Andrea Caforio, Daniel Collins, Subhadeep Banik, Francesco Regazzoni
2022/954 (PDF ) XOR Compositions of Physically Related Functions Harishma Boyapally, Sikhar Patranabis, Debdeep Mukhopadhyay
2022/953 (PDF ) Big Brother Is Watching You: A Closer Look At Backdoor Construction Anubhab Baksi, Arghya Bhattacharjee, Jakub Breier, Takanori Isobe, Mridul Nandi
2022/952 (PDF ) When Frodo Flips: End-to-End Key Recovery on FrodoKEM via Rowhammer Michael Fahr Jr., Hunter Kippen, Andrew Kwong, Thinh Dang, Jacob Lichtinger, Dana Dachman-Soled, Daniel Genkin, Alexander Nelson, Ray Perlner, Arkady Yerukhimovich, Daniel Apon
2022/951 (PDF ) MixCT: Mixing Confidential Transactions from Homomorphic Commitment Jiajun Du, Zhonghui Ge, Yu Long, Zhen Liu, Shifeng Sun, Xian Xu, Dawu Gu
2022/950 (PDF ) Private Balance-Checking on Blockchain Accounts Using Private Integer Addition Birenjith Sasidharan, Emanuele Viterbo
2022/949 (PDF ) One Server for the Price of Two: Simple and Fast Single-Server Private Information Retrieval Alexandra Henzinger, Matthew M. Hong, Henry Corrigan-Gibbs, Sarah Meiklejohn, Vinod Vaikuntanathan
2022/947 (PDF ) Volume and Access Pattern Leakage-abuse Attack with Leaked Documents Steven Lambregts, Huanhuan Chen, Jianting Ning, Kaitai Liang
2022/946 (PDF ) ImpedanceVerif: On-Chip Impedance Sensing for System-Level Tampering Detection Tahoura Mosavirik, Patrick Schaumont, Shahin Tajik
2022/945 (PDF ) Searchable Encryption with randomized ciphertext and randomized keyword search Marco Calderini, Riccardo Longo, Massimiliano Sala, Irene Villa
2022/944 (PDF ) Two-Round MPC without Round Collapsing Revisited -- Towards Efficient Malicious Protocols Huijia Lin, Tianren Liu
2022/943 (PDF ) DiSSECT: Distinguisher of Standard & Simulated Elliptic Curves via Traits Vladimir Sedlacek, Vojtech Suchanek, Antonin Dufka, Marek Sys, Vashek Matyas
2022/942 (PDF ) Foundations of Coin Mixing Services Noemi Glaeser, Matteo Maffei, Giulio Malavolta, Pedro Moreno-Sanchez, Erkan Tairi, Sri AravindaKrishnan Thyagarajan
2022/941 (PDF ) Lattice-Based SNARKs: Publicly Verifiable, Preprocessing, and Recursively Composable Martin R. Albrecht, Valerio Cini, Russell W. F. Lai, Giulio Malavolta, Sri AravindaKrishnan Thyagarajan
2022/940 (PDF ) Multiple-Valued Plaintext-Checking Side-Channel Attacks on Post-Quantum KEMs Yutaro Tanaka, Rei Ueno, Keita Xagawa, Akira Ito, Junko Takahashi, Naofumi Homma
2022/939 (PDF ) Multi-party Private Function Evaluation for RAM Keyu Ji, Bingsheng Zhang, Tianpei Lu, Kui Ren
2022/938 (PDF ) Truncated EdDSA/ECDSA Signatures Thomas Pornin
2022/937 (PDF ) Post-quantum Plaintext-awareness Ehsan Ebrahimi, Jeroen van Wier
2022/936 (PDF ) PROBONITE : PRivate One-Branch-Only Non-Interactive decision Tree Evaluation Sofiane Azogagh, Victor Delfour, Sébastien Gambs, Marc-Olivier Killijian
2022/935 (PDF ) SALSA: Attacking Lattice Cryptography with Transformers Emily Wenger, Mingjie Chen, Francois Charton, Kristin Lauter
2022/934 (PDF ) On Secure Computation of Solitary Output Functionalities With and Without Broadcast Bar Alon, Eran Omri
2022/933 (PDF ) Secure Quantized Training for Deep Learning Marcel Keller, Ke Sun
2022/932 (PDF ) Bitcoin-Enhanced Proof-of-Stake Security: Possibilities and Impossibilities Ertem Nusret Tas, David Tse, Fangyu Gai, Sreeram Kannan, Mohammad Ali Maddah-Ali, Fisher Yu
2022/931 (PDF ) Pushing the Limits of Generic Side-Channel Attacks on LWE-based KEMs - Parallel PC Oracle Attacks on Kyber KEM and Beyond Gokulnath Rajendran, Prasanna Ravi, Jan-Pieter D'Anvers, Shivam Bhasin, Anupam Chattopadhyay
2022/930 (PDF ) Multi-Parameter Support with NTTs for NTRU and NTRU Prime on Cortex-M4 Erdem Alkim, Vincent Hwang, Bo-Yin Yang
2022/929 (PDF ) PH = PSPACE Valerii Sopin
2022/928 (PDF ) Universal Gaussian Elimination Hardware for Cryptographic Purposes Jingwei Hu, Wen Wang, Kris Gaj, Donglong Chen, Huaxiong Wang
2022/927 (PDF ) Fit The Joint Moments - How to Attack any Masking Schemes Valence Cristiani, Maxime Lecomte, Thomas Hiscock, Philippe Maurine
2022/926 (PDF ) Zero-Knowledge in EasyCrypt Denis Firsov, Dominique Unruh
2022/925 (PDF ) Ad Hoc (Decentralized) Broadcast, Trace, and Revoke Ji Luo
2022/924 (PDF ) FICS PCB X-ray: A dataset for automated printed circuit board inter-layers inspection Dhwani Mehta, John True, Olivia P. Dizon-Paradis, Nathan Jessurun, Damon L. Woodard, Navid Asadizanjani, Mark Tehranipoor
2022/923 (PDF ) All for one and one for all: Fully decentralised privacy-preserving dark pool trading using multi-party computation Mariana Botelho da Gama, John Cartlidge, Nigel P. Smart, Younes Talibi Alaoui
2022/922 (PDF ) Estimating the Hidden Overheads in the BDGL Lattice Sieving Algorithm Léo Ducas
2022/921 (PDF ) Low-Delay 4, 5 and 6-Term Karatsuba Formulae in $\mathbb{F}_2[x]$ Using Overlap-free Splitting Haining Fan
2022/920 (PDF ) Distributed, Private, Sparse Histograms in the Two-Server Model James Bell, Adria Gascon, Badih Ghazi, Ravi Kumar, Pasin Manurangsi, Mariana Raykova, Phillipp Schoppmann
2022/919 (PDF ) Side-Channel Attacks on Lattice-Based KEMs Are Not Prevented by Higher-Order Masking Kalle Ngo, Ruize Wang, Elena Dubrova, Nils Paulsrud
2022/918 (PDF ) Building PRFs from TPRPs: Beyond the Block and the Tweak Length Bounds Wonseok Choi, Jooyoung Lee, Yeongmin Lee
2022/917 (PDF ) Almost-Surely Terminating Asynchronous Byzantine Agreement Against General Adversaries with Optimal Resilience Ashish Choudhury
2022/916 (PDF ) Post-Quantum Authenticated Encryption against Chosen-Ciphertext Side-Channel Attacks Melissa Azouaoui, Yulia Kuzovkova, Tobias Schneider, Christine van Vredendaal
2022/915 (PDF ) OpenFHE: Open-Source Fully Homomorphic Encryption Library Ahmad Al Badawi, Jack Bates, Flavio Bergamaschi, David Bruce Cousins, Saroja Erabelli, Nicholas Genise, Shai Halevi, Hamish Hunt, Andrey Kim, Yongwoo Lee, Zeyu Liu, Daniele Micciancio, Ian Quah, Yuriy Polyakov, Saraswathy R.V., Kurt Rohloff, Jonathan Saylor, Dmitriy Suponitsky, Matthew Triplett, Vinod Vaikuntanathan, Vincent Zucca
2022/914 (PDF ) The Hidden Number Problem with Small Unknown Multipliers: Cryptanalyzing MEGA in Six Queries and Other Applications Keegan Ryan, Nadia Heninger
2022/913 (PDF ) On the Communication Efficiency of Statistically-Secure Asynchronous MPC with Optimal Resilience Ashish Choudhury, Arpita Patra
2022/912 (PDF ) Individual Discrete Logarithm with Sublattice Reduction Haetham AL ASWAD, Cécile PIERROT
2022/911 (PDF ) Some Security Arguments For Xifrat1 Jianfang "Danny" Niu
2022/909 (PDF ) Multi-Instance Secure Public-Key Encryption Carlo Brunetta, Hans Heum, Martijn Stam
2022/908 (PDF ) On fast computations of numerical parameters of homogeneous algebraic graphs of large girth and small diameter and encryption of large files. Tymoteusz Chojecki, Vasyl Ustimenko
2022/907 (PDF ) A New Approach to Post-Quantum Non-Malleability Xiao Liang, Omkant Pandey, Takashi Yamakawa
2022/906 (PDF ) A Random Oracle for All of Us Marc Fischlin, Felix Rohrbach, Tobias Schmalz
2022/905 (PDF ) Tight Security Analysis of the Public Permutation-Based PMAC_Plus Avijit Dutta, Mridul Nandi, Suprita Talnikar
2022/904 (PDF ) Patient Zero and Patient Six: Zero-Value and Correlation Attacks on CSIDH and SIKE Fabio Campos, Michael Meyer, Krijn Reijnders, Marc Stöttinger
2022/903 (PDF ) Cycle-Accurate Power Side-Channel Analysis Using the ChipWhisperer: a Case Study on Gaussian Sampling Nils Wisiol, Patrick Gersch, Jean-Pierre Seifert
2022/902 (PDF ) MPC for Tech Giants (GMPC): Enabling Gulliver and the Lilliputians to Cooperate Amicably Bar Alon, Moni Naor, Eran Omri, Uri Stemmer
2022/901 (PDF ) Garbled-Circuits from an SCA Perspective: Free XOR can be Quite Expensive. . . Itamar Levi, Carmit Hazay
2022/900 (PDF ) On the key generation in SQISign Hiroshi Onuki
2022/899 (PDF ) Deep Learning-Based Medical Diagnostic Services: A Secure, Lightweight, and Accurate Realization Xiaoning Liu, Yifeng Zheng, Xingliang Yuan, Xun Yi
2022/898 (PDF ) Ferveo: Threshold Decryption for Mempool Privacy in BFT networks Joseph Bebel, Dev Ojha
2022/897 (PDF ) Constrained Pseudorandom Functions from Pseudorandom Synthesizers Zachary A Kissel
2022/896 (PDF ) Post-quantum hash functions using $\mathrm{SL}_n(\mathbb{F}_p)$ Corentin Le Coz, Christopher Battarbee, Ramón Flores, Thomas Koberda, Delaram Kahrobaei
2022/895 (PDF ) Security Analysis of RSA-BSSA Anna Lysyanskaya
2022/894 (PDF ) Toward Full Accounting for Leakage Exploitation and Mitigation in Dynamic Encrypted Databases Lei Xu, Anxin Zhou, Huayi Duan, Cong Wang, Qian Wang, Xiaohua Jia
2022/893 (PDF ) NJS: Database Protection Algorithm Edimar Veríssimo da Silva
2022/892 (PDF ) Piranha: A GPU Platform for Secure Computation Jean-Luc Watson, Sameer Wagh, Raluca Ada Popa
2022/891 (PDF ) Secure Physical Design Sukanta Dey, Jungmin Park, Nitin Pundir, Dipayan Saha, Amit Mazumder Shuvo, Dhwani Mehta, Navid Asadi, Fahim Rahman, Farimah Farahmandi, Mark Tehranipoor
2022/890 (PDF ) One Network to rule them all. An autoencoder approach to encode datasets Cristian-Alexandru Botocan
2022/889 (PDF ) Quantum Rewinding for Many-Round Protocols Russell W. F. Lai, Giulio Malavolta, Nicholas Spooner
2022/888 (PDF ) Tweakable Sleeve: A Novel Sleeve Construction based on Tweakable Hash Functions David Chaum, Mario Larangeira, Mario Yaksetig
2022/887 (PDF ) Round-Optimal Black-Box Protocol Compilers Yuval Ishai, Dakshita Khurana, Amit Sahai, Akshayaram Srinivasan
2022/886 (PDF ) Deep Learning based Cryptanalysis of Lightweight Block Ciphers, Revisited Hyunji Kim, Sejin Lim, Yeajun Kang, Wonwoong Kim, Hwajeong Seo
2022/885 (PDF ) Time-Space Lower Bounds for Finding Collisions in Merkle-Damgård Hash Functions Akshima, Siyao Guo, Qipeng Liu
2022/884 (PDF ) On the Feasibility of Unclonable Encryption, and More Prabhanjan Ananth, Fatih Kaleoglu, Xingjian Li, Qipeng Liu, Mark Zhandry
2022/883 (PDF ) Differentially Oblivious Turing Machines Ilan Komargodski, Elaine Shi
2022/882 (PDF ) Randomness Optimization for Gadget Compositions in Higher-Order Masking Jakob Feldtkeller, David Knichel, Pascal Sasdrich, Amir Moradi, Tim Güneysu
2022/881 (PDF ) A Novel High-performance Implementation of CRYSTALS-Kyber with AI Accelerator Lipeng Wan, Fangyu Zheng, Guang Fan, Rong Wei, Lili Gao, Jiankuo Dong, Jingqiang Lin, Yuewu Wang
2022/880 (PDF ) Efficient supersingularity testing over $\mathbb{F}_p$ and CSIDH key validation Gustavo Banegas, Valerie Gilchrist, Benjamin Smith
2022/879 (PDF ) Modular Polynomial Multiplication Using RSA/ECC coprocessor Aurélien Greuet, Simon Montoya, Clémence Vermeersch
2022/878 (PDF ) $\texttt{zk-creds}$: Flexible Anonymous Credentials from zkSNARKs and Existing Identity Infrastructure Michael Rosenberg, Jacob White, Christina Garman, Ian Miers
2022/877 (PDF ) A New Approach to the Constant-Round Re-encryption Mix-Net Myungsun Kim
2022/876 (PDF ) Watermarkable Public key Encryption With Efficient Extraction Under Standard Assumptions Foteini Baldimtsi, Aggelos Kiayias, Katerina Samari
2022/875 (PDF ) Contact Discovery in Mobile Messengers: Low-cost Attacks, Quantitative Analyses, and Efficient Mitigations Christoph Hagen, Christian Weinert, Christoph Sendner, Alexandra Dmitrienko, Thomas Schneider
2022/874 (PDF ) Lattice Codes for Lattice-Based PKE Shanxiang Lyu, Ling Liu, Junzuo Lai, Cong Ling, Hao Chen
2022/873 (PDF ) Towards Leakage-Resistant Post-Quantum CCA-Secure Public Key Encryption Clément Hoffmann, Benoît Libert, Charles Momin, Thomas Peters, François-Xavier Standaert
2022/872 (PDF ) Nirvana: Instant and Anonymous Payment-Guarantees Akash Madhusudan, Mahdi Sedaghat, Philipp Jovanovic, Bart Preneel
2022/871 (PDF ) Secure Plot Transfer for the Chia Blockchain Shashank Agrawal
2022/870 (PDF ) Supersingular Isogeny Diffie-Hellman with Legendre Form Jesse Elliott, Aaron Hutchinson
2022/869 (PDF ) Post-Quantum Insecurity from LWE Alex Lombardi, Ethan Mook, Willy Quach, Daniel Wichs
2022/868 (PDF ) Maximizing the Potential of Custom RISC-V Vector Extensions for Speeding up SHA-3 Hash Functions Huimin Li, Nele Mentens, Stjepan Picek
2022/867 (PDF ) The State of the Union: Union-Only Signatures for Data Aggregation Diego F. Aranha, Felix Engelmann, Sebastian Kolby, Sophia Yakoubov
2022/866 (PDF ) Communication-Efficient Secure Logistic Regression Amit Agarwal, Stanislav Peceny, Mariana Raykova, Phillipp Schoppmann, Karn Seth
2022/865 (PDF ) Linked Fault Analysis Ali Asghar Beigizad, Hadi Soleimany, Sara Zarei, Hamed Ramzanipour
2022/864 (PDF ) BalanceProofs: Maintainable Vector Commitments with Fast Aggregation Weijie Wang, Annie Ulichney, Charalampos Papamanthou
2022/863 (PDF ) Effective and Efficient Masking with Low Noise using Small-Mersenne-Prime Ciphers Loïc Masure, Pierrick Méaux, Thorben Moos, François-Xavier Standaert
2022/862 (PDF ) Scooby: Improved Multi-Party Homomorphic Secret Sharing Based on FHE Ilaria Chillotti, Emmanuela Orsini, Peter Scholl, Nigel Paul Smart, Barry Van Leeuwen
2022/861 (PDF ) Genus Distribution of Random q-ary Lattices Peter J. Bruin, Léo Ducas, Shane Gibbons
2022/860 (PDF ) AB-SIFA: SIFA with Adjacent-Byte Model Chunya Hu, Yongbo Hu, Wenfeng Zhu, Zixin Tan, Qi Zhang, Zichao Gong, Yanhao Gong, Luyao Jin, Pengwei Feng
2022/859 (PDF ) Practical Side-Channel Attack on Masked Message Encoding in Latticed-Based KEM Jian Wang, Weiqiong Cao, Hua Chen, Haoyuan Li
2022/858 (PDF ) Snapshot-Oblivious RAMs: Sub-Logarithmic Efficiency for Short Transcripts Yang Du, Daniel Genkin, Paul Grubbs
2022/857 (PDF ) Succinct Classical Verification of Quantum Computation James Bartusek, Yael Tauman Kalai, Alex Lombardi, Fermi Ma, Giulio Malavolta, Vinod Vaikuntanathan, Thomas Vidick, Lisa Yang
2022/856 (PDF ) Mix-Nets from Re-Randomizable and Replayable CCA-secure Public-Key Encryption Antonio Faonio, Luigi Russo
2022/855 (PDF ) Tightness Subtleties for Multi-user PKE Notions Hans Heum, Martijn Stam
2022/854 (PDF ) On Access Control Encryption without Sanitization Cecilia Boschini, Ivan Damgård, Claudio Orlandi
2022/853 (PDF ) Hashing to Prime in Zero-Knowledge Thomas Groß
2022/852 (PDF ) Making Biased DL Models Work: Message and Key Recovery Attacks on Saber Using Amplitude-Modulated EM Emanations Ruize Wang, Kalle Ngo, Elena Dubrova
2022/851 (PDF ) NIWI and New Notions of Extraction for Algebraic Languages Chaya Ganesh, Hamidreza Khoshakhlagh, Roberto Parisella
2022/850 (PDF ) Privacy-aware Secure Region-based Handover for Small Cell Networks in 5G-enabled Mobile Communication Rabiah Alnashwan, Prosanta Gope, Benjamin Dowling
2022/849 (PDF ) Formal Verification of Arithmetic Masking in Hardware and Software Barbara Gigerl, Robert Primas, Stefan Mangard
2022/848 (PDF ) Symmetrical Disguise: Realizing Homomorphic Encryption Services from Symmetric Primitives (extended version) Alexandros Bakas, Eugene Frimpong, Antonis Michalas
2022/847 (PDF ) A note on key control in CSIDH Antonio Sanso
2022/846 (PDF ) A Long Tweak Goes a Long Way: High Multi-user Security Authenticated Encryption from Tweakable Block Ciphers Benoît Cogliati, Jérémy Jean, Thomas Peyrin, Yannick Seurin
2022/845 (PDF ) Key Structures: Improved Related-Key Boomerang Attack against the Full AES-256 Jian Guo, Ling Song, Haoyang Wang
2022/844 (PDF ) Security Analysis of a Recent Pairing-based Certificateless Authenticated Key Agreement Protocol for Blockchain-based WBANs Yong-Jin Kim, Dok-Jun An, Kum-Sok Sin, Son-Gyong Kim
2022/842 (PDF ) Nearly Optimal Property Preserving Hashing Justin Holmgren, Minghao Liu, LaKyah Tyner, Daniel Wichs
2022/841 (PDF ) Faster Yet Safer: Logging System Via Fixed-Key Blockcipher Viet Tung Hoang, Cong Wu, Xin Yuan
2022/840 (PDF ) New Design Techniques for Efficient Arithmetization-Oriented Hash Functions:Anemoi Permutations and Jive Compression Mode Clémence Bouvier, Pierre Briaud, Pyrros Chaidos, Léo Perrin, Robin Salen, Vesselin Velichkov, Danny Willems
2022/839 (PDF ) Threshold Structure-Preserving Signatures Elizabeth Crites, Markulf Kohlweiss, Bart Preneel, Mahdi Sedaghat, Daniel Slamanig
2022/838 (PDF ) An Efficient Query Recovery Attack Against a Graph Encryption Scheme Francesca Falzon, Kenneth G. Paterson
2022/837 (PDF ) Differential Cryptanalysis in the Fixed-Key Model Tim Beyne, Vincent Rijmen
2022/836 (PDF ) Authenticated Garbling from Simple Correlations Samuel Dittmer, Yuval Ishai, Steve Lu, Rafail Ostrovsky
2022/835 (PDF ) Covert Authentication from Lattices Rajendra Kumar, Khoa Nguyen
2022/834 (PDF ) A New Framework For More Efficient Round-Optimal Lattice-Based (Partially) Blind Signature via Trapdoor Sampling Rafael del Pino, Shuichi Katsumata
2022/833 (PDF ) Stronger Security for Non-Interactive Threshold Signatures: BLS and FROST Mihir Bellare, Stefano Tessaro, Chenzhi Zhu
2022/832 (PDF ) Sustained Space and Cumulative Complexity Trade-offs for Data-Dependent Memory-Hard Functions Jeremiah Blocki, Blake Holman
2022/831 (PDF ) Sharing Transformation and Dishonest Majority MPC with Packed Secret Sharing Vipul Goyal, Antigoni Polychroniadou, Yifan Song
2022/830 (PDF ) Near-Optimal Private Information Retrieval with Preprocessing Arthur Lazzaretti, Charalampos Papamanthou
2022/829 (PDF ) TERSE: Tiny Encryptions and Really Speedy Execution for Post-Quantum Private Stream Aggregation Jonathan Takeshita, Zachariah Carmichael, Ryan Karl, Taeho Jung
2022/828 (PDF ) Lower Bounds for (Batch) PIR with Private Preprocessing Kevin Yeo
2022/827 (PDF ) Privacy-Preserving IP Verification Dimitris Mouris, Charles Gouert, Nektarios Georgios Tsoutsos
2022/826 (PDF ) Pika: Secure Computation using Function Secret Sharing over Rings Sameer Wagh
2022/825 (PDF ) Romeo: Conversion and Evaluation of HDL Designs in the Encrypted Domain Charles Gouert, Nektarios Georgios Tsoutsos
2022/824 (PDF ) Fiddling the Twiddle Constants - Fault Injection Analysis of the Number Theoretic Transform Prasanna Ravi, Bolin Yang, Shivam Bhasin, Fan Zhang, Anupam Chattopadhyay
2022/823 (PDF ) Round Efficient Byzantine Agreement from VDFs Poulami Das, Lisa Eckey, Sebastian Faust, Julian Loss, Monosij Maitra
2022/822 (PDF ) Traceable Receipt-Free Encryption Henri Devillez, Olivier Pereira, Thomas Peters
2022/821 (PDF ) MPC for Group Reconstruction Circuits Lúcás Críostóir Meier
2022/820 (PDF ) Public-Coin 3-Round Zero-Knowledge from Learning with Errors and Keyless Multi-Collision-Resistant Hash Susumu Kiyoshima
2022/819 (PDF ) Moz$\mathbb{Z}_{2^k}$arella: Efficient Vector-OLE and Zero-Knowledge Proofs Over $\mathbb{Z}_{2^k}$ Carsten Baum, Lennart Braun, Alexander Munch-Hansen, Peter Scholl
2022/818 (PDF ) Provably Secure Reflection Ciphers Tim Beyne, Yu Long Chen
2022/817 (PDF ) Overloading the Nonce: Rugged PRPs, Nonce-Set AEAD, and Order-Resilient Channels Jean Paul Degabriele, Vukašin Karadžić
2022/816 (PDF ) Securing Approximate Homomorphic Encryption Using Differential Privacy Baiyu Li, Daniele Micciancio, Mark Schultz, Jessica Sorrell
2022/815 (PDF ) More Efficient Dishonest Majority Secure Computation over $\mathbb{Z}_{2^k}$ via Galois Rings Daniel Escudero, Chaoping Xing, Chen Yuan
2022/814 (PDF ) Suborn Channels: Incentives Against Timelock Bribes Zeta Avarikioti, Orfeas Stefanos Thyfronitis Litos
2022/813 (PDF ) Quadratic Multiparty Randomized Encodings Beyond Honest Majority and Their Applications Benny Applebaum, Yuval Ishai, Or Karni, Arpita Patra
2022/812 (PDF ) Secret Can Be Public: Low-Memory AEAD Mode for High-Order Masking Yusuke Naito, Yu Sasaki, Takeshi Sugawara
2022/811 (PDF ) EZEE: Epoch Parallel Zero Knowledge for ANSI C Yibin Yang, David Heath, Vladimir Kolesnikov, David Devecsery
2022/810 (PDF ) Zero Knowledge for Everything and Everyone: Fast ZK Processor with Cached RAM for ANSI C Programs David Heath, Yibin Yang, David Devecsery, Vladimir Kolesnikov
2022/809 (PDF ) A 2.1 KHz Zero-Knowledge Processor with BubbleRAM David Heath, Vladimir Kolesnikov
2022/808 (PDF ) Secret key generation from Gaussian sources using lattice-based extractors Laura Luzzi, Cong Ling, Matthieu R. Bloch
2022/807 (PDF ) Side-Channel Analysis of Saber KEM Using Amplitude-Modulated EM Emanations Ruize Wang, Kalle Ngo, Elena Dubrova
2022/806 (PDF ) Multi-key and Multi-input Predicate Encryption from Learning with Errors Danilo Francati, Daniele Friolo, Giulio Malavolta, Daniele Venturi
2022/805 (PDF ) Authenticated Consensus in Synchronous Systems with Mixed Faults Ittai Abraham, Danny Dolev, Alon Kagan, Gilad Stern
2022/804 (PDF ) Review of the White-Box Encodability of NIST Lightweight Finalists Alex Charlès, Chloé Gravouil
2022/803 (PDF ) How to Avoid Repetitions in Lattice-based Deniable Zero-Knowledge Proofs Xavier Arnal, Abraham Cano, Tamara Finogina, Javier Herranz
2022/802 (PDF ) VERI-ZEXE: Decentralized Private Computation with Universal Setup Alex Luoyuan Xiong, Binyi Chen, Zhenfei Zhang, Benedikt Bünz, Ben Fisch, Fernando Krell, Philippe Camacho
2022/801 (PDF ) Secure and Robust Key-Trapped Design-for-Security Architecture for Protecting Obfuscated Logic Hadi Mardani Kamali
2022/800 (PDF ) BarnOwl: Secure Comparisons using Silent Pseudorandom Correlation Generators Sameer Wagh
2022/799 (PDF ) Tight Bounds on the Randomness Complexity of Secure Multiparty Computation Vipul Goyal, Yuval Ishai, Yifan Song
2022/798 (PDF ) One Hot Garbling David Heath, Vladimir Kolesnikov
2022/797 (PDF ) Garbled Circuits With Sublinear Evaluator Abida Haque, David Heath, Vladimir Kolesnikov, Steve Lu, Rafail Ostrovsky, Akash Shah
2022/796 (PDF ) Safe Permissionless Consensus Youer Pu, Lorenzo Alvisi, Ittay Eyal
2022/795 (PDF ) Efficient Generic Arithmetic for KKW Practical Linear: MPC-in-the-Head NIZK on Commodity Hardware without Trusted Setup David Heath, Vladimir Kolesnikov, Jiahui Lu
2022/794 (PDF ) Generation of "independent" points on elliptic curves by means of Mordell--Weil lattices Dmitrii Koshelev
2022/793 (PDF ) LLAMA: A Low Latency Math Library for Secure Inference Kanav Gupta, Deepak Kumaraswamy, Nishanth Chandran, Divya Gupta
2022/792 (PDF ) Reliable Password Hardening Service with Opt-Out Chunfu Jia, Shaoqiang Wu, Ding Wang
2022/791 (PDF ) log*-Round Game-Theoretically-Fair Leader Election Ilan Komargodski, Shin’ichiro Matsuo, Elaine Shi, Ke Wu
2022/790 (PDF ) A Toolbox for Barriers on Interactive Oracle Proofs Gal Arnon, Amey Bhangale, Alessandro Chiesa, Eylon Yogev
2022/789 (PDF ) Mind the TWEAKEY Schedule: Cryptanalysis on SKINNYe-64-256 Lingyue Qin, Xiaoyang Dong, Anyu Wang, Jialiang Hua, Xiaoyun Wang
2022/788 (PDF ) Improved Preimage Attacks on Round-Reduced Keccak-384/512 Le He, Xiaoen Lin, Hongbo Yu, Jian Guo
2022/787 (PDF ) Block Cipher's Substitution Box Generation Based on Natural Randomness in Underwater Acoustics and Knight's Tour Chain Muhammad Fahad Khan, Khalid Saleem, Tariq Shah, Mohmmad Mazyad Hazzazi, Ismail Bahkali, Piyush Kumar Shukla
2022/786 (PDF ) On the necessity of collapsing Marcel Dall'Agnol, Nicholas Spooner
2022/785 (PDF ) Shorter Hash-and-Sign Lattice-Based Signatures Thomas Espitau, Mehdi Tibouchi, Alexandre Wallet, Yang Yu
2022/784 (PDF ) Fully Privacy-Preserving Federated Representation Learning via Secure Embedding Aggregation Jiaxiang Tang, Jinbao Zhu, Songze Li, Kai Zhang, Lichao Sun
2022/783 (PDF ) Augmented Random Oracles Mark Zhandry
2022/782 (PDF ) Simon’s Algorithm and Symmetric Crypto: Generalizations and Automatized Applications Federico Canale, Gregor Leander, Lukas Stennes
2022/781 (PDF ) Linear Communication in Malicious Majority MPC S. Dov Gordon, Phi Hung Le, Daniel McVicker
2022/780 (PDF ) An Efficient Threshold Access-Structure for RLWE-Based Multiparty Homomorphic Encryption Christian Mouchet, Elliott Bertrand, Jean-Pierre Hubaux
2022/779 (PDF ) New Lattice Two-Stage Sampling Technique and its Applications to Functional Encryption -- Stronger Security and Smaller Ciphertexts Qiqi Lai, Feng-Hao Liu, Zhedong Wang
2022/778 (PDF ) SPHINCS+C: Compressing SPHINCS+ With (Almost) No Cost Mikhail Kudinov, Andreas Hülsing, Eyal Ronen, Eylon Yogev
2022/777 (PDF ) Arithmetization of Σ¹₁ relations in Halo 2 Morgan Thomas
2022/776 (PDF ) Balanced Byzantine Reliable Broadcast with Near-Optimal Communication and Improved Computation Nicolas Alhaddad, Sourav Das, Sisi Duan, Ling Ren, Mayank Varia, Zhuolun Xiang, Haibin Zhang
2022/775 (PDF ) Asynchronous Verifiable Information Dispersal with Near-Optimal Communication Nicolas Alhaddad, Sourav Das, Sisi Duan, Ling Ren, Mayank Varia, Zhuolun Xiang, Haibin Zhang
2022/773 (PDF ) Adaptive versus Static Multi-oracle Algorithms, and Quantum Security of a Split-key PRF Jelle Don, Serge Fehr, Yu-Hsuan Huang
2022/772 (PDF ) Maliciously Secure Multi-Party PSI with Lower Bandwidth and Faster Computation Zhi Qiu, Kang Yang, Yu Yu, Lijing Zhou
2022/771 (PDF ) Field Instruction Multiple Data Khin Mi Mi Aung, Enhui Lim, Jun Jie Sim, Benjamin Hong Meng Tan, Huaxiong Wang, Sze Ling Yeo
2022/770 (PDF ) Password-Authenticated Key Exchange from Group Actions Michel Abdalla, Thorsten Eisenhofer, Eike Kiltz, Sabrina Kunzweiler, Doreen Riepel
2022/769 (PDF ) Faster Beta Weil Pairing on BLS Pairing Friendly Curves with Odd Embedding Degree Azebaze Guimagang Laurian, Fouotsa Emmanuel, El Mrabet Nadia, Pecha Njiahouo Aminatou
2022/768 (PDF ) Public-Key Watermarking Schemes for Pseudorandom Functions Rupeng Yang, Zuoxia Yu, Man Ho Au, Willy Susilo
2022/767 (PDF ) A New Approach to Efficient Non-Malleable Zero-Knowledge Allen Kim, Xiao Liang, Omkant Pandey
2022/766 (PDF ) The Cost of Statistical Security in Interactive Proofs for Repeated Squaring Cody Freitag, Ilan Komargodski
2022/765 (PDF ) Rotational Differential-Linear Distinguishers of ARX Ciphers with Arbitrary Output Linear Masks Zhongfeng Niu, Siwei Sun, Yunwen Liu, Chao Li
2022/764 (PDF ) Efficient Proofs of Retrievability using Expander Codes Françoise Levy-dit-Vehel, Maxime Roméas
2022/763 (PDF ) SoK: Assumptions Underlying Cryptocurrency Deanonymizations -- A Taxonomy for Scientific Experts and Legal Practitioners Dominic Deuber, Viktoria Ronge, Christian Rückert
2022/762 (PDF ) The Price of Verifiability: Lower Bounds for Verifiable Random Functions Nicholas Brandt, Dennis Hofheinz, Julia Kastner, Akin Ünal
2022/761 (PDF ) A Quantum Analysis of Nested Search Problems with Applications in Cryptanalysis André Schrottenloher, Marc Stevens
2022/760 (PDF ) Privacy Preserving Opinion Aggregation Aggelos Kiayias, Vanessa Teague, Orfeas Stefanos Thyfronitis Litos
2022/759 (PDF ) SwiftEC: Shallue–van de Woestijne Indifferentiable Function To Elliptic Curves Jorge Chávez-Saab, Francisco Rodrı́guez-Henrı́quez, Mehdi Tibouchi
2022/758 (PDF ) Static vs. Adaptive Security in Perfect MPC: A Separation and the Adaptive Security of BGW Gilad Asharov, Ran Cohen, Oren Shochat
2022/757 (PDF ) SortingHat: Efficient Private Decision Tree Evaluation via Homomorphic Encryption and Transciphering Kelong Cong, Debajyoti Das, Jeongeun Park, Hilder V. L. Pereira
2022/756 (PDF ) Curve Trees: Practical and Transparent Zero-Knowledge Accumulators Matteo Campanelli, Mathias Hall-Andersen, Simon Holmgaard Kamp
2022/755 (PDF ) Low-latency Hardware Architecture for VDF Evaluation in Class Groups Danyang Zhu, Jing Tian, Minghao Li, Zhongfeng Wang
2022/754 (PDF ) Quantum impossible differential attacks: Applications to AES and SKINNY Nicolas David, María Naya-Plasencia, André Schrottenloher
2022/753 (PDF ) Fast MILP Models for Division Property Patrick Derbez, Baptiste Lambin
2022/752 (PDF ) Provably Minimum Data Complexity Integral Distinguisher Based on Conventional Division Property Akram Khalesi, Zahra Ahmadian
2022/751 (PDF ) SCALES: MPC with Small Clients and Larger Ephemeral Servers Anasuya Acharya, Carmit Hazay, Vladimir Kolesnikov, Manoj Prabhakaran
2022/750 (PDF ) The Ideal Functionalities for Private Set Union, Revisited Yanxue Jia, Shi-Feng Sun, Hong-Sheng Zhou, Dawu Gu
2022/749 (PDF ) Cryptanalysis of Draco Subhadeep Banik
2022/748 (PDF ) 2DT-GLS: Faster and exception-free scalar multiplication in the GLS254 binary curve Marius A. Aardal, Diego F. Aranha
2022/747 (PDF ) More Inputs Makes Difference: Implementations of Linear Layers Using Gates with More Than Two Inputs Qun Liu, Weijia Wang, Ling Sun, Yanhong Fan, Lixuan Wu, Meiqin Wang
2022/746 (PDF ) Efficient Proofs of Knowledge for Threshold Relations Gennaro Avitabile, Vincenzo Botta, Daniele Friolo, Ivan Visconti
2022/745 (PDF ) Throwing Boomerangs into Feistel Structures: Application to CLEFIA, WARP, LBlock, LBlock-s and TWINE Hosein Hadipour, Marcel Nageler, Maria Eichlseder
2022/744 (PDF ) MoNet: A Fast Payment Channel Network for Scriptless Cryptocurrency Monero Zhimei Sui, Joseph K. Liu, Jiangshan Yu, Xianrui Qin
2022/743 (PDF ) How Efficient are Replay Attacks against Vote Privacy? A Formal Quantitative Analysis David Mestel, Johannes Mueller, Pascal Reisert
2022/742 (PDF ) Application of Automorphic Forms to Lattice Problems Samed Düzlü, Juliane Krämer
2022/741 (PDF ) Sapic+: protocol verifiers of the world, unite! Vincent Cheval, Charlie Jacomme, Steve Kremer, Robert Künnemann
2022/740 (PDF ) Practical Privacy-Preserving Authentication for SSH Lawrence Roy, Stanislav Lyakhov, Yeongjin Jang, Mike Rosulek
2022/739 (PDF ) Updatable Encryption from Group Actions Antonin Leroux, Maxime Roméas
2022/738 (PDF ) Secure Search on Multi-key Homomorphically Encrypted Data with Finite Fields Buvana Ganesh, Paolo Palmieri
2022/737 (PDF ) Side-channel and Fault-injection attacks over Lattice-based Post-quantum Schemes (Kyber, Dilithium): Survey and New Results Prasanna Ravi, Anupam Chattopadhyay, Jan Pieter D'Anvers, Anubhab Baksi
2022/736 (PDF ) Mathematical Aspects of Division Property Phil Hebborn, Gregor Leander, Aleksei Udovenko
2022/735 (PDF ) Multiparty Private Set Intersection Cardinality and Its Applications Ni Trieu, Avishay Yanai, Jiahui Gao
2022/734 (PDF ) Tight Preimage Resistance of the Sponge Construction Charlotte Lefevre, Bart Mennink
2022/733 (PDF ) Breaking the quadratic barrier: Quantum cryptanalysis of Milenage, telecommunications’ cryptographic backbone Vincent Ulitzsch, Jean-Pierre Seifert
2022/732 (PDF ) Structure-Preserving Compilers from New Notions of Obfuscations Matteo Campanelli, Danilo Francati, Claudio Orlandi
2022/731 (PDF ) Triangulating Rebound Attack on AES-like Hashing Xiaoyang Dong, Jian Guo, Shun Li, Phuong Pham
2022/730 (PDF ) New Dolev-Reischuk Lower Bounds Meet Blockchain Eclipse Attacks Ittai Abraham, Gilad Stern
2022/729 (PDF ) Integral Cryptanalysis of WARP based on Monomial Prediction Hosein Hadipour, Maria Eichlseder
2022/728 (PDF ) Snowball: Another View on Side-Channel Key Recovery Tools Jiangshan Long, Changhai Ou, Zhu Wang, Shihui Zheng, Fei Yan, Fan Zhang, Siew-Kei Lam
2022/727 (PDF ) A Lower Bound for Proving Hardness of Learning with Rounding with Polynomial Modulus Parker Newton, Silas Richelson
2022/726 (PDF ) Radix-3 NTT-Based Polynomial Multiplication for Lattice-Based Cryptography Chenar Abdulla Hassan, Oğuz Yayla
2022/725 (PDF ) Revisiting Related-Key Boomerang attacks on AES using computer-aided tool Patrick Derbez, Marie Euler, Pierre-Alain Fouque, Phuong Hoa Nguyen
2022/724 (PDF ) A Power Side-Channel Attack on the Reed-Muller Reed-Solomon Version of the HQC Cryptosystem Thomas Schamberger, Lukas Holzbaur, Julian Renner, Antonia Wachter-Zeh, Georg Sigl
2022/723 (PDF ) Optimizing Rectangle Attacks: A Unified and Generic Framework for Key Recovery Ling Song, Nana Zhang, Qianqian Yang, Danping Shi, Jiahao Zhao, Lei Hu, Jian Weng
2022/722 (PDF ) Speedy Error Reconciliation Kaibo Liu, Xiaozhuo Gu, Peixin Ren, Xuwen Nie
2022/721 (PDF ) Fast Multi-party Private Set Operations in the Star Topology from Secure ANDs and ORs Jelle Vos, Mauro Conti, Zekeriya Erkin
2022/720 (PDF ) A Model Set Method to Search Integral Distinguishers Based on Division Property for Block Ciphers Huawei Liu, Zilong Wang, Liu Zhang
2022/719 (PDF ) Contingent payments from two-party signing and verification for abelian groups Sergiu Bursuc, Sjouke Mauw
2022/718 (PDF ) A Post-Quantum Four-Party Outsourced Authentication Reza Ghasemi, Alptekin Küpçü
2022/717 (PDF ) Cross Chain Atomic Swaps in the Absence of Time via Attribute Verifiable Timed Commitments Yacov Manevich, Adi Akavia
2022/716 (PDF ) x-Superoptimal Pairings on some Elliptic Curves with Odd Prime Embedding Degrees Emmanuel Fouotsa, Azebaze Guimagang Laurian, Ayissi Raoul
2022/715 (PDF ) Breaking and Fixing Speculative Load Hardening Zhiyuan Zhang, Gilles Barthe, Chitchanok Chuengsatiansup, Peter Schwabe, Yuval Yarom
2022/714 (PDF ) MicroFedML: Privacy Preserving Federated Learning for Small Weights Yue Guo, Antigoni Polychroniadou, Elaine Shi, David Byrd, Tucker Balch
2022/713 (PDF ) More Efficient (Reusable) Private Set Union Dov Gordon, Carmit Hazay, Phi Hung Le, Mingyu Liang
2022/712 (PDF ) The Hardness of LPN over Any Integer Ring and Field for PCG Applications Hanlin Liu, Xiao Wang, Kang Yang, Yu Yu
2022/711 (PDF ) Efficient and Adaptively Secure Asynchronous Binary Agreement via Binding Crusader Agreement Ittai Abraham, Naama Ben-David, Sravya Yandamuri
2022/710 (PDF ) Advanced Signature Functionalities from the Code Equivalence Problem Alessandro Barenghi, Jean-Francois Biasse, Tran Ngo, Edoardo Persichetti, Paolo Santini
2022/709 (PDF ) Some Easy Instances of Ideal-SVP and Implications on the Partial Vandermonde Knapsack Problem Katharina Boudgoust, Erell Gachon, Alice Pellet-Mary
2022/708 (PDF ) An Estimator for the Hardness of the MQ Problem Emanuele Bellini, Rusydi H. Makarim, Carlo Sanna, Javier Verbel
2022/707 (PDF ) Efficiently Masking Polynomial Inversion at Arbitrary Order Markus Krausz, Georg Land, Jan Richter-Brockmann, Tim Güneysu
2022/706 (PDF ) Finding and Evaluating Parameters for BGV Johannes Mono, Chiara Marcolla, Georg Land, Tim Güneysu, Najwa Aaraj
2022/705 (PDF ) Linear-map Vector Commitments and their Practical Applications Matteo Campanelli, Anca Nitulescu, Carla Ràfols, Alexandros Zacharakis, Arantxa Zapico
2022/704 (PDF ) Parameter Optimization & Larger Precision for (T)FHE Loris Bergerat, Anas Boudi, Quentin Bourgerie, Ilaria Chillotti, Damien Ligier, Jean-Baptiste Orfila, Samuel Tap
2022/703 (PDF ) Proof-of-possession for KEM certificates using verifiable generation Tim Güneysu, Philip Hodges, Georg Land, Mike Ounsworth, Douglas Stebila, Greg Zaverucha
2022/701 (PDF ) Truncated Boomerang Attacks and Application to AES-based Ciphers Augustin Bariant, Gaëtan Leurent
2022/700 (PDF ) Grief-free Atomic Swaps Tejaswi Nadahalli, Majid Khabbazian, Roger Wattenhofer
2022/699 (PDF ) On the Quantum Security of OCB Varun Maram, Daniel Masny, Sikhar Patranabis, Srinivasan Raghuraman
2022/698 (PDF ) State Machine Replication under Changing Network Conditions Andreea B. Alexandru, Erica Blum, Jonathan Katz, Julian Loss
2022/697 (PDF ) Rate-1 Incompressible Encryption from Standard Assumptions Pedro Branco, Nico Döttling, Jesko Dujmovic
2022/696 (PDF ) On the Impossibility of Algebraic Vector Commitments in Pairing-Free Groups Dario Catalano, Dario Fiore, Rosario Gennaro, Emanuele Giunta
2022/695 (PDF ) Yet Another Algebraic Cryptanalysis of Small Scale Variants of AES Marek Bielik, Martin Jureček, Olha Jurečková, Róbert Lórencz
2022/694 (PDF ) Squirrel: Efficient Synchronized Multi-Signatures from Lattices Nils Fleischhacker, Mark Simkin, Zhenfei Zhang
2022/693 (PDF ) Unified View for Notions of Bit Security Shun Watanabe, Kenji Yasunaga
2022/691 (PDF ) QuORAM: A Quorum-Replicated Fault Tolerant ORAM Datastore Sujaya Maiyya, Seif Ibrahim, Caitlin Scarberry, Divyakant Agrawal, Amr El Abbadi, Huijia Lin, Stefano Tessaro, Victor Zakhary
2022/690 (PDF ) Authentication in the Bounded Storage Model Yevgeniy Dodis, Willy Quach, Daniel Wichs
2022/689 (PDF ) Tight Multi-User Security Bound of $\textsf{DbHtS}$ Nilanjan Datta, Avijit Dutta, Mridul Nandi, Suprita Talnikar
2022/688 (PDF ) Memory-Efficient Single Data-Complexity Attacks on LowMC Using Partial Sets Subhadeep Banik, Khashayar Barooti, Andrea Caforio, Serge Vaudenay
2022/687 (PDF ) Adaptively Secure Single Secret Leader Election from DDH Dario Catalano, Dario Fiore, Emanuele Giunta
2022/686 (PDF ) Proof of Mirror Theory for a Wide Range of $\xi_{\max}$ Benoît Cogliati, Avijit Dutta, Mridul Nandi, Jacques Patarin, Abishanka Saha
2022/685 (PDF ) Error Leakage using Timing Channel in FHE Ciphertexts from TFHE Library Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay
2022/684 (PDF ) RSK: A Bitcoin sidechain with stateful smart-contracts Sergio Demian Lerner, Javier Álvarez Cid-Fuentes, Julian Len, Ramsès Fernàndez-València, Patricio Gallardo, Nicolás Vescovo, Raúl Laprida, Shreemoy Mishra, Federico Jinich, Diego Masini
2022/683 (PDF ) Quantum Analysis of AES Kyungbae Jang, Anubhab Baksi, Hyunji Kim, Gyeongju Song, Hwajeong Seo, Anupam Chattopadhyay
2022/682 (PDF ) Secure Federated Clustering Songze Li, Sizai Hou, Baturalp Buyukates, Salman Avestimehr
2022/681 (PDF ) Refuting the Dream XOR Lemma via Ideal Obfuscation and Resettable MPC Saikrishna Badrinarayanan, Yuval Ishai, Dakshita Khurana, Amit Sahai, Daniel Wichs
2022/680 (PDF ) Practical Delegatable Anonymous Credentials From Equivalence Class Signatures Omid Mir, Daniel Slamanig, Balthazar Bauer, René Mayrhofer
2022/679 (PDF ) Vandermonde meets Regev: Public Key Encryption Schemes Based on Partial Vandermonde Problems Katharina Boudgoust, Amin Sakzad, Ron Steinfeld
2022/678 (PDF ) New Constructions of Collapsing Hashes Mark Zhandry
2022/677 (PDF ) A Conjecture on Hermite Constants Leon Mächler, David Naccache
2022/676 (PDF ) Finding many Collisions via Reusable Quantum Walks Xavier Bonnetain, André Chailloux, André Schrottenloher, Yixin Shen
2022/675 (PDF ) MPClan: Protocol Suite for Privacy-Conscious Computations Nishat Koti, Shravani Patil, Arpita Patra, Ajith Suresh
2022/674 (PDF ) A Note on Key Ranking for Optimal Collision Side-Channel Attacks Cezary Glowacz
2022/673 (PDF ) Meet-in-the-Filter and Dynamic Counting with Applications to Speck Alex Biryukov, Luan Cardoso dos Santos, Je Sen Teh, Aleksei Udovenko, Vesselin Velichkov
2022/672 (PDF ) CENSOR: Privacy-preserving Obfuscation for Outsourcing SAT formulas Tassos Dimitriou, Khazam Alhamdan
2022/671 (PDF ) The Gap Is Sensitive to Size of Preimages: Collapsing Property Doesn't Go Beyond Quantum Collision-Resistance for Preimages Bounded Hash Functions Shujiao Cao, Rui Xue
2022/670 (PDF ) Practical UC-Secure Zero-Knowledge Smart Contracts Jayamine Alupotha, Xavier Boyen
2022/669 (PDF ) On those Boolean functions that are coset leaders of first order Reed-Muller codes Claude Carlet, Serge Feukoua
2022/668 (PDF ) Key-Reduced Variants of 3kf9 with Beyond-Birthday-Bound Security Yaobin Shen, Ferdinand Sibleyras
2022/667 (PDF ) Arithmetic Tuples for MPC Pascal Reisert, Marc Rivinius, Toomas Krips, Ralf Kuesters
2022/666 (PDF ) Deciding and reconstructing linear equivalence of uniformly distributed functions Ivana Ivkovic, Nikolay Kaleyski
2022/665 (PDF ) NOVA, a Noncommutative-ring Based Unbalanced Oil and Vinegar Signature Scheme with Key-randomness Alignment Lih-Chung Wang, Po-En Tseng, Yen-Liang Kuan, Chun-Yen Chou
2022/664 (PDF ) The $c-$differential uniformity and boomerang uniformity of three classes of permutation polynomials over $\mathbb{F}_{2^n}$ Qian Liu, Zhiwei Huang, Jianrui Xie, Ximeng Liu, Jian Zou
2022/663 (PDF ) SafeNet: The Unreasonable Effectiveness of Ensembles in Private Collaborative Learning Harsh Chaudhari, Matthew Jagielski, Alina Oprea
2022/662 (PDF ) SHORTSTACK : Distributed, Fault-tolerant, Oblivious Data Access Midhul Vuppalapati, Kushal Babel, Anurag Khandelwal, Rachit Agarwal
2022/661 (PDF ) Protego: Efficient, Revocable and Auditable Anonymous Credentials with Applications to Hyperledger Fabric Aisling Connolly, Jerome Deschamps, Pascal Lafourcade, Octavio Perez Kempner
2022/660 (PDF ) Secure Sampling with Sublinear Communication Seung Geol Choi, Dana Dachman-Soled, S. Dov Gordon, Linsheng Liu, Arkady Yerukhimovich
2022/659 (PDF ) ABE for Circuits with Constant-Size Secret Keys and Adaptive Security Hanjun Li, Huijia Lin, Ji Luo
2022/658 (PDF ) Unclonable Polymers and Their Cryptographic Applications Ghada Almashaqbeh, Ran Canetti, Yaniv Erlich, Jonathan Gershoni, Tal Malkin, Itsik Pe’er, Anna Roitburd-Berman, Eran Tromer
2022/657 (PDF ) BASALISC: Programmable Asynchronous Hardware Accelerator for BGV Fully Homomorphic Encryption Robin Geelen, Michiel Van Beirendonck, Hilder V. L. Pereira, Brian Huffman, Tynan McAuley, Ben Selfridge, Daniel Wagner, Georgios Dimou, Ingrid Verbauwhede, Frederik Vercauteren, David W. Archer
2022/656 (PDF ) Quantum Augmented Dual Attack Martin R. Albrecht, Yixin Shen
2022/655 (PDF ) Bit Security as Cost to Observe Advantage: Towards the Definition from THE BOOK Keewoo Lee
2022/654 (PDF ) Torsion point attacks on ``SIDH-like'' cryptosystems Péter Kutas, Christophe Petit
2022/653 (PDF ) Fast Unbalanced Private Set Union from Fully Homomorphic Encryption Binbin Tu, Yu Chen, Qi Liu, Cong Zhang
2022/652 (PDF ) Private Set Operations from Multi-Query Reverse Private Membership Test Yu Chen, Min Zhang, Cong Zhang, Minglang Dong, Weiran Liu
2022/651 (PDF ) Revisiting the Efficiency of Asynchronous Multi Party Computation Against General Adversaries Ananya Appan, Anirudh Chandramouli, Ashish Choudhury
2022/650 (PDF ) Supersingular Non-Superspecial Abelian Surfaces in Cryptography Jason T. LeGrow, Yan Bo Ti, Lukas Zobernig
2022/649 (PDF ) IBE with Incompressible Master Secret and Small Identity Secrets Nico Döttling, Sanjam Garg, Sruthi Sekar, Mingyuan Wang
2022/648 (PDF ) Dynamic Searchable Encryption with Optimal Search in the Presence of Deletions Javad Ghareh Chamani, Dimitrios Papadopoulos, Mohammadamin Karbasforushan, Ioannis Demertzis
2022/647 (PDF ) Quantum Implementation and Analysis of DEFAULT Kyungbae Jang, Anubhab Baksi, Jakub Breier, Hwajeong Seo, Anupam Chattopadhyay
2022/645 (PDF ) Round-Optimal Multi-Party Computation with Identifiable Abort Michele Ciampi, Divya Ravi, Luisa Siniscalchi, Hendrik Waldner
2022/644 (PDF ) DiLizium 2.0: Revisiting 2-out-of-2 threshold Dilithium Peeter Laud, Nikita Snetkov, Jelizaveta Vakarjuk
2022/643 (PDF ) Accelerating the Best Trail Search on AES-Like Ciphers Seonggyeom Kim, Deukjo Hong, Jaechul Sung, Seokhie Hong
2022/642 (PDF ) Statistical Effective Fault Attacks: The other Side of the Coin Navid Vafaei, Sara Zarei, Nasour Bagheri, Maria Eichlseder, Robert Primas, Hadi Soleimany
2022/641 (PDF ) Self-Timed Masking: Implementing Masked S-Boxes Without Registers Mateus Simões, Lilian Bossuet, Nicolas Bruneau, Vincent Grosso, Patrick Haddad, Thomas Sarno
2022/640 (PDF ) Dialektos: Privacy-preserving Smart Contracts Tadas Vaitiekūnas
2022/639 (PDF ) Anamorphic Encryption: Private Communication against a Dictator Giuseppe Persiano, Duong Hieu Phan, Moti Yung
2022/638 (PDF ) Impossibilities in Succinct Arguments: Black-box Extraction and More Matteo Campanelli, Chaya Ganesh, Hamidreza Khoshakhlagh, Janno Siim
2022/637 (PDF ) Conditional Attribute-Based Proxy Re-Encryption and Its Instantiation Lisha Yao, Jian Weng, Bimei Wang
2022/636 (PDF ) Integer Syndrome Decoding in the Presence of Noise Vlad-Florin Dragoi, Brice Colombier, Pierre-Louis Cayrel, Vincent Grosso
2022/635 (PDF ) Post-Quantum Secure Boot on Vehicle Network Processors Joppe W. Bos, Brian Carlson, Joost Renes, Marius Rotaru, Daan Sprenkels, Geoffrey P. Waters
2022/634 (PDF ) Round-Optimal Lattice-Based Threshold Signatures, Revisited Shweta Agrawal, Damien Stehle, Anshu Yadav
2022/633 (PDF ) CUDA-Accelerated RNS Multiplication in Word-Wise Homomorphic Encryption Schemes Shiyu Shen, Hao Yang, Yu Liu, Zhe Liu, Yunlei Zhao
2022/632 (PDF ) Recovering Rainbow's Secret Key with a First-Order Fault Attack Thomas Aulbach, Tobias Kovats, Juliane Krämer, Soundes Marzougui
2022/631 (PDF ) Watermarking PRFs against Quantum Adversaries Fuyuki Kitagawa, Ryo Nishimaki
2022/630 (PDF ) Enforcing fine-grained constant-time policies Basavesh Ammanaghatta Shivakumar, Gilles Barthe, Benjamin Grégoire, Vincent Laporte, Swarn Priya
2022/629 (PDF ) Feel the Quantum Functioning: Instantiating Generic Multi-Input Functional Encryption from Learning with Errors (extended version)? Alexandros Bakas, Antonis Michalas, Eugene Frimpong, Reyhaneh Rabbaninejad
2022/628 (PDF ) High-Performance Polynomial Multiplication Hardware Accelerators for KEM Saber and NTRU Elizabeth Carter, Pengzhou He, Jiafeng Xie
2022/627 (PDF ) Secure Hierarchical Deterministic Wallet Supporting Stealth Address Xin Yin, Zhen Liu, Guomin Yang, Guoxing Chen, Haojin Zhu
2022/626 (PDF ) The Simplest SAT Model of Combining Matsui's Bounding Conditions with Sequential Encoding Method Senpeng Wang, Dengguo Feng, Bin Hu, Jie Guan, Tairong Shi, Kai Zhang
2022/625 (PDF ) Dashing and Star: Byzantine Fault Tolerance Using Weak Certificates Sisi Duan, Haibin Zhang, Xiao Sui, Baohan Huang, Changchun Mu, Gang Di, Xiaoyun Wang
2022/624 (PDF ) Cryptanalysis of Three Quantum Money Schemes Andriyan Bilyk, Javad Doliskani, Zhiyong Gong
2022/623 (PDF ) Fast Fully Secure Multi-Party Computation over Any Ring with Two-Thirds Honest Majority Anders Dalskov, Daniel Escudero, Ariel Nof
2022/622 (PDF ) Efficient and Accurate homomorphic comparisons Olive Chakraborty, Martin Zuber
2022/621 (PDF ) Caulk: Lookup Arguments in Sublinear Time Arantxa Zapico, Vitalik Buterin, Dmitry Khovratovich, Mary Maller, Anca Nitulescu, Mark Simkin
2022/620 (PDF ) Synthesizing Quantum Circuits of AES with Lower T-depth and Less Qubits Zhenyu Huang, Siwei Sun
2022/619 (PDF ) Proactive Secret Sharing over Asynchronous Channels under Honest Majority (with Ephemeral Roles): Refreshing Without a Consistent View on Shares Matthieu Rambaud, Antoine Urban
2022/618 (PDF ) A simple proof of ARX completeness Adriano Koleci
2022/617 (PDF ) SO-CCA Secure PKE in the Quantum Random Oracle Model or the Quantum Ideal Cipher Model Shingo Sato, Junji Shikata
2022/616 (PDF ) Post-Quantum Anonymous One-Sided Authenticated Key Exchange without Random Oracles Ren Ishibashi, Kazuki Yoneyama
2022/615 (PDF ) Smoothing Codes and Lattices: Systematic Study and New Bounds Thomas Debris, Léo Ducas, Nicolas Resch, Jean-Pierre Tillich
2022/614 (PDF ) PPRKS: A Privacy Preserving Range Keyword Search Scheme Yu Zhang, Zongbin Wang, Tihong Qin
2022/613 (PDF ) GLUE: Generalizing Unbounded Attribute-Based Encryption for Flexible Efficiency Trade-Offs Marloes Venema, Greg Alpár
2022/612 (PDF ) Cryptanalysis of Reduced Round SPEEDY Raghvendra Rohit, Santanu Sarkar
2022/611 (PDF ) Further Cryptanalysis of a Type of RSA Variants Gongyu Shi, Geng Wang, Dawu Gu
2022/610 (PDF ) On the Differential Spectrum of a Differentially $3$-Uniform Power Function Tingting Pang, Nian Li, Xiangyong Zeng
2022/609 (PDF ) Optimal Single-Server Private Information Retrieval Mingxun Zhou, Wei-Kai Lin, Yiannis Tselekounis, Elaine Shi
2022/608 (PDF ) Practical Provably Secure Flooding for Blockchains Chen-Da Liu-Zhang, Christian Matt, Ueli Maurer, Guilherme Rito, Søren Eller Thomsen
2022/607 (PDF ) Noise*: A Library of Verified High-Performance Secure Channel Protocol Implementations (Long Version) Son Ho, Jonathan Protzenko, Abhishek Bichhawat, Karthikeyan Bhargavan
2022/606 (PDF ) Security Against Honorific Adversaries: Efficient MPC with Server-aided Public Verifiability Li Duan, Yufan Jiang, Yong Li, Jörn Müller-Quade, Andy Rupp
2022/605 (PDF ) Weighted Attribute-Based Encryption with Parallelized Decryption Alexandru Ionita
2022/604 (PDF ) Algorithm Substitution Attacks against Receivers Marcel Armour, Bertram Poettering
2022/603 (PDF ) Distributed Blockchain Price Oracle Léonard Lys, Maria Potop-Butucaru
2022/602 (PDF ) Combined Fault Injection and Real-Time Side-Channel Analysis for Android Secure-Boot Bypassing Clément Fanjas, Clément Gaine, Driss Aboulkassimi, Simon Pontié, Olivier Potin
2022/601 (PDF ) A Better Method to Analyze Blockchain Consistency Lucianna Kiffer, Rajmohan Rajaraman, abhi shelat
2022/600 (PDF ) A Nearly Tight Proof of Duc et al.'s Conjectured Security Bound for Masked Implementations Loïc Masure, Olivier Rioul, François-Xavier Standaert
2022/599 (PDF ) TenderTee: Secure Tendermint Lionel Beltrando, Maria Potop-Butucaru, Jose Alfaro
2022/598 (PDF ) Verifiable and forward private conjunctive keyword search from DIA tree Laltu Sardar, Sushmita Ruj
2022/597 (PDF ) Foundations of Dynamic BFT Sisi Duan, Haibin Zhang
2022/596 (PDF ) Zero Knowledge Proofs of Elliptic Curve Inner Products from Principal Divisors and Weil Reciprocity Liam Eagen
2022/595 (PDF ) On the Cryptographic Fragility of the Telegram Ecosystem Theo von Arx, Kenneth G. Paterson
2022/592 (PDF ) Chaghri --- an FHE-friendly Block Cipher Tomer Ashur, Mohammad Mahzoun, Dilara Toprakhisar
2022/591 (PDF ) Software Evaluation for Second Round Candidates in NIST Lightweight Cryptography Ryota Hira, Tomoaki Kitahara, Daiki Miyahara, Yuko Hara-Azumi, Yang Li, Kazuo Sakiyama
2022/590 (PDF ) Secure Merge in Linear Time and O(log log N) Rounds Mark Blunk, Paul Bunn, Samuel Dittmer, Steve Lu, Rafail Ostrovsky
2022/589 (PDF ) Unnecessary Input Heuristics & PayJoin Transactions Simin Ghesmati, Andreas Kern, Aljosha Judmayer, Nicholas Stifter and
2022/588 (PDF ) Efficient Lifting for Shorter Zero-Knowledge Proofs and Post-Quantum Signatures Daniel Kales, Greg Zaverucha
2022/587 (PDF ) Doubly Efficient Interactive Proofs over Infinite and Non-Commutative Rings Eduardo Soria-Vazquez
2022/586 (PDF ) A survey of elliptic curves for proof systems Diego F. Aranha, Youssef El Housni, Aurore Guillevic
2022/585 (PDF ) Towards Practical Homomorphic Time-Lock Puzzles: Applicability and Verifiability Yi Liu, Qi Wang, Siu-Ming Yiu
2022/584 (PDF ) Revisiting the Uber Assumption in the Algebraic Group Model: Fine-Grained Bounds in Hidden-Order Groups and Improved Reductions in Bilinear Groups Lior Rotem
2022/583 (PDF ) A Fully-Constructive Discrete-Logarithm Preprocessing Algorithm with an Optimal Time-Space Tradeoff Lior Rotem, Gil Segev
2022/582 (PDF ) Ponyta: Foundations of Side-Contract-Resilient Fair Exchange Hao Chung, Elisaweta Masserova, Elaine Shi, Sri AravindaKrishnan Thyagarajan
2022/581 (PDF ) Cryptanalysis of an Identity-Based Provable Data Possession Protocol with Compressed Cloud Storage Lidong Han, Guangwu Xu, Qi Xie, Xiao Tan, Chengliang Tian
2022/580 (PDF ) How to keep text private? A systematic review of deep learning methods for privacy-preserving natural language processing Samuel Sousa, Roman Kern
2022/579 (PDF ) Compact and Efficient KEMs over NTRU Lattices Zhichuang Liang, Boyue Fang, Jieyu Zheng, Yunlei Zhao
2022/578 (PDF ) Fast Skinny-128 SIMD Implementations for Sequential Modes of Operation Alexandre Adomnicai, Kazuhiko Minematsu, Maki Shigeri
2022/577 (PDF ) Construction of generalized-involutory MDS matrices Xuting Zhou, Tianshuo Cong
2022/576 (PDF ) On the Success Rate of Side-Channel Attacks on Masked Implementations: Information-Theoretical Bounds and Their Practical Usage Akira Ito, Rei Ueno, Naofumi Homma
2022/575 (PDF ) Optimizing Homomorphic Encryption Parameters for Arbitrary Applications Charles Gouert, Rishi Khan, Nektarios Georgios Tsoutsos
2022/574 (PDF ) Comparison-Based MPC in Star Topology (Full Version) Gowri R Chandran, Carmit Hazay, Robin Hundt, Thomas Schneider
2022/573 (PDF ) Finding One Common Item, Privately Tyler Beauregard, Janabel Xia, Mike Rosulek
2022/572 (PDF ) Homomorphically counting elements with the same property Ilia Iliashenko, Malika Izabachène, Axel Mertens, Hilder V. L. Pereira.
2022/571 (PDF ) Entropically secure cipher for messages generated by Markov chains with unknown statistics Boris Ryabko
2022/570 (PDF ) Secure and Private Source Coding with Private Key and Decoder Side Information Onur Gunlu, Rafael F. Schaefer, Holger Boche, H. Vincent Poor
2022/569 (PDF ) TinyABE: Unrestricted Ciphertext-Policy Attribute-Based Encryption for Embedded Devices and Low-Quality Networks Marloes Venema, Greg Alpár
2022/568 (PDF ) Improved MITM Cryptanalysis on Streebog Jialiang Hua, Xiaoyang Dong, Siwei Sun, Zhiyu Zhang, Lei Hu, Xiaoyun Wang
2022/567 (PDF ) FC1: A Powerful, Non-Deterministic, Symmetric Key Cipher Michele Fabbrini
2022/566 (PDF ) AntMan: Interactive Zero-Knowledge Proofs with Sublinear Communication Chenkai Weng, Kang Yang, Zhaomin Yang, Xiang Xie, Xiao Wang
2022/565 (PDF ) Power Contracts: Provably Complete Power Leakage Models for Processors Roderick Bloem, Barbara Gigerl, Marc Gourjon, Vedad Hadžić, Stefan Mangard, Robert Primas
2022/564 (PDF ) FAPRIL: Towards Faster Privacy-Preserving Fingerprint-Based Localization Christopher van der Beets, Raine Nieminen, Thomas Schneider
2022/563 (PDF ) Find the Bad Apples: An efficient method for perfect key recovery under imperfect SCA oracles – A case study of Kyber Muyan Shen, Chi Cheng, Xiaohan Zhang, Qian Guo, Tao Jiang
2022/562 (PDF ) Orientations and cycles in supersingular isogeny graphs Sarah Arpin, Mingjie Chen, Kristin E. Lauter, Renate Scheidler, Katherine Stange, Ha T. N. Tran
2022/561 (PDF ) Survey on the Effectiveness of DAPA-Related Attacks against Shift Register Based AEAD Schemes Shivam Bhasin, Dirmanto Jap, Wei Cheng Ng, Siang Meng Sim
2022/560 (PDF ) Distributed Shuffling in Adversarial Environments Kasper Green Larsen, Maciej Obremski, Mark Simkin
2022/559 (PDF ) DeCAF: Decentralizable Continuous Group Key Agreement with Fast Healing Joël Alwen, Benedikt Auerbach, Miguel Cueto Noval, Karen Klein, Guillermo Pascual-Perez, Krzysztof Pietrzak
2022/558 (PDF ) On Seedless PRNGs and Premature Next Sandro Coretti, Yevgeniy Dodis, Harish Karthikeyan, Noah Stephens-Davidowitz, Stefano Tessaro
2022/557 (PDF ) Honest Majority Multi-Prover Interactive Arguments Alexander R. Block, Christina Garman
2022/556 (PDF ) Resumable Zero-Knowledge for Circuits from Symmetric Key Primitives Handong Zhang, Puwen Wei, Haiyang Xue, Yi Deng, Jinsong Li, Wei Wang, Guoxiao Liu
2022/555 (PDF ) Adapting Belief Propagation to Counter Shuffling of NTTs Julius Hermelink, Silvan Streit, Emanuele Strieder, Katharina Thieme
2022/554 (PDF ) Byzantine Reliable Broadcast with $O(nL+kn+n^2 log n)$ Communication Sisi Duan, Haibin Zhang
2022/553 (PDF ) Secure Storage with Deduplication John Best, Wayne Hineman, Steven Hetzler, Guerney Hunt, Charanjit S. Jutla
2022/552 (PDF ) Improving Line-Point Zero Knowledge: Two Multiplications for the Price of One Samuel Dittmer, Yuval Ishai, Steve Lu, Rafail Ostrovsky
2022/551 (PDF ) Marlin: Two-Phase BFT with Linearity Xiao Sui, Sisi Duan, Haibin Zhang
2022/550 (PDF ) ROAST: Robust Asynchronous Schnorr Threshold Signatures Tim Ruffing, Viktoria Ronge, Elliott Jin, Jonas Schneider-Bensch, Dominique Schröder
2022/549 (PDF ) Smart Contracts Obfuscation from Blockchain-based One-time Program Sora Suegami
2022/548 (PDF ) Non-Interactive Zero-Knowledge Proofs with Fine-Grained Security Yuyu Wang, Jiaxin Pan
2022/547 (PDF ) Fast signing method in RSA with high speed verification GyuChol. Kim, YongBok. Jong
2022/546 (PDF ) He-HTLC: Revisiting Incentives in HTLC Sarisht Wadhwa, Jannis Stoeter, Fan Zhang, Kartik Nayak
2022/545 (PDF ) Logic Locking - Connecting Theory and Practice Elisaweta Masserova, Deepali Garg, Ken Mai, Lawrence Pileggi, Vipul Goyal, Bryan Parno
2022/544 (PDF ) Conditional Cube Attacks on Ascon-128 and Ascon-80pq in a Nonce-misuse Setting Donghoon Chang, Deukjo Hong, Jinkeon Kang
2022/543 (PDF ) Aura: private voting with reduced trust on tallying authorities Aram Jivanyan, Aaron Feickert
2022/542 (PDF ) On Valiant's Conjecture: Impossibility of Incrementally Verifiable Computation from Random Oracles Mathias Hall-Andersen, Jesper Buus Nielsen
2022/541 (PDF ) The Generals’ Scuttlebutt: Byzantine-Resilient Gossip Protocols Sandro Coretti, Aggelos Kiayias, Cristopher Moore, Alexander Russell
2022/540 (PDF ) On the revision of NIST 800-22 Test Suites Katarzyna Anna Kowalska, Davide Fogliano, Jose Garcia Coello
2022/539 (PDF ) Post Quantum Noise Yawning Angel, Benjamin Dowling, Andreas Hülsing, Peter Schwabe, Florian Weber
2022/538 (PDF ) Post-Quantum Signatures on RISC-V with Hardware Acceleration Patrick Karl, Jonas Schupp, Tim Fritzmann, Georg Sigl
2022/537 (PDF ) Rubato: Noisy Ciphers for Approximate Homomorphic Encryption (Full Version) Jincheol Ha, Seongkwang Kim, Byeonghak Lee, Jooyoung Lee, Mincheol Son
2022/536 (PDF ) Revamped Differential-Linear Cryptanalysis on Reduced Round ChaCha Sabyasachi Dey, Hirendra Kumar Garai, Santanu Sarkar, Nitin Kumar Sharma
2022/535 (PDF ) Distributed (Correlation) Samplers: How to Remove a Trusted Dealer in One Round Damiano Abram, Peter Scholl, Sophia Yakoubov
2022/534 (PDF ) On the Adaptive Security of the Threshold BLS Signature Scheme Renas Bacho, Julian Loss
2022/533 (PDF ) Băhēm: A Symmetric Cipher with Provable 128-bit Security M. Rajululkahf
2022/532 (PDF ) Hierarchical Galois Key Management Systems for Privacy Preserving AIaaS with Homomorphic Encryption Joon-Woo Lee, Eunsang Lee, Young-Sik Kim, Jong-Seon No
2022/531 (PDF ) Jammin' on the deck Norica Băcuieți, Joan Daemen, Seth Hoffert, Gilles Van Assche, Ronny Van Keer
2022/530 (PDF ) High-speed SABER Key Encapsulation Mechanism in 65nm CMOS Malik Imran, Felipe Almeida, Andrea Basso, Sujoy Sinha Roy, Samuel Pagliarini
2022/529 (PDF ) Laconic Private Set-Intersection From Pairings Diego Aranha, Chuanwei Lin, Claudio Orlandi, Mark Simkin
2022/528 (PDF ) On Random Sampling of Supersingular Elliptic Curves Marzio Mula, Nadir Murru, Federico Pintore
2022/527 (PDF ) PQC-SEP: Power Side-channel Evaluation Platform for Post-Quantum Cryptography Algorithms Jungmin Park, N. Nalla Anandakumar, Dipayan Saha, Dhwani Mehta, Nitin Pundir, Fahim Rahman, Farimah Farahmandi, Mark M. Tehranipoor
2022/526 (PDF ) Optimal Tightness for Chain-Based Unique Signatures Fuchun Guo, Willy Susilo
2022/525 (PDF ) Breaking Goppa-Based McEliece with Hints Elena Kirshanova, Alexander May
2022/524 (PDF ) Inner Product Functional Commitments with Constant-Size Public Parameters and Openings Hien Chu, Dario Fiore, Dimitris Kolonelos, Dominique Schröder
2022/523 (PDF ) A side-channel based disassembler for the ARM-Cortex M0 Jurian van Geest, Ileana Buhan
2022/522 (PDF ) The Case of Small Prime Numbers Versus the Joye-Libert Cryptosystem George Teseleanu
2022/521 (PDF ) On The Distributed Discrete Logarithm Problem with Preprocessing Pavel Hubáček, Ľubica Jančová, Veronika Králová
2022/520 (PDF ) Efficient Verification of the Wesolowski Verifiable Delay Function for Distributed Environments Vidal Attias, Luigi Vigneri, Vassil Dimitrov
2022/519 (PDF ) HARPOCRATES: An Approach Towards Efficient Encryption of Data-at-rest Md Rasid Ali, Debranjan Pal, Abhijit Das, Dipanwita Roychowdhury
2022/518 (PDF ) Failing to hash into supersingular isogeny graphs Jeremy Booher, Ross Bowden, Javad Doliskani, Tako Boris Fouotsa, Steven D. Galbraith, Sabrina Kunzweiler, Simon-Philipp Merz, Christophe Petit, Benjamin Smith, Katherine E. Stange, Yan Bo Ti, Christelle Vincent, José Felipe Voloch, Charlotte Weitkämper, Lukas Zobernig
2022/517 (PDF ) Local permutation polynomials and the action of e-Klenian groups Jaime Gutierrez, Jorge Jimenez Urroz
2022/516 (PDF ) zk-Sherlock: Exposing Hardware Trojans in Zero-Knowledge Dimitris Mouris, Charles Gouert, Nektarios Georgios Tsoutsos
2022/515 (PDF ) MOSFHET: Optimized Software for FHE over the Torus Antonio Guimarães, Edson Borin, Diego F. Aranha
2022/514 (PDF ) A Key-Recovery Side-Channel Attack on Classic McEliece Qian Guo, Andreas Johansson, Thomas Johansson
2022/513 (PDF ) Characteristic Automated Search of Cryptographic Algorithms for Distinguishing Attacks (CASCADA) Adrián Ranea, Vincent Rijmen
2022/512 (PDF ) A Bit-Vector Differential Model for the Modular Addition by a Constant and its Applications to Differential and Impossible-Differential Cryptanalysis Seyyed Arash Azimi, Adrián Ranea, Mahmoud Salmasizadeh, Javad Mohajeri, Mohammad Reza Aref, Vincent Rijmen
2022/510 (PDF ) Bulletproofs++ Liam Eagen
2022/509 (PDF ) Lattice Signature with Efficient Protocols, Application to Anonymous Credentials Corentin Jeudy, Adeline Roux-Langlois, Olivier Sanders
2022/508 (PDF ) Security of Truncated Permutation Without Initial Value Lorenzo Grassi, Bart Mennink
2022/507 (PDF ) Low-Latency Hardware Private Circuits David Knichel, Amir Moradi
2022/506 (PDF ) Design and analysis of a distributed ECDSA signing service Jens Groth, Victor Shoup
2022/505 (PDF ) Riding the Waves Towards Generic Single-Cycle Masking in Hardware Rishub Nagpal, Barbara Gigerl, Robert Primas, Stefan Mangard
2022/504 (PDF ) Blockchain Applicability for the Internet of Things: Performance and Scalability Challenges and Solutions Ziaur Rahman, Xun Yi, Sk. Tanzir Mehedi, Rafiqul Islam, Andrei Kelarev
2022/503 (PDF ) Towards a Formal Treatment of Logic Locking Peter Beerel, Marios Georgiou, Ben Hamlin, Alex J. Malozemoff, Pierluigi Nuzzo
2022/502 (PDF ) Fast Diffusion Block for Secret Key Cryptography Vlastimil Klima
2022/501 (PDF ) Another Concrete Quantum Cryptanalysis of Binary Elliptic Curves Dedy Septono Catur Putranto, Rini Wisnu Wardhani, Harashta Tatimma Larasati, Howon Kim
2022/500 (PDF ) Multi-Server PIR with Full Error Detection and Limited Error Correction Reo Eriguchi, Kaoru Kurosawa, Koji Nuida
2022/499 (PDF ) Cryptographic Oracle-Based Conditional Payments Varun Madathil, Sri AravindaKrishnan Thyagarajan, Dimitrios Vasilopoulos, Lloyd Fournier, Giulio Malavolta, Pedro Moreno-Sanchez
2022/498 (PDF ) Limitations of Information-theoretic Incompressible Encodings Petr Sedláček
2022/497 (PDF ) Protecting Distributed Primitives against Leakage: Equivocal Secret Sharing and More Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss
2022/496 (PDF ) Lightweight Hardware Accelerator for Post-Quantum Digital Signature CRYSTALS-Dilithium Naina Gupta, Arpan Jati, Anupam Chattopadhyay, Gautam Jha
2022/495 (PDF ) Maliciously Circuit-Private FHE from Information-Theoretic Principles Nico Döttling, Jesko Dujmovic
2022/494 (PDF ) Single-Trace Side-Channel Attacks on ω-Small Polynomial Sampling: With Applications to NTRU, NTRU Prime, and CRYSTALS-DILITHIUM Emre Karabulut, Erdem Alkim, Aydin Aysu
2022/493 (PDF ) Don’t Learn What You Already Know: Scheme-Aware Modeling for Profiling Side-Channel Analysis against Masking Loïc Masure, Valence Cristiani, Maxime Lecomte, François-Xavier Standaert
2022/492 (PDF ) Towards Smart Contract-based Verification of Anonymous Credentials Robert Muth, Tarek Galal, Jonathan Heiss, Florian Tschorsch
2022/491 (PDF ) Multi-Party Computation in the GDPR Lukas Helminger, Christian Rechberger
2022/490 (PDF ) Information Bounds and Convergence Rates for Side-Channel Security Evaluators Loïc Masure, Gaëtan Cassiers, Julien Hendrickx, François-Xavier Standaert
2022/489 (PDF ) A Practical-Quantum Differential Attack on Block Ciphers Tarun Yadav, Manoj Kumar, Amit Kumar, S K Pal
2022/488 (PDF ) OrgAn: Organizational Anonymity with Low Latency Debajyoti Das, Easwar Vivek Mangipudi, Aniket Kate
2022/487 (PDF ) New Key-Recovery Attack on Reduced-Round AES Navid Ghaedi Bardeh, Vincent Rijmen
2022/486 (PDF ) MARSHAL: Messaging with Asynchronous Ratchets and Signatures for faster HeALing Olivier Blazy, Pierre-Alain Fouque, Thibaut Jacques, Pascal Lafourcade, Cristina Onete, Léo Robert
2022/485 (PDF ) Two new classes of permutation trinomials over $\mathbb{F}_{q^3}$ with odd characteristic Xi Xie, Nian Li, Linjie Xu, Xiangyong Zeng, Xiaohu Tang
2022/484 (PDF ) VERICA - Verification of Combined Attacks: Automated formal verification of security against simultaneous information leakage and tampering Jan Richter-Brockmann, Jakob Feldtkeller, Pascal Sasdrich, Tim Güneysu
2022/483 (PDF ) Drive (Quantum) Safe! – Towards PQ Authentication for V2V Communications Nina Bindel, Geoff Twardokus, Sarah McCarthy, Hanif Rahbari
2022/482 (PDF ) cuFE: High Performance Privacy Preserving Support Vector Machine with Inner-Product Functional Encryption KyungHyun Han, Wai-Kong Lee, Angshuman Karmakar, Jose Maria Bermudo Mera, Seong Oun Hwang
2022/481 (PDF ) India’s “Aadhaar” Biometric ID: Structure, Security, and Vulnerabilities Pratyush Ranjan Tiwari, Dhruv Agarwal, Prakhar Jain, Swagam Dasgupta, Preetha Datta, Vineet Reddy, Debayan Gupta
2022/480 (PDF ) Medha: Microcoded Hardware Accelerator for computing on Encrypted Data Ahmet Can Mert, Aikata, Sunmin Kwon, Youngsam Shin, Donghoon Yoo, Yongwoo Lee, Sujoy Sinha Roy
2022/479 (PDF ) Short Lattice Signature Scheme with Tighter Reduction under Ring-SIS Assumption Kaisei Kajita, Go Ohtake, Kazuto Ogawa, Koji Nuida, Tsuyoshi Takagi
2022/478 (PDF ) Property-Preserving Hash Functions and Combinatorial Group Testing Kazuhiko Minematsu
2022/477 (PDF ) Algorithm-Substitution Attacks on Cryptographic Puzzles Pratyush Ranjan Tiwari, Matthew Green
2022/476 (PDF ) On the Security of TrCBC Debrup Chakraborty, Samir Kundu
2022/475 (PDF ) SIDH-sign: an efficient SIDH PoK-based signature Jesús-Javier Chi-Domínguez, Víctor Mateu, Lucas Pandolfo Perin
2022/474 (PDF ) Side-Channel Analysis of Lattice-Based Post-Quantum Cryptography: Exploiting Polynomial Multiplication Catinca Mujdei, Arthur Beckers, Jose Maria Bermudo Mera, Angshuman Karmakar, Lennert Wouters, Ingrid Verbauwhede
2022/473 (PDF ) Understanding binary-Goppa decoding Daniel J. Bernstein
2022/472 (PDF ) On the Hardness of Module Learning With Errors with Short Distributions Katharina Boudgoust, Corentin Jeudy, Adeline Roux-Langlois, Weiqiang Wen
2022/471 (PDF ) Breaking Masked Implementations of the Clyde-Cipher by Means of Side-Channel Analysis - A Report on the CHES Challenge Side-Channel Contest 2020 Aron Gohr, Friederike Laus, Werner Schindler
2022/470 (PDF ) Designated-Verifier Linkable Ring Signatures Pourandokht Behrouz, Panagiotis Grontas, Vangelis Konstantakatos, Aris Pagourtzis, Marianna Spyrakou
2022/469 (PDF ) Efficient ASIC Architectures for Low Latency Niederreiter Decryption Daniel Fallnich, Shutao Zhang, Tobias Gemmeke
2022/468 (PDF ) Improved Pump and Jump BKZ by Sharp Simulator Leizhang Wang, Wenwen Xia, Geng Wang, Baocang Wang, Dawu Gu
2022/467 (PDF ) Armistice: Micro-Architectural Leakage Modelling for Masked Software Formal Verification Arnaud de Grandmaison, Karine Heydemann, Quentin L. Meunier
2022/466 (PDF ) Quantum binary quadratic form reduction Nicolas David, Thomas Espitau, Akinori Hosoyamada
2022/463 (PDF ) Reducing the Depth of Quantum FLT-Based Inversion Circuit Harashta Tatimma Larasati, Dedy Septono Catur Putranto, Rini Wisnu Wardhani, Howon Kim
2022/462 (PDF ) New optimization techniques for PlonK’s arithmetization Miguel Ambrona, Anne-Laure Schmitt, Raphael R. Toledo, Danny Willems
2022/461 (PDF ) Information Leakage in Code-based Masking: A Systematic Evaluation by Higher-Order Attacks Wei Cheng, Sylvain Guilley, Jean-Luc Danger
2022/459 (PDF ) SIPFA: Statistical Ineffective Persistent Faults Analysis on Feistel Ciphers Nasour Bagheri, Sadegh Sadeghi, Prasanna Ravi, Shivam Bhasin, Hadi Soleimany
2022/458 (PDF ) Multilinear Schwartz-Zippel mod N with Applications to Succinct Arguments Benedikt Bünz, Ben Fisch
2022/457 (PDF ) Improving Differential-Neural Distinguisher Model For DES, Chaskey and PRESENT Liu Zhang, Zilong Wang
2022/456 (PDF ) Robust, Revocable and Adaptively Secure Attribute-Based Encryption with Outsourced Decryption Anis Bkakria
2022/455 (PDF ) Proof of Availability & Retrieval in a Modular Blockchain Architecture Shir Cohen, Guy Goren, Lefteris Kokoris-Kogias, Alberto Sonnino, Alexander Spiegelman
2022/454 (PDF ) Efficient Compiler to Covert Security with Public Verifiability for Honest Majority MPC Thomas Attema, Vincent Dunning, Maarten Everts, Peter Langenkamp
2022/452 (PDF ) UTT: Decentralized Ecash with Accountable Privacy Alin Tomescu, Adithya Bhat, Benny Applebaum, Ittai Abraham, Guy Gueta, Benny Pinkas, Avishay Yanai
2022/451 (PDF ) Improved Stock Market Structure Using Cryptography Charanjit S. Jutla, Barry Mishra
2022/450 (PDF ) Astrape: Anonymous Payment Channels with Boring Cryptography Yuhao Dong, Ian Goldberg, Sergey Gorbunov, Raouf Boutaba
2022/449 (PDF ) On End-to-End Encryption Britta Hale, Chelsea Komlo
2022/448 (PDF ) Attacks Against White-Box ECDSA and Discussion of Countermeasures - A Report on the WhibOx Contest 2021 Sven Bauer, Hermann Drexler, Maximilian Gebhardt, Dominik Klein, Friederike Laus, Johannes Mittmann
2022/447 (PDF ) Leveled Multikey FHE with constant-size ciphertexts from RLWE Vanesa Daza, Paz Morillo, Sergi Rovira
2022/446 (PDF ) Fast Side-Channel Key-Recovery Attack against Elephant Dumbo Louis Vialar
2022/445 (PDF ) TWAP Oracle Attacks: Easier Done than Said? Torgin Mackinga, Tejaswi Nadahalli, Roger Wattenhofer
2022/444 (PDF ) A White-Box Speck Implementation using Self-Equivalence Encodings (Full Version) Joachim Vandersmissen, Adrián Ranea, Bart Preneel
2022/443 (PDF ) Attack on SHealS and HealS: the Second Wave of GPST Steven D. Galbraith, Yi-Fu Lai
2022/442 (PDF ) Quantum Attacks on PRFs Based on Public Random Permutations Tingting Guo, Peng Wang, Lei Hu, Dingfeng Ye
2022/441 (PDF ) Two-Client Inner-Product Functional Encryption, with an Application to Money-Laundering Detection Paola de Perthuis, David Pointcheval
2022/440 (PDF ) A Security Model for Randomization-based Protected Caches Jordi Ribes-González, Oriol Farràs, Carles Hernández, Vatistas Kostalabros, Miquel Moretó
2022/439 (PDF ) Efficient Multiplication of Somewhat Small Integers using Number-Theoretic Transforms Hanno Becker, Vincent Hwang, Matthias J. Kannwischer, Lorenz Panny, Bo-Yin Yang
2022/438 (PDF ) Computing isogenies between finite Drinfeld modules Benjamin Wesolowski
2022/437 (PDF ) Continuous LWE is as Hard as LWE & Applications to Learning Gaussian Mixtures Aparna Gupte, Neekon Vafa, Vinod Vaikuntanathan
2022/436 (PDF ) Publicly Accountable Robust Multi-Party Computation Marc Rivinius, Pascal Reisert, Daniel Rausch, Ralf Küsters
2022/435 (PDF ) Fiat-Shamir for Proofs Lacks a Proof Even in the Presence of Shared Entanglement Frédéric Dupuis, Philippe Lamontagne, Louis Salvail
2022/434 (PDF ) Verifiable Quantum Advantage without Structure Takashi Yamakawa, Mark Zhandry
2022/433 (PDF ) McFly: Verifiable Encryption to the Future Made Practical Nico Döttling, Lucjan Hanzlik, Bernardo Magri, Stella Wohnig
2022/432 (PDF ) Classical Verification of Quantum Computations in Linear Time Jiayu Zhang
2022/431 (PDF ) Non-Adaptive Universal One-Way Hash Functions from Arbitrary One-Way Functions Xinyu Mao, Noam Mazor, Jiapeng Zhang
2022/430 (PDF ) Is the JCJ voting system really coercion-resistant? Véronique Cortier, Pierrick Gaudry, Quentin Yang
2022/429 (PDF ) Resurrecting Xifrat - Compact Cryptosystems 2nd Attempt Jianfang "Danny" Niu
2022/428 (PDF ) Implicit White-Box Implementations: White-Boxing ARX Ciphers Adrián Ranea, Joachim Vandersmissen, Bart Preneel
2022/427 (PDF ) Constant Size Secret Sharing: with General Thresholds, Towards Standard Assumptions, and Applications Katarzyna Kapusta, Matthieu Rambaud, Ferdinand Sibleyras
2022/426 (PDF ) Spectre Declassified: Reading from the Right Place at the Wrong Time Basavesh Ammanaghatta Shivakumar, Jack Barnes, Gilles Barthe, Sunjay Cauligi, Chitchanok Chuengsatiansup, Daniel Genkin, Sioli O'Connell, Peter Schwabe, Rui Qi Sim, Yuval Yarom
2022/425 (PDF ) SoK: New Insights into Fully Homomorphic Encryption Libraries via Standardized Benchmarks Charles Gouert, Dimitris Mouris, Nektarios Georgios Tsoutsos
2022/424 (PDF ) Refined Cryptanalysis of the GPRS Ciphers GEA-1 and GEA-2 Dor Amzaleg, Itai Dinur
2022/423 (PDF ) Polynomial Approximation of Inverse sqrt Function for FHE Samanvaya Panda
2022/422 (PDF ) Verifiable Mix-Nets and Distributed Decryption for Voting from Lattice-Based Assumptions Diego F. Aranha, Carsten Baum, Kristian Gjøsteen, Tjerand Silde
2022/421 (PDF ) Multiverse of HawkNess: A Universally-Composable MPC-based Hawk Variant Aritra Banerjee, Hitesh Tewari
2022/420 (PDF ) Gemini: Elastic SNARKs for Diverse Environments Jonathan Bootle, Alessandro Chiesa, Yuncong Hu, Michele Orrù
2022/419 (PDF ) Dew: Transparent Constant-sized zkSNARKs Arasu Arun, Chaya Ganesh, Satya Lokam, Tushar Mopuri, Sriram Sridhar
2022/418 (PDF ) LLTI: Low-Latency Threshold Implementations Victor Arribas, Zhenda Zhang, Svetla Nikova
2022/417 (PDF ) Efficient, Actively Secure MPC with a Dishonest Majority: a Survey Emmanuela Orsini
2022/416 (PDF ) Post-Quantum ID-based Ring Signatures from Symmetric-key Primitives Maxime Buser, Joseph K. Liu, Ron Steinfeld, Amin Sakzad
2022/415 (PDF ) Efficient and Tight Oblivious Transfer from PKE with Tight Multi-User Security Saikrishna Badrinarayanan, Daniel Masny, Pratyay Mukherjee
2022/414 (PDF ) PQ-HPKE: Post-Quantum Hybrid Public Key Encryption Mila Anastasova, Panos Kampanakis, Jake Massimo
2022/413 (PDF ) Instachain: Breaking the Sharding Limits via Adjustable Quorums Mustafa Safa Ozdayi, Yue Guo, Mahdi Zamani
2022/412 (PDF ) Complete and Improved FPGA Implementation of Classic McEliece Po-Jen Chen, Tung Chou, Sanjay Deshpande, Norman Lahr, Ruben Niederhagen, Jakub Szefer, Wen Wang
2022/411 (PDF ) Quotient Approximation Modular Reduction Aurélien Greuet, Simon Montoya, Clémence Vermeersch
2022/410 (PDF ) Enhancing AES Using Chaos and Logistic Map-Based Key Generation Technique for Securing IoT-Based Smart Home Ziaur Rahman, Xun Yi, Mustain Billah, Mousumi Sumi, Adnan Anwar
2022/409 (PDF ) Proof-of-Stake Is a Defective Mechanism Vicent Sus
2022/408 (PDF ) On the weightwise nonlinearity of weightwise perfectly balanced functions Agnese Gini, Pierrick Méaux
2022/407 (PDF ) Improving the Privacy of Tor Onion Services Edward Eaton, Sajin Sasy, Ian Goldberg
2022/406 (PDF ) Counting Vampires: From Univariate Sumcheck to Updatable ZK-SNARK Helger Lipmaa, Janno Siim, Michal Zajac
2022/405 (PDF ) Benchmarking and Analysing the NIST PQC Finalist Lattice-Based Signature Schemes on the ARM Cortex M7 James Howe, Bas Westerbaan
2022/404 (PDF ) Constant Latency in Sleepy Consensus Atsuki Momose, Ling Ren
2022/403 (PDF ) Horst Meets Fluid-SPN: Griffin for Zero-Knowledge Applications Lorenzo Grassi, Yonglin Hao, Christian Rechberger, Markus Schofnegger, Roman Walch, Qingju Wang
2022/402 (PDF ) Improved Rotational-XOR Cryptanalysis of Simon-like Block Ciphers Jinyu Lu, Yunwen Liu, Tomer Ashur, Bing Sun, Chao Li
2022/401 (PDF ) A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols Cas Cremers, Caroline Fontaine, Charlie Jacomme
2022/400 (PDF ) Quantum Advantage from Any Non-Local Game Yael Tauman Kalai, Alex Lombardi, Vinod Vaikuntanathan, Lisa Yang
2022/399 (PDF ) The Inverse of $\chi$ and Its Applications to Rasta-like Ciphers Fukang Liu, Santanu Sarkar, Willi Meier, Takanori Isobe
2022/398 (PDF ) Auditable, Available and Resilient Private Computation on the Blockchain via MPC Christopher Cordi, Michael P. Frank, Kasimir Gabert, Carollan Helinski, Ryan C. Kao, Vladimir Kolesnikov, Abrahim Ladha, Nicholas Pattengale
2022/397 (PDF ) Revocable Hierarchical Attribute-based Signatures from Lattices Daniel Gardham, Mark Manulis
2022/395 (PDF ) A lightweight verifiable secret sharing scheme in IoTs Likang Lu, Jianzhu Lu
2022/394 (PDF ) Fuzz, Penetration, and AI Testing for SoC Security Verification: Challenges and Solutions Kimia Zamiri Azar, Muhammad Monir Hossain, Arash Vafaei, Hasan Al Shaikh, Nurun N. Mondol, Fahim Rahman, Mark Tehranipoor, Farimah Farahmandi
2022/393 (PDF ) Improved Straight-Line Extraction in the Random Oracle Model With Applications to Signature Aggregation Yashvanth Kondi, abhi shelat
2022/392 (PDF ) Poly Onions: Achieving Anonymity in the Presence of Churn Megumi Ando, Miranda Christ, Anna Lysyanskaya, Tal Malkin
2022/391 (PDF ) An Improved Model on the Vague Sets-Based DPoS’s Voting Phase in Blockchain Lin You, Zhuobiao Wang, Gengran Hu, Chengtang Cao
2022/389 (PDF ) Higher-order masked Saber Suparna Kundu, Jan-Pieter D’Anvers, Michiel Van Beirendonck, Angshuman Karmakar, Ingrid Verbauwhede
2022/388 (PDF ) Shaduf++: Non-Cycle and Privacy-Preserving Payment Channel Rebalancing Zhonghui Ge, Yi Zhang, Yu Long, Dawu Gu
2022/387 (PDF ) Phase-shift Fault Analysis of Grain-128 Hridya P R, Jimmy Jose
2022/386 (PDF ) Secure Two-party Computation Approach for NTRUEncrypt Lin You, Yan Wang, Liang Li, Gengran Hu
2022/385 (PDF ) ECDSA White-Box Implementations: Attacks and Designs from WhibOx 2021 Contest Guillaume Barbu, Ward Beullens, Emmanuelle Dottax, Christophe Giraud, Agathe Houzelot, Chaoyun Li, Mohammad Mahzoun, Adrián Ranea, Jianrui Xie
2022/384 (PDF ) Light Clients for Lazy Blockchains Ertem Nusret Tas, Dionysis Zindros, Lei Yang, David Tse
2022/383 (PDF ) On Succinct Non-Interactive Arguments in Relativized Worlds Megan Chen, Alessandro Chiesa, Nicholas Spooner
2022/382 (PDF ) Witness-Authenticated Key Exchange Revisited: Improved Models, Simpler Constructions, Extensions to Groups Matteo Campanelli, Rosario Gennaro, Kelsey Melissaris, Luca Nizzardo
2022/381 (PDF ) On Extension of Evaluation Algorithms in Keyed-Homomorphic Encryption Hirotomo Shinoki, Koji Nuida
2022/380 (PDF ) A Linear-Time 2-Party Secure Merge Protocol Brett Hemenway Falk, Rohit Nema, Rafail Ostrovsky
2022/379 (PDF ) Fully Secure PSI via MPC-in-the-Head S. Dov Gordon, Carmit Hazay, Phi Hung Le
2022/378 (PDF ) Share & Shrink: Ad-Hoc Threshold FHE with Short Ciphertexts and its Application to Almost-Asynchronous MPC Antoine Urban, Matthieu Rambaud
2022/377 (PDF ) (Commit-and-Prove) Predictable Arguments with Privacy Hamidreza Khoshakhlagh
2022/376 (PDF ) Universally Composable End-to-End Secure Messaging Ran Canetti, Palak Jain, Marika Swanberg, Mayank Varia
2022/375 (PDF ) A Note on the Security Framework of Two-key DbHtS MACs Tingting Guo, Peng Wang
2022/374 (PDF ) Simple Three-Round Multiparty Schnorr Signing with Full Simulatability Yehuda Lindell
2022/373 (PDF ) Blind accumulators for e-voting Sergey Agievich
2022/372 (PDF ) Shorter quantum circuits Vadym Kliuchnikov, Kristin Lauter, Romy Minko, Christophe Petit, Adam Paetznick
2022/371 (PDF ) A High-performance ECC Processor over Curve448 based on a Novel Variant of the Karatsuba Formula for Asymmetric Digit Multiplier Asep Muhamad Awaludin, Jonguk Park, Rini Wisnu Wardhani, Howon Kim
2022/370 (PDF ) Efficient NIZKs from LWE via Polynomial Reconstruction and ``MPC in the Head" Riddhi Ghosal, Paul Lou, Amit Sahai
2022/369 (PDF ) Matching Attacks on Romulus-M Makoto Habu, Kazuhiko Minematsu, Tetsu Iwata
2022/368 (PDF ) Spiral: Fast, High-Rate Single-Server PIR via FHE Composition Samir Jordan Menon, David J. Wu
2022/367 (PDF ) Efficient Algorithms for Large Prime Characteristic Fields and Their Application to Bilinear Pairings Patrick Longa
2022/366 (PDF ) On the Algebraic Degree of Iterated Power Functions Clémence Bouvier, Anne Canteaut, Léo Perrin
2022/365 (PDF ) Failing gracefully: Decryption failures and the Fujisaki-Okamoto transform Kathrin Hövelmanns, Andreas Hülsing, Christian Majenz
2022/364 (PDF ) Single-trace clustering power analysis of the point-swapping procedure in the three point ladder of Cortex-M4 SIKE Aymeric Genêt, Novak Kaluđerović
2022/363 (PDF ) An Algebraic Framework for Silent Preprocessing with Trustless Setup and Active Security Damiano Abram, Ivan Damgård, Claudio Orlandi, Peter Scholl
2022/362 (PDF ) How to Backdoor (Classic) McEliece and How to Guard Against Backdoors Tobias Hemmert, Alexander May, Johannes Mittmann, Carl Richard Theodor Schneider
2022/361 (PDF ) Base64 Malleability in Practice Panagiotis Chatzigiannis, Konstantinos Chalkias
2022/360 (PDF ) Privacy-Preserving Contrastive Explanations with Local Foil Trees Thijs Veugen, Bart Kamphorst, Michiel Marcus
2022/359 (PDF ) How much is the fork? Fast Probability and Profitability Calculation during Temporary Forks Aljosha Judmayer, Nicholas Stifter, Philipp Schindler, Edgar Weippel
2022/358 (PDF ) Linear Private Set Union from Multi-Query Reverse Private Membership Test Cong Zhang, Yu Chen, Weiran Liu, Min Zhang, Dongdai Lin
2022/357 (PDF ) An Effective Lower Bound on the Number of Orientable Supersingular Elliptic Curves Antonin Leroux
2022/356 (PDF ) A Systematic Literature Review on Blockchain Enabled Federated Learning Framework for Internet of Vehicles MUSTAIN BILLAH, SK. TANZIR MEHEDI, ADNAN ANWAR, ZIAUR RAHMAN, RAFIQUL ISLAM
2022/355 (PDF ) A More Complete Analysis of the Signal Double Ratchet Algorithm Alexander Bienstock, Jaiden Fairoze, Sanjam Garg, Pratyay Mukherjee, Srinivasan Raghuraman
2022/354 (PDF ) Optimal Synchronous Approximate Agreement with Asynchronous Fallback Diana Ghinea, Chen-Da Liu-Zhang, Roger Wattenhofer
2022/353 (PDF ) SNARGs for P from Sub-exponential DDH and QR James Hulett, Ruta Jawale, Dakshita Khurana, Akshayaram Srinivasan
2022/352 (PDF ) Co-factor clearing and subgroup membership testing on pairing-friendly curves Youssef El Housni, Aurore Guillevic, Thomas Piellard
2022/351 (PDF ) Formal Verification of Saber's Public-Key Encryption Scheme in EasyCrypt Andreas Hülsing, Matthias Meijers, Pierre-Yves Strub
2022/350 (PDF ) DO NOT RUG ON ME: ZERO-DIMENSIONAL SCAM DETECTION Bruno Mazorra, Victor Adan, Vanesa Daza
2022/349 (PDF ) Hard Homogeneous Spaces from the Class Field Theory of Imaginary Hyperelliptic Function Fields Antoine Leudière, Pierre-Jean Spaenlehauer
2022/348 (PDF ) Fast Subgroup Membership Testings for $\mathbb{G}_1$, $\mathbb{G}_2$ and $\mathbb{G}_T$ on Pairing-friendly Curves Yu Dai, Kaizhan Lin, Zijian Zhou, Chang-An Zhao
2022/347 (PDF ) Asymptotically Faster Multi-Key Homomorphic Encryption from Homomorphic Gadget Decomposition Taechan Kim, Hyesun Kwak, Dongwon Lee, Jinyeong Seo, Yongsoo Song
2022/346 (PDF ) Recovering the tight security proof of $SPHINCS^{+}$ Andreas Hülsing, Mikhail Kudinov
2022/345 (PDF ) On the decisional Diffie-Hellman problem for class group actions on oriented elliptic curves Wouter Castryck, Marc Houben, Frederik Vercauteren, Benjamin Wesolowski
2022/344 (PDF ) Shorter Signatures from MQ William Wang
2022/343 (PDF ) Beyond the Csiszár-Körner Bound: Best-Possible Wiretap Coding via Obfuscation Yuval Ishai, Alexis Korb, Paul Lou, Amit Sahai
2022/342 (PDF ) From Farfalle to Megafono via Ciminion: The PRF Hydra for MPC Applications Lorenzo Grassi, Morten Øygarden, Markus Schofnegger, Roman Walch
2022/341 (PDF ) Deep neural networks aiding cryptanalysis: A case study of the Speck distinguisher Nicoleta-Norica Băcuieți, Lejla Batina, Stjepan Picek
2022/340 (PDF ) To Overfit, Or Not to Overfit: Improving the Performance of Deep Learning-based SCA Azade Rezaeezade, Guilherme Perin, Stjepan Picek
2022/339 (PDF ) New Digital Signature Algorithm EHT Igor Semaev
2022/338 (PDF ) Communication-Efficient Inner Product Private Join and Compute with Cardinality Koji Chida, Koki Hamada, Atsunori Ichikawa, Masanobu Kii, Junichi Tomida
2022/337 (PDF ) Improving Software Quality in Cryptography Standardization Projects Matthias J. Kannwischer, Peter Schwabe, Douglas Stebila, Thom Wiggers
2022/336 (PDF ) Batch Arguments for NP and More from Standard Bilinear Group Assumptions Brent Waters, David J. Wu
2022/335 (PDF ) Evaluation of Machine Learning Algorithms in Network-Based Intrusion Detection System Tuan-Hong Chua, Iftekhar Salam
2022/334 (PDF ) Improved Private Set Intersection for Sets with Small Entries Dung Bui, Geoffroy Couteau
2022/333 (PDF ) We Can Make Mistakes: Fault-tolerant Forward Private Verifiable Dynamic Searchable Symmetric Encryption Dandan Yuan, Shujie Cui, Giovanni Russello
2022/332 (PDF ) CostCO: An automatic cost modeling framework for secure multi-party computation Vivian Fang, Lloyd Brown, William Lin, Wenting Zheng, Aurojit Panda, Raluca Ada Popa
2022/331 (PDF ) Parallelizable Authenticated Encryption with Small State Size Akiko Inoue, Kazuhiko Minematsu
2022/330 (PDF ) A Simple and Generic Approach to Dynamic Collusion Model Rachit Garg, Rishab Goyal, George Lu
2022/329 (PDF ) Rolling up lattice cryptography primes Daniel R. L. Brown
2022/328 (PDF ) On the susceptibility of Texas Instruments SimpleLink platform microcontrollers to non-invasive physical attacks Lennert Wouters, Benedikt Gierlichs, Bart Preneel
2022/327 (PDF ) Provable Secure Software Masking in the Real-World Arthur Beckers, Lennert Wouters, Benedikt Gierlichs, Bart Preneel, Ingrid Verbauwhede
2022/326 (PDF ) Composable Dynamic Secure Emulation Pierre Civit, Maria Potop-Butucaru
2022/325 (PDF ) FPGA Design Deobfuscation by Iterative LUT Modification at Bitstream Level Michail Moraitis, Elena Dubrova
2022/324 (PDF ) Backward-Leak Uni-Directional Updatable Encryption from (Homomorphic) Public Key Encryption Yao Jiang Galteland, Jiaxin Pan
2022/323 (PDF ) Dilithium for Memory Constrained Devices Joppe W. Bos, Joost Renes, Amber Sprenkels
2022/322 (PDF ) SecFloat: Accurate Floating-Point meets Secure 2-Party Computation Deevashwer Rathee, Anwesh Bhattacharya, Rahul Sharma, Divya Gupta, Nishanth Chandran, Aseem Rastogi
2022/321 (PDF ) zkKYC in DeFi: An approach for implementing the zkKYC solution concept in Decentralized Finance Pieter Pauwels, Joni Pirovich, Peter Braunz, Jack Deeb
2022/320 (PDF ) Blazing Fast PSI from Improved OKVS and Subfield VOLE Srinivasan Raghuraman, Peter Rindal
2022/319 (PDF ) A Blockchain-based Long-term Time-Stamping Scheme Long Meng, Liqun Chen
2022/318 (PDF ) Efficient Online-friendly Two-Party ECDSA Signature Haiyang Xue, Man Ho Au, Xiang Xie, Tsz Hon Yuen, Handong Cui
2022/317 (PDF ) Thora: Atomic and Privacy-Preserving Multi-Channel Updates Lukas Aumayr, Kasra Abbaszadeh, Matteo Maffei
2022/316 (PDF ) Bounded Functional Encryption for Turing Machines: Adaptive Security from General Assumptions Shweta Agrawal, Fuyuki Kitagawa, Anuja Modi, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
2022/315 (PDF ) Low-Communication Multiparty Triple Generation for SPDZ from Ring-LPN Damiano Abram, Peter Scholl
2022/314 (PDF ) Batch-OT with Optimal Rate Zvika Brakerski, Pedro Branco, Nico Döttling, Sihang Pu
2022/313 (PDF ) Efficient Proof of RAM Programs from Any Public-Coin Zero-Knowledge System Cyprien Delpech de Saint Guilhem, Emmanuela Orsini, Titouan Tanguy, Michiel Verbauwhede
2022/312 (PDF ) Low Communication Complexity Protocols, Collision Resistant Hash Functions and Secret Key-Agreement Protocols Shahar P. Cohen, Moni Naor
2022/311 (PDF ) Unidirectional Updatable Encryption and Proxy Re-encryption from DDH Peihan Miao, Sikhar Patranabis, Gaven Watson
2022/310 (PDF ) Dispute-free Scalable Open Vote Network using zk-SNARKs Muhammad ElSheikh, Amr M. Youssef
2022/309 (PDF ) On Time-Space Tradeoffs for Bounded-Length Collisions in Merkle-Damgård Hashing Ashrujit Ghoshal, Ilan Komargodski
2022/308 (PDF ) Colordag: An Incentive-Compatible Blockchain Ittai Abraham, Danny Dolev, Ittay Eyal, Joseph Y. Halpern
2022/307 (PDF ) An Anonymous Trace-and-Revoke Broadcast Encryption Scheme Olivier Blazy, Sayantan Mukherjee, Huyen Nguyen, Duong Hieu Phan, Damien Stehle
2022/306 (PDF ) The More You Know: Improving Laser Fault Injection with Prior Knowledge Marina Krček, Thomas Ordas, Daniele Fronte, Stjepan Picek
2022/305 (PDF ) Surveying definitions of election verifiability Ben Smyth, Michael R. Clarkson
2022/304 (PDF ) Multi-User BBB Security of Public Permutations Based MAC Yu Long Chen, Avijit Dutta, Mridul Nandi
2022/303 (PDF ) Unlinkable Delegation of WebAuthn Credentials Nick Frymann, Daniel Gardham, Mark Manulis
2022/302 (PDF ) SoK: Oblivious Pseudorandom Functions Sílvia Casacuberta, Julia Hesse, Anja Lehmann
2022/301 (PDF ) How Practical are Fault Injection Attacks, Really? Jakub Breier, Xiaolu Hou
2022/300 (PDF ) Faster NTRU on ARM Cortex-M4 with TMVP-based multiplication Irem Keskinkurt Paksoy, Murat Cenk
2022/299 (PDF ) Related-Tweakey Impossible Differential Attack on Reduced-Round SKINNY-AEAD M1/M3 Yanhong Fan,Muzhou Li,Chao Niu,Zhenyu Lu,Meiqin Wang
2022/298 (PDF ) Constructive Post-Quantum Reductions Nir Bitansky, Zvika Brakerski, Yael Tauman Kalai
2022/297 (PDF ) Promise $\Sigma$-protocol: How to Construct Efficient Threshold ECDSA from Encryptions Based on Class Groups Yi Deng, Shunli Ma, Xinxuan Zhang, Hailong Wang, Xuyang Song, Xiang Xie
2022/296 (PDF ) On new results on Extremal Graph Theory, Theory of Algebraic Graphs and their applications in Cryptography and Coding Theory. Vasyl Ustimenko
2022/295 (PDF ) Quantum Proofs of Deletion for Learning with Errors Alexander Poremba
2022/294 (PDF ) A Plug-n-Play Framework for Scaling Private Set Intersection to Billion-sized Sets Saikrishna Badrinarayanan, Ranjit Kumaresan, Mihai Christodorescu, Vinjith Nagaraja, Karan Patel, Srinivasan Raghuraman, Peter Rindal, Wei Sun, Minghua Xu
2022/293 (PDF ) Minimizing Setup in Broadcast-Optimal Two Round MPC Ivan Damgård, Divya Ravi, Luisa Siniscalchi, Sophia Yakoubov
2022/292 (PDF ) Comment on ``SRAM-PUF Based Entities Authentication Scheme for Resource-constrained IoT Devices'' Michael Amar, Amit Kama, Kang Wang, Yossi Oren
2022/291 (PDF ) Provable security of CFB mode of operation with external re-keying Vadim Tsypyschev, Iliya Morgasov
2022/290 (PDF ) Universally Composable Sigma-protocols in the Global Random-Oracle Model Anna Lysyanskaya, Leah Namisa Rosenbloom
2022/289 (PDF ) Two Attacks On Proof-of-Stake GHOST/Ethereum Joachim Neu, Ertem Nusret Tas, David Tse
2022/288 (PDF ) Spats: user-defined confidential assets for the Spark transaction protocol Aaron Feickert, Aram Jivanyan
2022/287 (PDF ) User-Perceived Privacy in Blockchain Simin Ghesmati, Walid Fdhila, Edgar Weippl
2022/286 (PDF ) Provably Secure Identity-Based Remote Password Registration Csanád Bertók, Andrea Huszti, Szabolcs Kovács, Norbert Oláh
2022/285 (PDF ) Usability of Cryptocurrency Wallets Providing CoinJoin Transactions Simin Ghesmati, Walid Fdhila, Edgar Weippl
2022/284 (PDF ) Lattice-Based Zero-Knowledge Proofs and Applications: Shorter, Simpler, and More General Vadim Lyubashevsky, Ngoc Khanh Nguyen, Maxime Plancon
2022/283 (PDF ) Block-Cipher-Based Tree Hashing Aldo Gunsing
2022/282 (PDF ) Achievable CCA2 Relaxation for Homomorphic Encryption Adi Akavia, Craig Gentry, Shai Halevi, Margarita Vald
2022/281 (PDF ) Succinct Interactive Oracle Proofs: Applications and Limitations Shafik Nassar, Ron D. Rothblum
2022/280 (PDF ) Efficient Homomorphic Evaluation on Large Intervals Jung Hee Cheon, Wootae Kim, Jai Hyun Park
2022/279 (PDF ) Permutation rotation-symmetric S-boxes, liftings and affine equivalence Tron Omland, Pantelimon Stanica
2022/278 (PDF ) Incompressiblity and Next-Block Pseudoentropy Iftach Haitner, Noam Mazor, Jad Silbak
2022/277 (PDF ) Security Analysis of Elliptic Curves over Sextic Extension of Small Prime Fields Robin Salen, Vijaykumar Singh, Vladimir Soukharev
2022/276 (PDF ) Hardness estimates of the Code Equivalence Problem in the Rank Metric Krijn Reijnders, Simona Samardjiska, Monika Trimoska
2022/275 (PDF ) Concrete Analysis of Approximate Ideal-SIVP to Decision Ring-LWE Reduction Neal Koblitz, Subhabrata Samajder, Palash Sarkar, Subhadip Singha
2022/274 (PDF ) EcGFp5: a Specialized Elliptic Curve Thomas Pornin
2022/273 (PDF ) Compact Storage for Homomorphic Encryption Adi Akavia, Neta Oren, Boaz Sapir, Margarita Vald
2022/272 (PDF ) Quantum-Secure Aggregate One-time Signatures with Detecting Functionality Shingo Sato, Junji Shikata
2022/271 (PDF ) Approximate Divisor Multiples -- Factoring with Only a Third of the Secret CRT-Exponents Alexander May, Julian Nowakowski, Santanu Sarkar
2022/270 (PDF ) Efficient NIZKs and Signatures from Commit-and-Open Protocols in the QROM Jelle Don, Serge Fehr, Christian Majenz, Christian Schaffner
2022/269 (PDF ) ON CODES AND LEARNING WITH ERRORS OVER FUNCTION FIELDS Maxime Bombar, Alain Couvreur, Thomas Debris-Alazard
2022/268 (PDF ) Efficient Schemes for Committing Authenticated Encryption Mihir Bellare, Viet Tung Hoang
2022/267 (PDF ) Practical Post-Quantum Signature Schemes from Isomorphism Problems of Trilinear Forms Gang Tang, Dung Hoang Duong, Antoine Joux, Thomas Plantard, Youming Qiao, Willy Susilo
2022/266 (PDF ) Verifiably Distributed Multi-User Secret Sharing schemes Likang Lu, Jianzhu Lu
2022/265 (PDF ) Non-interactive Mimblewimble transactions, revisited Georg Fuchsbauer, Michele Orrù
2022/264 (PDF ) Gradecast in Synchrony and Reliable Broadcast in Asynchrony with Optimal Resilience, Efficiency, and Unconditional Security Ittai Abraham, Gilad Asharov
2022/263 (PDF ) Rethinking Modular Multi-Exponentiation in Real-World Applications Vidal Attias, Luigi Vigneri, Vassil Dimitrov
2022/262 (PDF ) Secure Non-Interactive Reduction and Spectral Analysis of Correlations Pratyush Agarwal, Varun Narayanan, Shreya Pathak, Manoj Prabhakaran, Vinod M. Prabhakaran, Mohammad Ali Rehan
2022/261 (PDF ) Sublinear GMW-Style Compiler for MPC with Preprocessing Elette Boyle, Niv Gilboa, Yuval Ishai, Ariel Nof
2022/260 (PDF ) Advances in Logic Locking: Past, Present, and Prospects Hadi Mardani Kamali, Kimia Zamiri Azar, Farimah Farahmandi, Mark Tehranipoor
2022/259 (PDF ) Partial Key Exposure Attacks on BIKE, Rainbow and NTRU Andre Esser, Alexander May, Javier Verbel, Weiqiang Wen
2022/258 (PDF ) Digital Twin for Secure Semiconductor Lifecycle Management: Prospects and Applications Hasan Al Shaikh, Mohammad Bin Monjil, Shigang Chen, Farimah Farahmandi, Navid Asadizanjani, Mark Tehranipoor, Fahim Rahman
2022/257 (PDF ) Guaranteed Output in $O(\sqrt{n})$ Rounds for Round-Robin Sampling Protocols Ran Cohen, Jack Doerner, Yashvanth Kondi, abhi shelat
2022/256 (PDF ) Multi-Designated Receiver Signed Public Key Encryption Ueli Maurer, Christopher Portmann, Guilherme Rito
2022/255 (PDF ) Round-Optimal Byzantine Agreement Diana Ghinea, Vipul Goyal, Chen-Da Liu-Zhang
2022/254 (PDF ) Unprotected and Masked Hardware Implementations of Spook v2 Charles Momin, Gaëtan Cassiers, François-Xavier Standaert
2022/253 (PDF ) The Side-Channel Metric Cheat Sheet Kostas Papagiannopoulos, Ognjen Glamocanin, Melissa Azouaoui, Dorian Ros, Francesco Regazzoni, Mirjana Stojilovic
2022/252 (PDF ) Handcrafting: Improving Automated Masking in Hardware with Manual Optimizations Charles Momin, Gaëtan Cassiers, François-Xavier Standaert
2022/251 (PDF ) CoCoA: Concurrent Continuous Group Key Agreement Joël Alwen, Benedikt Auerbach, Miguel Cueto Noval, Karen Klein, Guillermo Pascual-Perez, Krzysztof Pietrzak, Michael Walter
2022/250 (PDF ) Private Circuits with Quasilinear Randomness Vipul Goyal, Yuval Ishai, Yifan Song
2022/249 (PDF ) The Summation-Truncation Hybrid: Reusing Discarded Bits for Free Aldo Gunsing, Bart Mennink
2022/248 (PDF ) Collapseability of Tree Hashes Aldo Gunsing, Bart Mennink
2022/247 (PDF ) Deck-Based Wide Block Cipher Modes and an Exposition of the Blinded Keyed Hashing Model Aldo Gunsing, Joan Daemen, Bart Mennink
2022/246 (PDF ) On the Concrete Security of TLS 1.3 PSK Mode Hannah Davis, Denis Diemert, Felix Günther, Tibor Jager
2022/245 (PDF ) Entropic Hardness of Module-LWE from Module-NTRU Katharina Boudgoust, Corentin Jeudy, Adeline Roux-Langlois, Weiqiang Wen
2022/244 (PDF ) Universally Composable Subversion-Resilient Cryptography Suvradip Chakraborty, Bernardo Magri, Jesper Buus Nielsen, Daniele Venturi
2022/243 (PDF ) A Greater GIFT: Strengthening GIFT against Statistical Cryptanalysis Ling Sun, Bart Preneel, Wei Wang, Meiqin Wang
2022/242 (PDF ) YOLO YOSO: Fast and Simple Encryption and Secret Sharing in the YOSO Model Ignacio Cascudo, Bernardo David, Lydia Garms, Anders Konring
2022/241 (PDF ) Coalition and Threshold Hash-Based Signatures John Kelsey, Stefan Lucks, Nathalie Lang
2022/240 (PDF ) SNACKs: Leveraging Proofs of Sequential Work for Blockchain Light Clients Hamza Abusalah, Georg Fuchsbauer, Peter Gaži, Karen Klein
2022/239 (PDF ) Several Improvements on BKZ Algorithm Ziyu Zhao, Jintai Ding
2022/238 (PDF ) HEAD: an FHE-based Privacy-preserving Cloud Computing Protocol with Compact Storage and Efficient Computation Lijing Zhou, Ziyu Wang, Hongrui Cui, Xiao Zhang, Xianggui Wang, Yu Yu
2022/237 (PDF ) Public Randomness Extraction with Ephemeral Roles and Worst-Case Corruptions Jesper Buus Nielsen, João Ribeiro, Maciej Obremski
2022/236 (PDF ) Characterizing the qIND-qCPA (in)security of the CBC, CFB, OFB and CTR modes of operation Tristan Nemoz, Zoé AMBLARD, Aurélien DUPIN
2022/235 (PDF ) Limits of Preprocessing for Single-Server PIR Giuseppe Persiano, Kevin Yeo
2022/234 (PDF ) New algorithms for the Deuring correspondence: toward practical and secure SQISign signatures Luca De Feo, Antonin Leroux, Patrick Longa, Benjamin Wesolowski
2022/233 (PDF ) Variational quantum solutions to the Shortest Vector Problem Martin R. Albrecht, Miloš Prokop, Yixin Shen, Petros Wallden
2022/232 (PDF ) Conditional Variational AutoEncoder based on Stochastic Attack Gabriel Zaid, Lilian Bossuet, Mathieu Carbone, Amaury Habrard, Alexandre Venelli
2022/231 (PDF ) Towards Low-Latency Implementation of Linear Layers Qun Liu, Weijia Wang, Yanhong Fan, Lixuan Wu, Ling Sun, Meiqin Wang
2022/230 (PDF ) Apple vs. EMA: Electromagnetic Side Channel Attacks on Apple CoreCrypto Gregor Haas, Aydin Aysu
2022/229 (PDF ) WiP: Applicability of ISO Standard Side-Channel Leakage Tests to NIST Post-Quantum Cryptography Markku-Juhani O. Saarinen
2022/228 (PDF ) Semi-Quantum Tokenized Signatures Omri Shmueli
2022/227 (PDF ) The Little Seal Bug: Optical Sound Recovery from Lightweight Reflective Objects Ben Nassi, Ras Swissa, Yuval Elovici, Boris Zadov
2022/226 (PDF ) To Label, or Not To Label (in Generic Groups) Mark Zhandry
2022/225 (PDF ) Constant matters: Fine-grained Complexity of Differentially Private Continual Observation Using Completely Bounded Norms Monika Henzinger, Jalaj Upadhyay
2022/224 (PDF ) Embedding the UC Model into the IITM Model Daniel Rausch, Ralf Kuesters, Céline Chevalier
2022/223 (PDF ) Zero-Knowledge Protocols for the Subset Sum Problem from MPC-in-the-Head with Rejection Thibauld Feneuil, Jules Maire, Matthieu Rivain, Damien Vergnaud
2022/222 (PDF ) Half-Aggregation of Schnorr Signatures with Tight Reductions Yanbo Chen, Yunlei Zhao
2022/221 (PDF ) Secure Joint Communication and Sensing Onur Gunlu, Matthieu Bloch, Rafael F. Schaefer, Aylin Yener
2022/220 (PDF ) Cache-22: A Highly Deployable End-To-End Encrypted Cache System with Post-Quantum Security Keita Emura, Shiho Moriai, Takuma Nakajima, Masato Yoshimi
2022/219 (PDF ) PFE: Linear Active Security, Double-Shuffle Proofs, and Low-Complexity Communication Hanyu Jia, Xiangxue Li
2022/218 (PDF ) On the Impossibility of Key Agreements from Quantum Random Oracles Per Austrin, Hao Chung, Kai-Min Chung, Shiuan Fu, Yao-Ting Lin, Mohammad Mahmoody
2022/217 (PDF ) High-Performance Hardware Implementation of Lattice-Based Digital Signatures Luke Beckwith, Duc Tri Nguyen, Kris Gaj
2022/216 (PDF ) Short Leakage Resilient and Non-malleable Secret Sharing Schemes Nishanth Chandran, Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar
2022/215 (PDF ) Multi-Client Functional Encryption with Fine-Grained Access Control Ky Nguyen, Duong Hieu Phan, David Pointcheval
2022/214 (PDF ) Breaking Rainbow Takes a Weekend on a Laptop Ward Beullens
2022/213 (PDF ) Issuer-Hiding Attribute-Based Credentials Jan Bobolz, Fabian Eidens, Stephan Krenn, Sebastian Ramacher, Kai Samelin
2022/212 (PDF ) Tight Analysis of Decrypton Failure Probability of Kyber in Reality Boyue Fang, Weize Wang, Yunlei Zhao
2022/211 (PDF ) Azeroth: Auditable Zero-knowledge Transactions in Smart Contracts Gweonho Jeong, Nuri Lee, Jihye Kim, Hyunok Oh
2022/210 (PDF ) An Analysis of the Algebraic Group Model Jonathan Katz, Cong Zhang, Hong-Sheng Zhou
2022/209 (PDF ) Blockchain based Contact Tracing: A Solution using Bluetooth and Sound Waves for Proximity Detection ZiXi Hee, Iftekhar Salam
2022/208 (PDF ) Trust Dies in Darkness: Shedding Light on Samsung's TrustZone Keymaster Design Alon Shakevsky, Eyal Ronen, Avishai Wool
2022/207 (PDF ) Cheetah: Lean and Fast Secure Two-Party Deep Neural Network Inference Zhicong Huang, Wen-jie Lu, Cheng Hong, Jiansheng Ding
2022/206 (PDF ) Proving UNSAT in Zero Knowledge Ning Luo, Timos Antonopoulos, William Harris, Ruzica Piskac, Eran Tromer, Xiao Wang
2022/205 (PDF ) Fiat-Shamir signatures without aborts using Ring-and-Noise assumptions Dipayan Das, Antoine Joux, Anand Kumar Narayanan
2022/204 (PDF ) RevEAL: Single-Trace Side-Channel Leakage of the SEAL Homomorphic Encryption Library Furkan Aydin, Emre Karabulut, Seetal Potluri, Erdem Alkim, Aydin Aysu
2022/203 (PDF ) A New Perturbation for Multivariate Public Key Schemes such as HFE and UOV Jean-Charles Faugère, Gilles macario-Rat, Jacques Patarin, Ludovic Perret
2022/202 (PDF ) Through the Looking-Glass: Benchmarking Secure Multi-Party Computation Comparisons for ReLU's Abdelrahaman Aly, Kashif Nawaz, Eugenio Salazar, Victor Sucasas
2022/201 (PDF ) Enig: Player Replaceable Finality Layers with Optimal Validity Simon Holmgaard Kamp, Jesper Buus Nielsen, Søren Eller Thomsen, Daniel Tschudi
2022/200 (PDF ) Non-Black-Box Approach to Secure Two-Party Computation in Three Rounds Akshayaram Srinivasan
2022/199 (PDF ) Lattice-based Public Key Encryption with Multi-Ciphertexts Equality Test in Cloud Computing Giang Linh Duc Nguyen, Dung Hoang Duong, Huy Quoc Le, Willy Susilo
2022/198 (PDF ) Efficient FHEW Bootstrapping with Small Evaluation Keys, and Applications to Threshold Homomorphic Encryption Yongwoo Lee, Daniele Micciancio, Andrey Kim, Rakyong Choi, Maxim Deryabin, Jieun Eom, Donghoon Yoo
2022/197 (PDF ) Nice Attacks --- but What is the Cost? Computational Models for Cryptanalysis Charles Bouillaguet
2022/196 (PDF ) Generalising Fault Attacks to Genus Two Isogeny Cryptosystems Ariana Goh, Chu-Wee Lim, Yan Bo Ti
2022/195 (PDF ) Quantum and Classical Algorithms for Bounded Distance Decoding Richard Allen, Ratip Emin Berker, Sílvia Casacuberta, Michael Gul
2022/194 (PDF ) Finding Collisions against 4-round SHA3-384 in Practical Time Senyang Huang, Orna Agmon Ben-Yehuda, Orr Dunkelman, Alexander Maximov
2022/193 (PDF ) OptRand: Optimistically responsive distributed random beacons Adithya Bhat, Nibesh Shrestha, Aniket Kate, Kartik Nayak
2022/192 (PDF ) SoftSpokenOT: Communication--Computation Tradeoffs in OT Extension Lawrence Roy
2022/191 (PDF ) NanoGRAM: Garbled RAM with $\widetilde{O}(\log N)$ Overhead Andrew Park, Wei-Kai Lin, Elaine Shi
2022/190 (PDF ) Short-lived zero-knowledge proofs and signatures Arasu Arun, Joseph Bonneau, Jeremy Clark
2022/189 (PDF ) Simplified MITM Modeling for Permutations: New (Quantum) Attacks André Schrottenloher, Marc Stevens
2022/188 (PDF ) Syndrome Decoding in the Head: Shorter Signatures from Zero-Knowledge Proofs Thibauld Feneuil, Antoine Joux, Matthieu Rivain
2022/187 (PDF ) Constant-Round YOSO MPC Without Setup Sebastian Kolby, Divya Ravi, Sophia Yakoubov
2022/186 (PDF ) Overflow-detectable Floating-point Fully Homomorphic Encryption Seunghwan Lee, Dong-Joon Shin
2022/185 (PDF ) Statistically Sender-Private OT from LPN and Derandomization Nir Bitansky, Sapir Freizeit
2022/184 (PDF ) Exploring SAT for Cryptanalysis: (Quantum) Collision Attacks against 6-Round SHA-3 (Full Version) Jian Guo, Guozhen Liu, Ling Song, Yi Tu
2022/183 (PDF ) Improving Differential-Neural Cryptanalysis with Inception Liu Zhang, Zilong Wang, Baocang wang, Boyang Wang
2022/182 (PDF ) A Novel Framework for Explainable Leakage Assessment Si Gao, Elisabeth Oswald
2022/181 (PDF ) Vector Commitments over Rings and Compressed $\Sigma$-Protocols Thomas Attema, Ignacio Cascudo, Ronald Cramer, Ivan Bjerre Damgård, Daniel Escudero
2022/180 (PDF ) Towards Globally Optimized Hybrid Homomorphic Encryption - Featuring the Elisabeth Stream Cipher Orel Cosseron, Clément Hoffmann, Pierrick Méaux, François-Xavier Standaert
2022/179 (PDF ) Locally Verifiable Signature and Key Aggregation Rishab Goyal, Vinod Vaikuntanathan
2022/178 (PDF ) Lower Bound on SNARGs in the Random Oracle Model Iftach Haitner, Daniel Nukrai, Eylon Yogev
2022/177 (PDF ) The Power of the Differentially Oblivious Shuffle in Distributed Privacy Mechanisms Mingxun Zhou, Elaine Shi
2022/176 (PDF ) Towards Fair Multiparty Computation in Scriptless Distributed Ledger Systems Minze Xu, Yuan Zhang, Sheng Zhong
2022/175 (PDF ) WeRLman: To Tackle Whale (Transactions), Go Deep (RL) Roi Bar-Zur, Ameer Abu-Hanna, Ittay Eyal, Aviv Tamar
2022/174 (PDF ) How to Launch a Powerful Side-Channel Collision Attack? Jiangshan Long, Changhai Ou, Yajun Ma, Yifan Fan, Hua Chen, Shihui Zheng
2022/173 (PDF ) Collision-Resistance from Multi-Collision-Resistance Ron D. Rothblum, Prashant Nalini Vasudevan
2022/172 (PDF ) A remark on NIST SP 800-22 serial test Corina-Elena Bogos, Razvan Mocanu, Emil Simion
2022/171 (PDF ) Practical and Improved Byzantine Reliable Broadcast and Asynchronous Verifiable Information Dispersal from Hash Functions Nicolas Alhaddad, Sisi Duan, Mayank Varia, Haibin Zhang
2022/170 (PDF ) gOTzilla: Efficient Disjunctive Zero-Knowledge Proofs from MPC in the Head, with Application to Proofs of Assets in Cryptocurrencies Foteini Baldimtsi, Panagiotis Chatzigiannis, S. Dov Gordon, Phi Hung Le, Daniel McVicker
2022/169 (PDF ) SP 800-22 and GM/T 0005-2012 Tests: Clearly Obsolete, Possibly Harmful Markku-Juhani O. Saarinen
2022/168 (PDF ) Hardness of Approximation for Stochastic Problems via Interactive Oracle Proofs Gal Arnon, Alessandro Chiesa, Eylon Yogev
2022/167 (PDF ) Verifiable Relation Sharing and Multi-Verifier Zero-Knowledge in Two Rounds: Trading NIZKs with Honest Majority Benny Applebaum, Eliran Kachlon, Arpita Patra
2022/166 (PDF ) Digital Contact Tracing Solutions: Promises, Pitfalls and Challenges Thien Duc Nguyen, Markus Miettinen, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Ivan Visconti
2022/165 (PDF ) PAC Learnability of iPUF Variants Durba Chatterjee, Debdeep Mukhopadhyay, Aritra Hazra
2022/164 (PDF ) Shanrang: Fully Asynchronous Proactive Secret Sharing with Dynamic Committees Yunzhou Yan, Yu Xia, Srinivas Devadas
2022/163 (PDF ) A High Performance Payment Processing System Designed for Central Bank Digital Currencies James Lovejoy, Cory Fields, Madars Virza, Tyler Frederick, David Urness, Kevin Karwaski, Anders Brownworth, Neha Narula
2022/162 (PDF ) On the precision loss in approximate homomorphic encryption Anamaria Costache, Benjamin R. Curtis, Erin Hales, Sean Murphy, Tabitha Ogilvie, Rachel Player
2022/161 (PDF ) D-KODE: Mechanism to Generate and Maintain a Billion Keys Easwar Vivek Mangipudi, Aniket Kate
2022/160 (PDF ) Random primes in arithmetic progressions Pascal Giorgi, Bruno Grenet, Armelle Perret du Cray, Daniel S. Roche
2022/158 (PDF ) Bitslicing Arithmetic/Boolean Masking Conversions for Fun and Profit with Application to Lattice-Based KEMs Olivier Bronchain, Gaëtan Cassiers
2022/157 (PDF ) Shuffle-based Private Set Union: Faster and More Secure Yanxue Jia, Shi-Feng Sun, Hong-Sheng Zhou, Jiajun Du, Dawu Gu
2022/156 (PDF ) Universal Reductions: Reductions Relative to Stateful Oracles Benjamin Chan, Cody Freitag, Rafael Pass
2022/155 (PDF ) FairTraDEX: A Decentralised Exchange Preventing Value Extraction Conor McMenamin, Vanesa Daza, Matthias Fitzi, Padraic O'Donoghue
2022/154 (PDF ) Coeus: A System for Oblivious Document Ranking and Retrieval Ishtiyaque Ahmad, Laboni Sarker, Divyakant Agrawal, Amr El Abbadi, Trinabh Gupta
2022/153 (PDF ) Faulty isogenies: a new kind of leakage Gora Adj, Jesús-Javier Chi-Domínguez, Víctor Mateu, Francisco Rodríguez-Henríquez
2022/152 (PDF ) K-XMSS and K-SPHINCS$^+$:Hash based Signatures with\\Korean Cryptography Algorithms Minjoo Sim, Siwoo Eum, Gyeongju Song, HyeokDong Kwon, Kyungbae Jang, HyunJun Kim, HyunJi Kim, Yujin Yang, Wonwoong Kim, Wai-Kong Lee, Hwajeong Seo
2022/151 (PDF ) Addendum to Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives Ling Sun, Wei Wang, Meiqin Wang
2022/150 (PDF ) The Generalized Montgomery Coordinate: A New Computational Tool for Isogeny-based Cryptography Tomoki Moriya, Hiroshi Onuki, Yusuke Aikawa, Tsuyoshi Takagi
2022/149 (PDF ) Putting up the swiss army knife of homomorphic calculations by means of TFHE functional bootstrapping Pierre-Emmanuel Clet, Martin Zuber, Aymen Boudguiga, Renaud Sirdey, Cédric Gouy-Pailler
2022/148 (PDF ) Attacks on the Firekite cipher Thomas Johansson, Willi Meier, Vu Nguyen
2022/147 (PDF ) Constructing new superclasses of bent functions from known ones Amar Bapić, Enes Pasalic, Fengrong Zhang, Samir Hodžić
2022/146 (PDF ) Training Differentially Private Models with Secure Multiparty Computation Sikha Pentyala, Davis Railsback, Ricardo Maia, Rafael Dowsley, David Melanson, Anderson Nascimento, Martine De Cock
2022/145 (PDF ) An elementary construction of QR-UOV Yasufumi Hashimoto
2022/144 (PDF ) Rainbow Differential Privacy Ziqi Zhou, Onur Gunlu, Rafael G. L. D'Oliveira, Muriel Medard, Parastoo Sadeghi, Rafael F. Schaefer
2022/143 (PDF ) Composition construction of new bent functions from known dually isomorphic bent functions Guangpu Gao, Weiguo Zhang, Yongjuan Wang
2022/142 (PDF ) Efficient Verifiable Partially-Decryptable Commitments from Lattices and Applications Muhammed F. Esgin, Ron Steinfeld, Raymond K. Zhao
2022/141 (PDF ) Efficient Hybrid Exact/Relaxed Lattice Proofs and Applications to Rounding and VRFs Muhammed F. Esgin, Ron Steinfeld, Dongxi Liu, Sushmita Ruj
2022/140 (PDF ) On the Related-Key Attack Security of Authenticated Encryption Schemes Sebastian Faust, Juliane Krämer, Maximilian Orlt, Patrick Struck
2022/139 (PDF ) Sponge-based Authenticated Encryption: Security against Quantum Attackers Christian Janson, Patrick Struck
2022/138 (PDF ) Resisting Key-Extraction and Code-Compression: a Secure Implementation of the HFE Signature Scheme in the White-Box Model Pierre Galissant, Louis Goubin
2022/137 (PDF ) Ten years of cube attacks Marco Cianfriglia, Elia Onofri, Silvia Onofri, Marco Pedicini
2022/136 (PDF ) Twilight: A Differentially Private Payment Channel Network Maya Dotan, Saar Tochner, Aviv Zohar, Yossi Gilad
2022/135 (PDF ) Do NOT Misuse the Markov Cipher Assumption - Automatic Search for Differential and Impossible Differential Characteristics in ARX Ciphers Zheng Xu, Yongqiang Li, Lin Jiao, Mingsheng Wang, Willi Meier
2022/134 (PDF ) Functional Cryptanalysis: Application to reduced-round Xoodoo Emanuele Bellini, Rusydi H. Makarim
2022/133 (PDF ) Faster verification of V2X BSM messages via Message Chaining Eduardo Lopes Cominetti, Marcos Vinicius M. Silva, Marcos A. Simplicio Jr., Harsh Kupwade Patil, Jefferson E. Ricardini
2022/132 (PDF ) On Defeating Graph Analysis of Anonymous Transactions Christoph Egger, Russell W. F. Lai, Viktoria Ronge, Ivy K. Y. Woo, Hoover H. F. Yin
2022/131 (PDF ) Light the Signal: Optimization of Signal Leakage Attacks against LWE-Based Key Exchange Yue Qin, Ruoyu Ding, Chi Cheng, Nina Bindel, Yanbin Pan, Jintai Ding
2022/130 (PDF ) A LeVeL Paying Field: Cryptographic Solutions towards Social Accountability and Financial Inclusion Gideon Samid
2022/129 (PDF ) TOFU - Toggle Count Analysis made simple Michael Gruber, Georg Sigl
2022/128 (PDF ) Time-Memory tradeoffs for large-weight syndrome decoding in ternary codes Pierre Karpman, Charlotte Lefevre
2022/127 (PDF ) CCA secure ElGamal encryption over an integer group where ICDH assumption holds Gyu-Chol. Kim, Jae-Yong. Sin, Yong-Bok. Jong
2022/126 (PDF ) Storage Security in Cloud Computing: Data Auditing Protocols Andrei-Alexandru Brebu, Mihai Iacov, Emil Simion
2022/125 (PDF ) Profiled Side-channel Attack on Cryptosystems based on the Binary Syndrome Decoding Problem Brice Colombier, Vlad-Florin Drăgoi, Pierre-Louis Cayrel, Vincent Grosso
2022/124 (PDF ) On the Performance Gap of a Generic C Optimized Assembler and Wide Vector Extensions for Masked Software with an Ascon-{\it{p}} test case Dor Salomon, Itamar Levi
2022/123 (PDF ) CryptoMaze: Privacy-Preserving Splitting of Off-Chain Payments Subhra Mazumdar, Sushmita Ruj
2022/122 (PDF ) Quantum cryptography with classical communication: parallel remote state preparation for copy-protection, verification, and more Alexandru Gheorghiu, Tony Metger, Alexander Poremba
2022/121 (PDF ) Crime and Punishment in Distributed Byzantine Decision Tasks (Extended Version) Pierre Civit, Seth Gilbert, Vincent Gramoli, Rachid Guerraoui, Jovan Komatovic, Zarko Milosevic, Adi Serendinschi
2022/120 (PDF ) Practical Seed Recovery of Fast Cryptographic Pseudo Random Number Generators Florette Martinez
2022/119 (PDF ) Hardware Implementation of SpoC-128 Ambati Sathvik, Tirunagari Rahul, Anubhab Baksi, Vikramkumar Pudi
2022/118 (PDF ) Streebog compression function as PRF in secret-key settings Vitaly Kiryukhin
2022/117 (PDF ) AuxChannel: Enabling Efficient Bi-Directional Channel for Scriptless Blockchains Zhimei Sui, Joseph K. Liu, Jiangshan Yu, Man Ho Au, Jia Liu
2022/116 (PDF ) Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G (Full version) Kosei Sakamoto, Fukang Liu, Yuto Nakano, Shinsaku Kiyomoto, Takanori Isobe
2022/115 (PDF ) GMHL: Generalized Multi-Hop Locks for Privacy-Preserving Payment Channel Networks Zilin Liu, Anjia Yang, Jian Weng, Tao Li, Huang Zeng, Xiaojian Liang
2022/114 (PDF ) Blockchain based AI-enabled Industry 4.0 CPS Protection against Advanced Persistent Threat Ziaur Rahman, Xun Yi, Ibrahim Khalil
2022/113 (PDF ) XCC: Theft-Resilient and Collateral-Optimized Cryptocurrency-Backed Assets Theodore Bugnet, Alexei Zamyatin
2022/112 (PDF ) Faster Kyber and Dilithium on the Cortex-M4 Amin Abdulrahman, Vincent Hwang, Matthias J. Kannwischer, Amber Sprenkels
2022/111 (PDF ) Breaking Panther Christina Boura, Rachelle Heim Boissier, Yann Rotella
2022/110 (PDF ) Revisiting Higher-Order Masked Comparison for Lattice-Based Cryptography: Algorithms and Bit-sliced Implementations Jan-Pieter D'Anvers, Michiel Van Beirendonck, Ingrid Verbauwhede
2022/109 (PDF ) Perfectly-Secure Synchronous MPC with Asynchronous Fallback Guarantees Ananya Appan, Anirudh Chandramouli, Ashish Choudhury
2022/108 (PDF ) Public Key Compression and Fast Polynomial Multiplication for NTRU using the Corrected Hybridized NTT-Karatsuba Method Rohon Kundu, Alessandro de Piccoli, Andrea Visconti
2022/107 (PDF ) Payment with Dispute Resolution: A Protocol For Reimbursing Frauds' Victims Aydin Abadi, Steven J. Murdoch
2022/106 (PDF ) Profiling Side-Channel Attacks on Dilithium: A Small Bit-Fiddling Leak Breaks It All Soundes Marzougui, Vincent Ulitzsch, Mehdi Tibouchi, Jean-Pierre Seifert
2022/105 (PDF ) Preserving Buyer-Privacy in Decentralized Supply Chain Marketplaces Varun Madathil, Alessandra Scafuro, Kemafor Anyanwu, Sen Qiao, Akash Pateria, Binil Starly
2022/104 (PDF ) Minotaur: Multi-Resource Blockchain Consensus Matthias Fitzi, Xuechao Wang, Sreeram Kannan, Aggelos Kiayias, Nikos Leonardos, Pramod Viswanath, Gerui Wang
2022/102 (PDF ) MPC-Friendly Commitments for Publicly Verifiable Covert Security Nitin Agrawal, James Bell, Adrià Gascón, Matt J. Kusner
2022/101 (PDF ) Lattice-Based Linkable Ring Signature in the Standard Model Mingxing Hu, Zhen Liu
2022/100 (PDF ) Development of Cryptography since Shannon Funda Özdemir, Çetin Kaya Koç
2022/099 (PDF ) Performance of Hierarchical Transforms in Homomorphic Encryption: A case study on Logistic Regression inference Pedro Geraldo M. R. Alves, Jheyne N. Ortiz, Diego F. Aranha
2022/098 (PDF ) Orienteering with one endomorphism Sarah Arpin, Mingjie Chen, Kristin E. Lauter, Renate Scheidler, Katherine E. Stange, Ha T. N. Tran
2022/097 (PDF ) Lattice Signature can be as Simple as Lattice Encryption Dingfeng Ye, Jun Xu, Guifang Huang, Lei Hu
2022/096 (PDF ) On Regenerating Codes and Proactive Secret Sharing: Relationships and Implications Karim Eldefrawy, Nicholas Genise, Rutuja Kshirsagar, Moti Yung
2022/095 (PDF ) Spatial Encryption Revisited: From Delegatable Multiple Inner Product Encryption and More Huy Quoc Le, Dung Hoang Duong, Willy Susilo, Josef Pieprzyk
2022/094 (PDF ) Timing leakage analysis of non-constant-time NTT implementations with Harvey butterflies Nir Drucker, Tomer Pelleg
2022/093 (PDF ) Public-Key Encryption from Homogeneous CLWE Andrej Bogdanov, Miguel Cueto Noval, Charlotte Hoffmann, Alon Rosen
2022/092 (PDF ) Rethinking Watermark: Providing Proof of IP Ownership in Modern SoCs N. Nalla Anandakumar, M. Sazadur Rahman, Mridha Md Mashahedur Rahman, Rasheed Kibria, Upoma Das, Farimah Farahmandi, Fahim Rahman, Mark M. Tehranipoor
2022/091 (PDF ) The multiplicative complexity of interval checking Thomas Häner, Mathias Soeken
2022/090 (PDF ) Attacks on Encrypted Range Search Schemes in Multiple Dimensions Francesca Falzon, Evangelia Anna Markatou, Zachary Espiritu, Roberto Tamassia
2022/089 (PDF ) NTRU-$\nu$-um: Secure Fully Homomorphic Encryption from NTRU with Small Modulus Kamil Kluczniak
2022/088 (PDF ) A survey on the security protocols employed by mobile messaging applications Ștefania Andrieș, Andrei-Daniel Miron, Andrei Cristian, Emil Simion
2022/087 (PDF ) The Internet Computer for Geeks The DFINITY Team
2022/086 (PDF ) PlonKup: Reconciling PlonK with plookup Luke Pearson, Joshua Fitzgerald, Héctor Masip, Marta Bellés-Muñoz, Jose Luis Muñoz-Tapia
2022/085 (PDF ) Cross-Domain Identity-based Matchmaking Encryption Axin Wu, Jian Weng, Weiqi Luo, Anjia Yang, Jia-Nan Liu, Zike Jiang
2022/084 (PDF ) Token meets Wallet: Formalizing Privacy and Revocation for FIDO2 Lucjan Hanzlik, Julian Loss, Benedikt Wagner
2022/083 (PDF ) Zef: Low-latency, Scalable, Private Payments Mathieu Baudet, Alberto Sonnino, Mahimna Kelkar, George Danezis
2022/082 (PDF ) Feta: Efficient Threshold Designated-Verifier Zero-Knowledge Proofs Carsten Baum, Robin Jadoul, Emmanuela Orsini, Peter Scholl, Nigel P. Smart
2022/081 (PDF ) Single-Server Private Information Retrieval with Sublinear Amortized Time Henry Corrigan-Gibbs, Alexandra Henzinger, Dmitry Kogan
2022/080 (PDF ) Better Security-Efficiency Trade-Offs in Permutation-Based Two-Party Computation Yu Long Chen, Stefano Tessaro
2022/079 (PDF ) Lightweight Secure Integer Comparison Thijs Veugen
2022/078 (PDF ) Secure Lossy Function Computation with Multiple Private Remote Source Observations Onur Gunlu, Matthieu Bloch, Rafael F. Schaefer
2022/077 (PDF ) Multiple Noisy Private Remote Source Observations for Secure Function Computation Onur Gunlu, Matthieu Bloch, Rafael F. Schaefer
2022/076 (PDF ) Babylon: Reusing Bitcoin Mining to Enhance Proof-of-Stake Security Ertem Nusret Tas, David Tse, Fisher Yu, Sreeram Kannan
2022/075 (PDF ) Uncovering Impact of Mental Models towards Adoption of Multi-device Crypto-Wallets Easwar Vivek Mangipudi, Udit Desai, Mohsen Minaei, Mainack Mondal, Aniket Kate
2022/074 (PDF ) FINAL: Faster FHE instantiated with NTRU and LWE Charlotte Bonte, Ilia Iliashenko, Jeongeun Park, Hilder V. L. Pereira, Nigel P. Smart
2022/073 (PDF ) Forward-Secure Public Key Encryption without Key Update from Proof-of-Stake Blockchain Seiya Nuta, Jacob C. N. Schuldt, Takashi Nishide
2022/072 (PDF ) Generic Construction of Public-key Authenticated Encryption with Keyword Search Revisited: Stronger Security and Efficient Construction Keita Emura
2022/071 (PDF ) Encapsulated Search Index: Public-Key, Sub-linear, Distributed, and Delegatable Erik Aronesty, David Cash, Yevgeniy Dodis, Daniel H. Gallancy, Christopher Higley, Harish Karthikeyan, Oren Tysor
2022/070 (PDF ) (Nondeterministic) Hardness vs. Non-Malleability Marshall Ball, Dana Dachman-Soled, Julian Loss
2022/069 (PDF ) Small-Box Cryptography Yevgeniy Dodis, Harish Karthikeyan, Daniel Wichs
2022/068 (PDF ) Updatable Public Key Encryption in the Standard Model Yevgeniy Dodis, Harish Karthikeyan, Daniel Wichs
2022/067 (PDF ) Parallel Operations over TFHE-Encrypted Multi-Digit Integers Jakub Klemsa, Melek Önen
2022/066 (PDF ) A remark on the Discrete Fourier Transform statistical test Anghel Florin, Asandoaiei David, Tabacaru Robert
2022/065 (PDF ) Practical (Post-Quantum) Key Combiners from One-Wayness and Applications to TLS Nimrod Aviram, Benjamin Dowling, Ilan Komargodski, Kenneth G. Paterson, Eyal Ronen, Eylon Yogev
2022/064 (PDF ) A Framework for the Design of Secure and Efficient Proofs of Retrievability Françoise Levy-dit-Vehel, Maxime Roméas
2022/063 (PDF ) Non-Interactive Zero-Knowledge Proofs to Multiple Verifiers Kang Yang, Xiao Wang
2022/062 (PDF ) An Introduction to Secret-Sharing-Based Secure Multiparty Computation Daniel Escudero
2022/061 (PDF ) A remark on the NIST 800-22 Binary Matrix Rank Test Nicu Neculache, Vlad-Andrei Petcu, Emil Simion
2022/060 (PDF ) Quantum Boomerang Attacks and Some Applications Paul Frixons, María Naya-Plasencia, André Schrottenloher
2022/059 (PDF ) SPHINCS-$\alpha$: A Compact Stateless Hash-Based Signature Scheme Kaiyi Zhang, Hongrui Cui, Yu Yu
2022/058 (PDF ) First-Order Masked Kyber on ARM Cortex-M4 Daniel Heinz, Matthias J. Kannwischer, Georg Land, Thomas Pöppelmann, Peter Schwabe, Daan Sprenkels
2022/057 (PDF ) The Hidden Parallelepiped Is Back Again: Power Analysis Attacks on Falcon Morgane Guerreau, Ange Martinelli, Thomas Ricosset, Mélissa Rossi
2022/056 (PDF ) LedgerHedger: Gas Reservation for Smart-Contract Security Itay Tsabary, Alex Manuskin, Ittay Eyal
2022/055 (PDF ) Key lifting : Multi-key Fully Homomorphic Encryption in plain model without noise flooding Xiaokang Dai, Wenyuan Wu, Yong Feng
2022/054 (PDF ) SIKE Channels Luca De Feo, Nadia El Mrabet, Aymeric Genêt, Novak Kaluđerović, Natacha Linard de Guertechin, Simon Pontié, Élise Tasso
2022/053 (PDF ) Brute Force Cryptanalysis Aron Gohr
2022/052 (PDF ) Near-optimal Balanced Reliable Broadcast and Asynchronous Verifiable Information Dispersal Sourav Das, Zhuolun Xiang, Ling Ren
2022/051 (PDF ) Titanium: A Metadata-Hiding File-Sharing System with Malicious Security Weikeng Chen, Thang Hoang, Jorge Guajardo, Attila A. Yavuz
2022/050 (PDF ) High-Speed and Unified ECC Processor for Generic Weierstrass Curves over GF(p) on FPGA Asep Muhamad Awaludin, Harashta Tatimma Larasati, Howon Kim
2022/049 (PDF ) Small MACs from Small Permutations Maria Eichlseder, Ahmet Can Mert, Christian Rechberger, Markus Schofnegger
2022/048 (PDF ) RSA, DH, and DSA in the Wild Nadia Heninger
2022/047 (PDF ) Short Pairing-Free Blind Signatures with Exponential Security Stefano Tessaro, Chenzhi Zhu
2022/046 (PDF ) Membership Privacy for Asynchronous Group Messaging Keita Emura, Kaisei Kajita, Ryo Nojima, Kazuto Ogawa, Go Ohtake
2022/045 (PDF ) Probing Security through Input-Output Separation and Revisited Quasilinear Masking Dahmun Goudarzi, Thomas Prest, Matthieu Rivain, Damien Vergnaud
2022/044 (PDF ) Security and Privacy Analysis of Recently Proposed ECC-Based RFID Authentication Schemes Atakan Arslan, Muhammed Ali Bingöl
2022/043 (PDF ) Broken Proofs of Solvency in Blockchain Custodial Wallets and Exchanges Konstantinos Chalkias, Panagiotis Chatzigiannis, Yan Ji
2022/042 (PDF ) Inapplicability of Differential Fault Attacks against Cellular Automata based Lightweight Authenticated Cipher AMBILI K N, JIMMY JOSE
2022/041 (PDF ) Reinforcing Lightweight Authenticated Encryption Schemes against Statistical Ineffective Fault Attack AMBILI K N, JIMMY JOSE
2022/040 (PDF ) Ensuring Accountability and Outsourced Decryption in IoT Systems using Ciphertext-Policy Attribute-Based Encryption AMBILI K N, JIMMY JOSE
2022/039 (PDF ) Outsourced CP-ABE with Whitebox Accountability in IoT Systems AMBILI K N, JIMMY JOSE
2022/038 (PDF ) ABE Squared: Accurately Benchmarking Efficiency of Attribute-Based Encryption Antonio de la Piedra, Marloes Venema, Greg Alpár
2022/037 (PDF ) Subgroup membership testing on elliptic curves via the Tate pairing Dmitrii Koshelev
2022/036 (PDF ) Systematic Study of Decryption and Re-Encryption Leakage: the Case of Kyber Melissa Azouaoui, Olivier Bronchain, Clément Hoffmann, Yulia Kuzovkova, Tobias Schneider, François-Xavier Standaert
2022/035 (PDF ) Time-Traveling Simulators Using Blockchains and Their Applications Vipul Goyal, Justin Raizes, Pratik Soni
2022/034 (PDF ) From Privacy-Only to Simulatable OT: Black-Box, Round-Optimal, Information-theoretic Varun Madathil, Chris Orsini, Alessandra Scafuro, Daniele Venturi
2022/033 (PDF ) Deletion-Compliance in the Absence of Privacy Jonathan Godin, Philippe Lamontagne
2022/032 (PDF ) Formal Analysis of Non-Malleability for Commitments in EasyCrypt Denis Firsov, Sven Laur, Ekaterina Zhuchko
2022/031 (PDF ) BAT: Small and Fast KEM over NTRU Lattices Pierre-Alain Fouque, Paul Kirchner, Thomas Pornin, Yang Yu
2022/030 (PDF ) Improved (Related-key) Differential-based Neural Distinguishers for SIMON and SIMECK Block Ciphers Jinyu Lu, Guoqiang Liu, Bing Sun, Chao Li, Li Liu
2022/029 (PDF ) CRYScanner: Finding cryptographic libraries misuse Amit Choudhari, Sylvain Guilley, Khaled Karray
2022/028 (PDF ) Locality-Preserving Hashing for Shifts with Connections to Cryptography Elette Boyle, Itai Dinur, Niv Gilboa, Yuval Ishai, Nathan Keller, Ohad Klein
2022/027 (PDF ) Speeding Dumbo: Pushing Asynchronous BFT Closer to Practice Bingyong Guo, Yuan Lu, Zhenliang Lu, Qiang Tang, Jing Xu, Zhenfeng Zhang
2022/026 (PDF ) Preparation for Post-Quantum era: a survey about blockchain schemes from a post-quantum perspective Andrada-Teodora Ciulei, Marian-Codrin Crețu, Emil Simion
2022/025 (PDF ) Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos Mostafizar Rahman, Dhiman Saha, Goutam Paul
2022/024 (PDF ) Bootstrapping for Approximate Homomorphic Encryption with Negligible Failure-Probability by Using Sparse-Secret Encapsulation Jean-Philippe Bossuat, Juan Ramón Troncoso-Pastoriza, Jean-Pierre Hubaux
2022/023 (PDF ) Transitional Leakage in Theory and Practice - Unveiling Security Flaws in Masked Circuits Nicolai Müller, David Knichel, Pascal Sasdrich, Amir Moradi
2022/022 (PDF ) Dynamic Group Signature Scheme on Lattice with Verifier-local Revocation Xiuju Huang, Jiashuo Song, Zichen Li
2022/021 (PDF ) WaterBear: Practical Asynchronous BFT Matching Security Guarantees of Partially Synchronous BFT Haibin Zhang, Sisi Duan, Boxin Zhao, Liehuang Zhu
2022/020 (PDF ) PACE: Fully Parallelizable BFT from Reproposable Byzantine Agreement Haibin Zhang, Sisi Duan
2022/019 (PDF ) Algebraic Meet-in-the-Middle Attack on LowMC Fukang Liu, Santanu Sarkar, Gaoli Wang, Willi Meier, Takanori Isobe
2022/018 (PDF ) Pairing-based Accountable Subgroup Multi-signatures with Verifiable Group Setup Ahmet Ramazan Ağırtaş, Oğuz Yayla
2022/017 (PDF ) Keyed-Fully Homomorphic Encryption without Indistinguishability Obfuscation Shingo Sato, Keita Emura, Atsushi Takayasu
2022/016 (PDF ) An algebraic attack to the Bluetooth stream cipher E0 Roberto La Scala, Sergio Polese, Sharwan K. Tiwari, Andrea Visconti
2022/015 (PDF ) Lattice-based Signatures with Tight Adaptive Corruptions and More Jiaxin Pan, Benedikt Wagner
2022/014 (PDF ) Transformer encoder-based Crypto-Ransomware Detection for Low-Power Embedded Processors Hyunji Kim, Sejin Lim, Yeajun Kang, Wonwoong Kim, Hwajeong Seo
2022/013 (PDF ) Quantum Rotational Cryptanalysis for Preimage Recovery of Round-Reduced Keccak Runsong Wang, Xuelian Li, Juntao Gao, Hui Li, Baocang Wang
2022/012 (PDF ) Security of Identity-based Encryption Schemes from Quadratic Residues Ferucio Laurentiu Tiplea, Sorin Iftene, George Teseleanu, Anca-Maria Nica
2022/011 (PDF ) Security Analysis of Coconut, an Attribute-Based Credential Scheme with Threshold Issuance Alfredo Rial, Ania M. Piotrowska
2022/010 (PDF ) Formalizing Delayed Adaptive Corruptions and the Security of Flooding Networks Christian Matt, Jesper Buus Nielsen, Søren Eller Thomsen
2022/009 (PDF ) Algebraic Reductions of Knowledge Abhiram Kothapalli, Bryan Parno
2022/008 (PDF ) Beating Classical Impossibility of Position Verification Jiahui Liu, Qipeng Liu, Luowen Qian
2022/007 (PDF ) PI-Cut-Choo and Friends: Compact Blind Signatures via Parallel Instance Cut-and-Choose and More Rutchathon Chairattana-Apirom, Lucjan Hanzlik, Julian Loss, Anna Lysyanskaya, Benedikt Wagner
2022/006 (PDF ) Efficient Lattice-Based Blind Signatures via Gaussian One-Time Signatures Vadim Lyubashevsky, Ngoc Khanh Nguyen, Maxime Plancon
2022/005 (PDF ) Pseudorandom Bit Generation with Asymmetric Numeral Systems Josef Pieprzyk, Marcin Pawlowski, Pawel Morawiecki, Arash Mahboubi, Jarek Duda, Seyit Camtepe
2022/004 (PDF ) Publicly verifiable anonymous tokens with private metadata bit Fabrice Benhamouda, Tancrède Lepoint, Michele Orrù, Mariana Raykova
2022/003 (PDF ) Merged with 2022/007 Rutchathon Chairattana-Apirom, Anna Lysyanskaya
2022/001 (PDF ) Analyzing the Provable Security Bounds of GIFT-COFB and Photon-Beetle Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu
2021/1705 (PDF ) GoUncle: A Blockchain Of, By, For Modest Computers Mao Wenbo, Wang Wenxiang
2021/1704 (PDF ) Verifiable Encryption from MPC-in-the-Head Akira Takahashi, Greg Zaverucha
2021/1703 (PDF ) The Maiorana-McFarland structure based cryptanalysis of Simon Hao Chen
2021/1702 (PDF ) CheckShake: Passively Detecting Anomaly in Wi-Fi Security Handshake using Gradient Boosting based Ensemble Learning Anand Agrawal, Urbi Chatterjee, Rajib Ranjan Maiti
2021/1701 (PDF ) Cryptanalysis of the Cryptosystems Based on the Generalized Hidden Discrete Logarithm Problem Ma Yanlong
2021/1700 (PDF ) A Unified Framework for Non-Universal SNARKs Helger Lipmaa
2021/1699 (PDF ) A Compact Digital Signature Scheme Based on the Module-LWR problem* Hiroki Okada, Atsushi Takayasu, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi
2021/1698 (PDF ) Efficient Random Beacons with Adaptive Security for Ungrindable Blockchains Aggelos Kiayias, Cristopher Moore, Saad Quader, Alexander Russell
2021/1697 (PDF ) Where Star Wars Meets Star Trek: SABER and Dilithium on the Same Polynomial Multiplier Andrea Basso, Furkan Aydin, Daniel Dinu, Joseph Friel, Avinash Varna, Manoj Sastry, Santosh Ghosh
2021/1696 (PDF ) Categorization of Faulty Nonce Misuse Resistant Message Authentication Yu Long Chen, Bart Mennink, Bart Preneel
2021/1695 (PDF ) Invertible Quadratic Non-Linear Layers for MPC-/FHE-/ZK-Friendly Schemes over $\mathbb F_p^n$ Lorenzo Grassi, Silvia Onofri, Marco Pedicini, Luca Sozzi
2021/1694 (PDF ) RLWE-based distributed key generation and threshold decryption Ferran Alborch, Ramiro Martínez, Paz Morillo
2021/1693 (PDF ) Verifiable Decryption for BGV Tjerand Silde
2021/1692 (PDF ) Private Lives Matter: A Differential Private Functional Encryption Scheme (extended version) Alexandtros Bakas, Antonis Michalas, Tassos Dimitriou
2021/1691 (PDF ) Quantum commitments and signatures without one-way functions Tomoyuki Morimae, Takashi Yamakawa
2021/1690 (PDF ) Rotational-Linear Attack: A New Framework of Cryptanalysis on ARX ciphers with Applications to Chaskey Yaqi Xu, Baofeng Wu, Dongdai Lin
2021/1689 (PDF ) Proof of a conjecture on a special class of matrices over commutative rings of characteristic 2 Baofeng Wu
2021/1688 (PDF ) Low-Complexity Deep Convolutional Neural Networks on Fully Homomorphic Encryption Using Multiplexed Parallel Convolutions Eunsang Lee, Joon-Woo Lee, Junghyun Lee, Young-Sik Kim, Yongjune Kim, Jong-Seon No, Woosuk Choi
2021/1687 (PDF ) Computational Irrelevancy: Bridging the Gap between Pseudo- and Real Randomness in MPC Protocols Nariyasu Heseri, Koji Nuida
2021/1686 (PDF ) Hecate: Abuse Reporting in Secure Messengers with Sealed Sender Rawane Issa, Nicolas Alhaddad, Mayank Varia
2021/1685 (PDF ) Divide and Funnel: a Scaling Technique for Mix-Networks Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, Aniket Kate
2021/1684 (PDF ) Cryptanalysis of Candidate Obfuscators for Affine Determinant Programs Li Yao, Yilei Chen, Yu Yu
2021/1683 (PDF ) PUBA: Privacy-Preserving User-Data Bookkeeping and Analytics Valerie Fetzer, Marcel Keller, Sven Maier, Markus Raiber, Andy Rupp, Rebecca Schwerdt
2021/1682 (PDF ) Making Private Function Evaluation Safer, Faster, and Simpler Yi Liu, Qi Wang, Siu-Ming Yiu
2021/1681 (PDF ) On the security of OSIDH Pierrick Dartois, Luca De Feo
2021/1680 (PDF ) Improved Constructions of Anonymous Credentials From Structure-Preserving Signatures on Equivalence Classes Aisling Connolly, Pascal Lafourcade, Octavio Perez Kempner
2021/1679 (PDF ) Incompressible Cryptography Jiaxin Guan, Daniel Wichs, Mark Zhandry
2021/1678 (PDF ) Zero-Knowledge for Homomorphic Key-Value Commitments with Applications to Privacy-Preserving Ledgers Matteo Campanelli, Felix Engelmann, Claudio Orlandi
2021/1677 (PDF ) Improving Support-Minors rank attacks: applications to G$e$MSS and Rainbow John Baena, Pierre Briaud, Daniel Cabarcas, Ray Perlner, Daniel Smith-Tone, Javier Verbel
2021/1676 (PDF ) Cryptographic Symmetric Structures Based on Quasigroups George Teseleanu
2021/1675 (PDF ) Traceable PRFs: Full Collusion Resistance and Active Security Sarasij Maitra, David J. Wu
2021/1674 (PDF ) Efficient and Post-Quantum Zero-Knowledge Proofs for Blockchain Confidential Transaction Protocols Shang GAO, Tianyu ZHENG, Yu GUO, Bin XIAO
2021/1673 (PDF ) Proving as Fast as Computing: Succinct Arguments with Constant Prover Overhead Noga Ron-Zewi, Ron D. Rothblum
2021/1672 (PDF ) Succinct Zero-Knowledge Batch Proofs for Set Accumulators Matteo Campanelli, Dario Fiore, Semin Han, Jihye Kim, Dimitris Kolonelos, Hyunok Oh
2021/1671 (PDF ) IronMask: Versatile Verification of Masking Security Sonia Belaïd, Darius Mercadier, Matthieu Rivain, Abdul Rahman Taleb
2021/1670 (PDF ) The complexity of solving Weil restriction systems Alessio Caminata, Michela Ceria, Elisa Gorla
2021/1669 (PDF ) Multi-Issuer Anonymous Credentials Without a Root Authority Kaoutar Elkhiyaoui, Angelo De Caro, Elli Androulaki
2021/1668 (PDF ) Secure Publish-Process-Subscribe System for Dispersed Computing Weizhao Jin, Bhaskar Krishnamachari, Muhammad Naveed, Srivatsan Ravi, Eduard Sanou, Kwame-Lante Wright
2021/1667 (PDF ) Using data compression and randomization to build an unconditionally secure short key cipher Boris Ryabko
2021/1666 (PDF ) Approximate Distance-Comparison-Preserving Symmetric Encryption Georg Fuchsbauer, Riddhi Ghosal, Nathan Hauke, Adam O'Neill
2021/1665 (PDF ) Leakage-Resilient IBE/ABE with Optimal Leakage Rates from Lattices Qiqi Lai, Feng-Hao Liu, Zhedong Wang
2021/1664 (PDF ) Towards a Simpler Lattice Gadget Toolkit Shiduo Zhang, Yang Yu
2021/1663 (PDF ) Cryptography from Pseudorandom Quantum States Prabhanjan Ananth, Luowen Qian, Henry Yuen
2021/1662 (PDF ) Information Security in the Quantum Era. Threats to modern cryptography: Grover’s algorithm Mihai-Zicu Mina, Emil Simion
2021/1661 (PDF ) Waldo: A Private Time-Series Database from Function Secret Sharing Emma Dauterman, Mayank Rathee, Raluca Ada Popa, Ion Stoica
2021/1660 (PDF ) Identity-Based Matchmaking Encryption without Random Oracles Danilo Francati, Alessio Guidi, Luigi Russo, Daniele Venturi
2021/1659 (PDF ) XTR and Tori Martijn Stam
2021/1658 (PDF ) Identifiable Cheating Entity Flexible Round-Optimized Schnorr Threshold (ICE FROST) Signature Protocol Alonso González, Hamy Ratoanina, Robin Salen, Setareh Sharifian, Vladimir Soukharev
2021/1657 (PDF ) SoK: Blockchain Light Clients Panagiotis Chatzigiannis, Foteini Baldimtsi, Konstantinos Chalkias
2021/1656 (PDF ) Efficient Set Membership Proofs using MPC-in-the-Head Aarushi Goel, Matthew Green, Mathias Hall-Andersen, Gabriel Kaptchuk
2021/1655 (PDF ) Grover on Present: Quantum Resource Estimation Mostafizar Rahman, Goutam Paul
2021/1654 (PDF ) Quantifiable Assurance: From IPs to Platforms Bulbul Ahmed, Md Kawser Bepary, Nitin Pundir, Mike Borza, Oleg Raikhman, Amit Garg, Dale Donchin, Adam Cron, Mohamed A Abdel-moneum, Farimah Farahmandi, Fahim Rahman, Mark Tehranipoor
2021/1653 (PDF ) A Note on Non-Interactive Key Exchange from Code Equivalence Lindsey Knowles, Edoardo Persichetti, Tovohery Randrianarisoa, Paolo Santini
2021/1652 (PDF ) Financially Backed Covert Security Sebastian Faust, Carmit Hazay, David Kretzler, Benjamin Schlosser
2021/1651 (PDF ) A compiler for multi-key homomorphic signatures for Turing machines Somayeh Dolatnezhad Samarin, Dario Fiore, Daniele Venturi, Morteza Amini
2021/1650 (PDF ) “They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks Jan Jancar, Marcel Fourné, Daniel De Almeida Braga, Mohamed Sabt, Peter Schwabe, Gilles Barthe, Pierre-Alain Fouque, Yasemin Acar
2021/1649 (PDF ) A New Security Notion for PKC in the Standard Model: Weaker, Simpler, and Still Realizing Secure Channels Wasilij Beskorovajnov, Roland Gröll, Jörn Müller-Quade, Astrid Ottenhues, Rebecca Schwerdt
2021/1648 (PDF ) A Scalable SIMD RISC-V based Processor with Customized Vector Extensions for CRYSTALS-Kyber Huimin Li, Nele Mentens, Stjepan Picek
2021/1647 (PDF ) Privacy-Preserving Authenticated Key Exchange for Constrained Devices Loïc Ferreira
2021/1646 (PDF ) A Method for Securely Comparing Integers using Binary Trees Anselme Tueno, Jonas Janneck
2021/1645 (PDF ) Sequential Indifferentiability of Confusion-Diffusion Networks Qi Da, Shanjie Xu, Chun Guo
2021/1644 (PDF ) Pushing the Limits: Searching for Implementations with the Smallest Area for Lightweight S-Boxes Zhenyu Lu, Weijia Wang, Kai Hu, Yanhong Fan, Lixuan Wu, Meiqin Wang
2021/1643 (PDF ) STROBE: Stake-based Threshold Random Beacons Donald Beaver, Konstantinos Chalkias, Mahimna Kelkar, Lefteris Kokoris Kogias, Kevin Lewi, Ladi de Naurois, Valeria Nicolaenko, Arnab Roy, Alberto Sonnino
2021/1642 (PDF ) SecNDP: Secure Near-Data Processing with Untrusted Memory Wenjie Xiong, Liu Ke, Dimitrije Jankov, Michael Kounavis, Xiaochen Wang, Eric Northup, Jie Amy Yang, Bilge Acun, Carole-Jean Wu, Ping Tak Peter Tang, G. Edward Suh, Xuan Zhang, Hsien-Hsin S. Lee.
2021/1641 (PDF ) Differential Cryptanalysis of WARP Je Sen Teh, Alex Biryukov
2021/1640 (PDF ) New Differential Cryptanalysis Results for the Lightweight Block Cipher BORON Je Sen Teh, Li Jing Tham, Norziana Jamil, Wun-She Yap
2021/1639 (PDF ) A Simple Deterministic Algorithm for Systems of Quadratic Polynomials over $\mathbb{F}_2$ Charles Bouillaguet, Claire Delaplace, Monika Trimoska
2021/1638 (PDF ) 00 Nguyen Thoi Minh Quan
2021/1637 (PDF ) Internet Security and Quantum Computing Hilarie Orman
2021/1636 (PDF ) Does Fully Homomorphic Encryption Need Compute Acceleration? Leo de Castro, Rashmi Agrawal, Rabia Yazicigil, Anantha Chandrakasan, Vinod Vaikuntanathan, Chiraag Juvekar, Ajay Joshi
2021/1635 (PDF ) Synchronous Distributed Key Generation without Broadcasts Nibesh Shrestha, Adithya Bhat, Aniket Kate, Kartik Nayak
2021/1634 (PDF ) McEliece needs a Break -- Solving McEliece-1284 and Quasi-Cyclic-2918 with Modern ISD Andre Esser, Alexander May, Floyd Zweydinger
2021/1633 (PDF ) Zero Knowledge Proofs towards Verifiable Decentralized AI Pipelines Nitin Singh, Pankaj Dayama, Vinayaka Pandit
2021/1632 (PDF ) Cryptanalysis of RSA Variants with Primes Sharing Most Significant Bits Meryem Cherkaoui-Semmouni, Abderrahmane Nitaj, Willy Susilo, Joseph Tonien
2021/1631 (PDF ) Secure Sampling of Constant-Weight Words – Application to BIKE Nicolas Sendrier
2021/1630 (PDF ) Exponential Increment of RSA Attack Range via Lattice Based Cryptanalysis Abderahmanne Nitaj, Muhammad Rezal Kamel Ariffin, Nurul Nur Hanisah Adenan, Domenica Stefania Merenda, Ali Ahmadian
2021/1629 (PDF ) Increment of Insecure RSA Private Exponent Bound Through Perfect Square RSA Diophantine Parameters Cryptanalysis Wan Nur Aqlili Ruzai, Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin, Zahari Mahad, Muhammad Asyraf Asbullah
2021/1628 (PDF ) SoK: Mitigation of Front-running in Decentralized Finance Carsten Baum, James Hsin-yu Chiang, Bernardo David, Tore Kasper Frederiksen, Lorenzo Gentile
2021/1627 (PDF ) A PKI-based Framework for Establishing Efficient MPC Channels Daniel Masny, Gaven Watson
2021/1626 (PDF ) A Successful Subfield Lattice Attack on a Fully Homomorphic Encryption Scheme Martha Norberg Hovd
2021/1625 (PDF ) A note on the QFT randomness spectral test a new approach of DST Emil SIMION, Elena-Corina CIPU, Vasile-Laurențiu DOSAN, Andrei-Voicu TOMUȚ, Eugen Neacsu
2021/1624 (PDF ) On the IND-CCA1 Security of FHE Schemes Prastudy Fauzi, Martha Norberg Hovd, Håvard Raddum
2021/1623 (PDF ) On the Short Principal Ideal Problem over some real Kummer fields Andrea Lesavourey, Thomas Plantard, Willy Susilo
2021/1622 (PDF ) Roulette: A Diverse Family of Feasible Fault Attacks on Masked Kyber Jeroen Delvaux
2021/1621 (PDF ) Alpha-Rays: Key Extraction Attacks on Threshold ECDSA Implementations Dmytro Tymokhanov, Omer Shlomovits
2021/1620 (PDF ) Unicity distance of the Zodiac-340 cipher Joachim von zur Gathen
2021/1618 (PDF ) Succinct Publicly-Certifiable Proofs (or: Can a Blockchain Verify a Designated-Verifier Proof?) Matteo Campanelli, Hamidreza Khoshakhlagh
2021/1617 (PDF ) Richelot Isogenies, Pairings on Squared Kummer Surfaces and Applications Chao Chen, Fangguo Zhang
2021/1616 (PDF ) A Note on the Post-Quantum Security of (Ring) Signatures Rohit Chatterjee, Kai-Min Chung, Xiao Liang, Giulio Malavolta
2021/1615 (PDF ) High-order Polynomial Comparison and Masking Lattice-based Encryption Jean-Sébastien Coron, François Gérard, Simon Montoya, Rina Zeitoun
2021/1612 (PDF ) Universal Atomic Swaps: Secure Exchange of Coins Across All Blockchains Sri AravindaKrishnan Thyagarajan, Giulio Malavolta, Pedro Moreno-Sánchez
2021/1611 (PDF ) Solving degree, last fall degree, and related invariants Alessio Caminata, Elisa Gorla
2021/1610 (PDF ) Factoring Primes to Factor Moduli: Backdooring and Distributed Generation of Semiprimes Giuseppe Vitto
2021/1609 (PDF ) Polynomial XL: A Variant of the XL Algorithm Using Macaulay Matrices over Polynomial Rings Hiroki Furue, Momonari Kudo
2021/1608 (PDF ) An Optimized Quantum Implementation of ISD on Scalable Quantum Resources Andre Esser, Sergi Ramos-Calderer, Emanuele Bellini, José I. Latorre, Marc Manzano
2021/1607 (PDF ) Efficient and Extensive Search Linear Approximations with High for Precise Correlations of Full SNOW-V ZhaoCun Zhou, DengGuo Feng, Bin Zhang
2021/1606 (PDF ) An Enhanced Long-term Blockchain Scheme Against Compromise of Cryptography Long Meng, Liqun Chen
2021/1605 (PDF ) Inflation-Tracking Proof-of-Work Crypto-Currencies Charanjit S. Jutla
2021/1604 (PDF ) The most efficient indifferentiable hashing to elliptic curves of $j$-invariant $1728$ Dmitrii Koshelev
2021/1603 (PDF ) CHEX-MIX: Combining Homomorphic Encryption with Trusted Execution Environments for Two-party Oblivious Inference in the Cloud Deepika Natarajan, Andrew Loveless, Wei Dai, Ronald Dreslinski
2021/1602 (PDF ) A Note on P/poly Validity of GVW15 Predicate Encryption Scheme Yupu Hu, Siyue Dong, Baocang Wang, Jun Liu
2021/1601 (PDF ) Post-Quantum Security of the Even-Mansour Cipher Gorjan Alagic, Chen Bai, Jonathan Katz, Christian Majenz
2021/1600 (PDF ) A New Isogeny Representation and Applications to Cryptography Antonin Leroux
2021/1599 (PDF ) How to prove any NP statement jointly? Efficient Distributed-prover Zero-Knowledge Protocols Pankaj Dayama, Arpita Patra, Protik Paul, Nitin Singh, Dhinakaran Vinayagamurthy
2021/1598 (PDF ) Modelling IBE-based Key Exchange Protocol using Tamarin Prover Srijanee Mookherji, Vanga Odelu, Rajendra Prasath
2021/1597 (PDF ) Cryptographic Analysis of the Bluetooth Secure Connection Protocol Suite Marc Fischlin, Olga Sanina
2021/1596 (PDF ) SHealS and HealS: isogeny-based PKEs from akey validation method for SIDH Tako Boris Fouotsa, Christophe Petit
2021/1595 (PDF ) A formula for disaster: a unified approach to elliptic curve special-point-based attacks Vladimir Sedlacek, Jesús-Javier Chi-Domínguez, Jan Jancar, Billy Bob Brumley
2021/1594 (PDF ) On the Bottleneck Complexity of MPC with Correlated Randomness Claudio Orlandi, Divya Ravi, Peter Scholl
2021/1593 (PDF ) Interpreting and Mitigating Leakage-abuse Attacks in Searchable Symmetric Encryption Lei Xu, Huayi Duan, Anxin Zhou, Xingliang Yuan, Cong Wang
2021/1592 (PDF ) The Need for Speed: A Fast Guessing Entropy Calculation for Deep Learning-based SCA Guilherme Perin, Lichao Wu, Stjepan Picek
2021/1591 (PDF ) Practical Asynchronous Distributed Key Generation Sourav Das, Thomas Yurek, Zhuolun Xiang, Andrew Miller, Lefteris Kokoris-Kogias, Ling Ren
2021/1590 (PDF ) Garbling, Stacked and Staggered: Faster k-out-of-n Garbled Function Evaluation David Heath, Vladimir Kolesnikov, Stanislav Peceny
2021/1589 (PDF ) SoK: Validating Bridges as a Scaling Solution for Blockchains Patrick McCorry, Chris Buckland, Bennet Yee, Dawn Song
2021/1587 (PDF ) Low-Bandwidth Threshold ECDSA via Pseudorandom Correlation Generators Damiano Abram, Ariel Nof, Claudio Orlandi, Peter Scholl, Omer Shlomovits
2021/1586 (PDF ) Cryptanalysis of a Type of White-Box Implementations of the SM4 Block Cipher Jiqiang Lu, Jingyu Li
2021/1585 (PDF ) Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy Cong Zuo, Shangqi Lai, Xingliang Yuan, Joseph K. Liu, Jun Shao, Huaxiong Wang
2021/1584 (PDF ) ppSAT: Towards Two-Party Private SAT Solving Ning Luo, Samuel Judson, Timos Antonopoulos, Ruzica Piskac, Xiao Wang
2021/1583 (PDF ) Orientations and the supersingular endomorphism ring problem Benjamin Wesolowski
2021/1582 (PDF ) CoTree: Push the Limits of Conquerable Space in Collision-Optimized Side-Channel Attacks Changhai Ou, Debiao He, Zhu Wang, Kexin Qiao, Shihui Zheng, Siew-Kei Lam
2021/1581 (PDF ) Anonymous Authenticated Communication Fabio Banfi, Ueli Maurer
2021/1580 (PDF ) High Order Side-Channel Security for Elliptic-Curve Implementations Sonia Belaïd, Matthieu Rivain
2021/1579 (PDF ) Le Mans: Dynamic and Fluid MPC for Dishonest Majority Rahul Rachuri, Peter Scholl
2021/1578 (PDF ) On Quantum Query Complexities of Collision-Finding in Non-Uniform Random Functions Tianci Peng, Shujiao Cao, Rui Xue
2021/1577 (PDF ) SNARKBlock: Federated Anonymous Blocklisting from Hidden Common Input Aggregate Proofs Michael Rosenberg, Mary Maller, Ian Miers
2021/1576 (PDF ) Shared Permutation for Syndrome Decoding: New Zero-Knowledge Protocol and Code-Based Signature Thibauld Feneuil, Antoine Joux, Matthieu Rivain
2021/1575 (PDF ) Shorter Lattice-Based Group Signatures via ``Almost Free'' Encryption and Other Optimizations Vadim Lyubashevsky, Ngoc Khanh Nguyen, Maxime Plancon, Gregor Seiler
2021/1574 (PDF ) Ascon PRF, MAC, and Short-Input MAC Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer
2021/1573 (PDF ) Improved Security Bound of \textsf{(E/D)WCDM} Nilanjan Datta, Avijit Dutta, Kushankur Dutta
2021/1572 (PDF ) Integral Attacks on Pyjamask-96 and Round-Reduced Pyjamask-128 (Full version) Jiamin Cui, Kai Hu, Qingju Wang, Meiqin Wang
2021/1571 (PDF ) Tight Security for Key-Alternating Ciphers with Correlated Sub-Keys Stefano Tessaro, Xihu Zhang
2021/1570 (PDF ) Multicast Key Agreement, Revisited Alexander Bienstock, Yevgeniy Dodis, Yi Tang
2021/1569 (PDF ) ABBY: Automating the creation of transition-based leakage models Omid Bazangani, Alexandre Iooss, Ileana Buhan, Lejla Batina
2021/1568 (PDF ) Impeccable Circuits III Shahram Rasoolzadeh, Aein Rezaei Shahmirzadi, Amir Moradi
2021/1567 (PDF ) Structural and Statistical Analysis of Multidimensional Linear Approximations of Random Functions and Permutations Tomer Ashur, Mohsin Khan, Kaisa Nyberg
2021/1566 (PDF ) Towards Using Blockchain Technology to Prevent Diploma Fraud Qiang Tang
2021/1565 (PDF ) Practical, Round-Optimal Lattice-Based Blind Signatures Shweta Agrawal, Elena Kirshanova, Damien Stehle, Anshu Yadav
2021/1564 (PDF ) Communication-Efficient Proactive MPC for Dynamic Groups with Dishonest Majorities Karim Eldefrawy, Tancrède Lepoint, Antonin Leroux
2021/1563 (PDF ) Towards Post-Quantum Security for Cyber-Physical Systems: Integrating PQC into Industrial M2M Communication Sebastian Paul, Patrik Scheible, Friedrich Wiemer
2021/1562 (PDF ) Concurrently Composable Non-Interactive Secure Computation Andrew Morgan, Rafael Pass
2021/1561 (PDF ) Quantum Time/Memory/Data Tradeoff Attacks Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir
2021/1560 (PDF ) SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations Shiyao Chen, Yanhong Fan, Ling Sun, Yong Fu, Haibo Zhou, Yongqing Li, Meiqin Wang, Weijia Wang, Chun Guo
2021/1559 (PDF ) Facial Template Protection via Lattice-based Fuzzy Extractors Kaiyi Zhang, Hongrui Cui, Yu Yu
2021/1558 (PDF ) RSA Key Recovery from Digit Equivalence Information Chitchanok Chuengsatiansup, Andrew Feutrill, Rui Qi Sim, Yuval Yarom
2021/1557 (PDF ) Performance bounds for QC-MDPC codes decoders Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi, Paolo Santini
2021/1556 (PDF ) Diving Deep into the Weak Keys of Round Reduced Ascon Raghvendra Rohit, Santanu Sarkar
2021/1555 (PDF ) Accelerator for Computing on Encrypted Data Sujoy Sinha Roy, Ahmet Can Mert, Aikata, Sunmin Kwon, Youngsam Shin, Donghoon Yoo
2021/1554 (PDF ) How to Claim a Computational Feat Clémence Chevignard, Rémi Géraud-Stewart, Antoine Houssais, David Naccache, Edmond de Roffignac
2021/1553 (PDF ) Performance Evaluation of Post-Quantum TLS 1.3 on Resource-Constrained Embedded Systems George Tasopoulos, Jinhui Li, Apostolos P. Fournaris, Raymond K. Zhao, Amin Sakzad, Ron Steinfeld
2021/1552 (PDF ) Time-memory Trade-offs for Saber+ on Memory-constrained RISC-V Jipeng Zhang, Junhao Huang, Zhe Liu, Sujoy Sinha Roy
2021/1551 (PDF ) Blockchain for IoT: A Critical Analysis Concerning Performance and Scalability Ziaur Rahman, Xun Yi, Ibrahim Khalil, Andrei Kelarev
2021/1550 (PDF ) Chaos and Logistic Map based Key Generation Technique for AES-driven IoT Security Ziaur Rahman, Ibrahim Khalil, Mousumi Sumi
2021/1549 (PDF ) Kicking-the-Bucket: Fast Privacy-Preserving Trading Using Buckets Mariana Botelho da Gama, John Cartlidge, Antigoni Polychroniadou, Nigel P. Smart, Younes Talibi Alaoui
2021/1548 (PDF ) Just how hard are rotations of $\mathbb{Z}^n$? Algorithms and cryptography with the simplest lattice Huck Bennett, Atul Ganju, Pura Peetathawatchai, Noah Stephens-Davidowitz
2021/1547 (PDF ) SoK: Plausibly Deniable Storage Chen Chen, Xiao Liang, Bogdan Carbunar, Radu Sion
2021/1546 (PDF ) Improving Deep Learning Networks for Profiled Side-Channel Analysis Using Performance Improvement Techniques Damien Robissout, Lilian Bossuet, Amaury Habrard, Vincent Grosso
2021/1545 (PDF ) Longest Chain Consensus Under Bandwidth Constraint Joachim Neu, Srivatsan Sridhar, Lei Yang, David Tse, Mohammad Alizadeh
2021/1544 (PDF ) Information Dispersal with Provable Retrievability for Rollups Kamilla Nazirkhanova, Joachim Neu, David Tse
2021/1543 (PDF ) Post-Quantum Zero Knowledge, Revisited (or: How to do Quantum Rewinding Undetectably) Alex Lombardi, Fermi Ma, Nicholas Spooner
2021/1542 (PDF ) An End-to-End Bitstream Tamper Attack Against Flip-Chip FPGAs Fahim Rahman, Farimah Farahmandi, Mark Tehranipoor
2021/1541 (PDF ) Revisiting the Security of COMET Authenticated Encryption Scheme Shay Gueron, Ashwin Jha, Mridul Nandi
2021/1540 (PDF ) Lightweight Swarm Authentication George Teseleanu
2021/1539 (PDF ) Route Discovery in Private Payment Channel Networks Zeta Avarikioti, Mahsa Bastankhah, Mohammad Ali Maddah-Ali, Krzysztof Pietrzak, Jakub Svoboda, Michelle Yeo
2021/1538 (PDF ) SIMC: ML Inference Secure Against Malicious Clients at Semi-Honest Cost Nishanth Chandran, Divya Gupta, Sai Lakshmi Bhavana Obbattu, Akash Shah
2021/1537 (PDF ) PNB-focused Differential Cryptanalysis of ChaCha Stream Cipher Shotaro Miyashita, Ryoma Ito, Atsuko Miyaji
2021/1536 (PDF ) SoK: Tokenization on Blockchain Gang Wang, Mark Nixon
2021/1535 (PDF ) Light-OCB: Parallel Lightweight Authenticated Cipher with Full Security Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Manicillas Lopez, Mridul Nandi
2021/1534 (PDF ) An Optimized GHV-Type HE Scheme: Simpler, Faster, and More Versatile Liang Zhao, Ze Chen, Liqun Chen, Xinyi Huang
2021/1533 (PDF ) The Legendre Symbol and the Modulo-2 Operator in Symmetric Schemes over (F_p)^n Lorenzo Grassi, Dmitry Khovratovich, Sondre Rønjom, Markus Schofnegger
2021/1532 (PDF ) On the Download Rate of Homomorphic Secret Sharing Ingerid Fosli, Yuval Ishai, Victor I. Kolobov, Mary Wootters
2021/1531 (PDF ) Squint Hard Enough: Evaluating Perceptual Hashing with Machine Learning Jonathan Prokos, Tushar M. Jois, Neil Fendley, Roei Schuster, Matthew Green, Eran Tromer, Yinzhi Cao
2021/1530 (PDF ) Experimenting with Collaborative zk-SNARKs: Zero-Knowledge Proofs for Distributed Secrets Alex Ozdemir, Dan Boneh
2021/1529 (PDF ) Autoguess: A Tool for Finding Guess-and-Determine Attacks and Key Bridges Hosein Hadipour, Maria Eichlseder
2021/1528 (PDF ) An Alternative Approach for Computing Discrete Logarithms in Compressed SIDH Kaizhan Lin, Weize Wang, Lin Wang, Chang-An Zhao
2021/1527 (PDF ) CoHA-NTT: A Configurable Hardware Accelerator for NTT-based Polynomial Multiplication Kemal Derya, Ahmet Can Mert, Erdinç Öztürk, Erkay Savaş
2021/1526 (PDF ) A Performance Evaluation of Pairing-Based Broadcast Encryption Systems Arush Chhatrapati, Susan Hohenberger, James Trombo, Satyanarayana Vusirikala
2021/1525 (PDF ) Amortizing Rate-1 OT and Applications to PIR and PSI Melissa Chase, Sanjam Garg, Mohammad Hajiabadi, Jialin Li, Peihan Miao
2021/1524 (PDF ) An Improved Range Proof with Base-3 Construction Esra Günsay, Cansu Betin Onur, Murat Cenk
2021/1523 (PDF ) Perfect Trees: Designing Energy-Optimal Symmetric Encryption Primitives Andrea Caforio, Subhadeep Banik, Yosuke Todo, Willi Meier, Takanori Isobe, Fukang Liu, Bin Zhang
2021/1522 (PDF ) On Cryptocurrency Wallet Design Ittay Eyal
2021/1521 (PDF ) Security evaluation against side-channel analysis at compilation time Nicolas Bruneau, Charles Christen, Jean-Luc Danger, Adrien Facon, Sylvain Guilley
2021/1520 (PDF ) Ark of the ECC: An open-source ECDSA power analysis attack on a FPGA based Curve P-256 implementation Jean-Pierre Thibault, Colin O’Flynn, Alex Dewar
2021/1519 (PDF ) Practical Garbled RAM: GRAM with $O(\log^2 n)$ Overhead David Heath, Vladimir Kolesnikov, Rafail Ostrovsky
2021/1518 (PDF ) Revisiting Mutual Information Analysis: Multidimensionality, Neural Estimation and Optimality Proofs Valence Cristiani, Maxime Lecomte, Philippe Maurine
2021/1517 (PDF ) HOLMES: Efficient Distribution Testing for Secure Collaborative Learning Ian Chang, Katerina Sotiraki, Weikeng Chen, Murat Kantarcioglu, Raluca Ada Popa
2021/1516 (PDF ) Post-Quantum Simulatable Extraction with Minimal Assumptions: Black-Box and Constant-Round Nai-Hui Chia, Kai-Min Chung, Xiao Liang, Takashi Yamakawa
2021/1515 (PDF ) Blockchain-based Security Framework for Critical Industry 4.0 Cyber-physical System Ziaur Rahman, Ibrahim Khalil, Xun Yi, Mohammed Atiquzzaman
2021/1514 (PDF ) Clarion: Anonymous Communication from Multiparty Shuffling Protocols Saba Eskandarian, Dan Boneh
2021/1513 (PDF ) InterTrust: Towards an Efficient Blockchain Interoperability Architecture with Trusted Services Gang Wang, Mark Nixon
2021/1512 (PDF ) BLOCK CIPHER DEFINED BY MATRIX PRESENTATION OF QUASIGROUPS Smile Markovski, Vesna Dimitrova, Zlatka Trajcheska, Marija Petkovska, Mile Kostadinoski, Damjan Buhov
2021/1511 (PDF ) Compressed SIKE Round 3 on ARM Cortex-M4 Mila Anastasova, Mojtaba Bisheh-Niasar, Reza Azarderakhsh, Mehran Mozaffari Kermani
2021/1510 (PDF ) Pattern Devoid Cryptography Gideon Samid
2021/1509 (PDF ) More Lessons: Analysis of PUF-based Authentication Protocols for IoT Karim Lounis, Mohammad Zulkernine
2021/1508 (PDF ) High-Speed Hardware Architectures and FPGA Benchmarking of CRYSTALS-Kyber, NTRU, and Saber Viet Ba Dang, Kamyar Mohajerani, Kris Gaj
2021/1507 (PDF ) Parallel Quantum Addition for Korean Block Cipher Kyungbae Jang, Gyeongju Song, Hyunjun Kim, Hyeokdong Kwon, Hyunji Kim, Hwajeong Seo
2021/1506 (PDF ) z-OTS: a one-time hash-based digital signaturescheme with fast verification Amos Zheng, Marcos A. Simplicio Jr.
2021/1505 (PDF ) EVA Improved: Compiler and Extension Library for CKKS Sangeeta Chowdhary, Wei Dai, Kim Laine, Olli Saarikivi
2021/1504 (PDF ) CCA SecureA Posteriori Openable Encryption in the Standard Model Xavier Bultel
2021/1503 (PDF ) Interaction-Preserving Compilers for Secure Computation Nico Döttling, Vipul Goyal, Giulio Malavolta, Justin Raizes
2021/1502 (PDF ) Strong and Tight Security Guarantees against Integral Distinguishers Phil Hebborn, Baptiste Lambin, Gregor Leander, Yosuke Todo
2021/1501 (PDF ) Relations between Privacy, Verifiability, Accountability and Coercion-Resistance in Voting Protocols Alisa Pankova, Jan Willemson
2021/1500 (PDF ) Succinct Erasure Coding Proof Systems Nicolas Alhaddad, Sisi Duan, Mayank Varia, Haibin Zhang
2021/1499 (PDF ) Improved Lattice-Based Mix-Nets for Electronic Voting Valeh Farzaliyev, Jan Willemson, Jaan Kristjan Kaasik
2021/1498 (PDF ) Rectangular, Range, and Restricted AONTs: Three Generalizations of All-or-Nothing Transforms Navid Nasr Esfahani, Douglas Stinson
2021/1497 (PDF ) GMMT: A Revocable Group Merkle Multi-Tree Signature Scheme Mahmoud Yehia, Riham AlTawy, T. Aaron Gulliver
2021/1496 (PDF ) Security Analysis Of DGM and GM Group Signature Schemes Instantiated With XMSS-T Mahmoud Yehia, Riham AlTawy, T. Aaron Gulliver
2021/1495 (PDF ) Veri Mahmoud Yehia, Riham AlTawy, T. Aaron Gulliver
2021/1494 (PDF ) On the efficiency of a general attack against the MOBS cryptosystem Christopher Battarbee, Delaram Kahrobaei, Dylan Tailor, Siamak F. Shahandashti
2021/1493 (PDF ) VASA: Vector AES Instructions for Security Applications Jean-Pierre Münch, Thomas Schneider, Hossein Yalame
2021/1492 (PDF ) SoK: Password-Authenticated Key Exchange -- Theory, Practice, Standardization and Real-World Lessons Feng Hao, Paul C. van Oorschot
2021/1491 (PDF ) The Hidden Lattice Problem Luca Notarnicola, Gabor Wiese
2021/1490 (PDF ) Aggregate Measurement via Oblivious Shuffling Erik Anderson, Melissa Chase, Wei Dai, F. Betul Durak, Kim Laine, Siddhart Sharma, Chenkai Weng
2021/1489 (PDF ) Estimating the Effectiveness of Lattice Attacks Kotaro Abe, Makoto Ikeda
2021/1488 (PDF ) Accelerating the Delfs-Galbraith algorithm with fast subfield root detection Maria Corte-Real Santos, Craig Costello, Jia Shi
2021/1487 (PDF ) A Cryptographic View of Deep-Attestation, or how to do Provably-Secure Layer-Linking Ghada Arfaoui, Pierre-Alain Fouque, Thibaut Jacques, Pascal Lafourcade, Adina Nedelcu, Cristina Onete, Léo Robert
2021/1486 (PDF ) Mitaka: a simpler, parallelizable, maskable variant of Falcon Thomas Espitau, Pierre-Alain Fouque, François Gérard, Mélissa Rossi, Akira Takahashi, Mehdi Tibouchi, Alexandre Wallet, Yang Yu
2021/1485 (PDF ) Don't Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling in HQC and BIKE Qian Guo, Clemens Hlauschek, Thomas Johansson, Norman Lahr, Alexander Nilsson, Robin Leander Schröder
2021/1484 (PDF ) On Forging SPHINCS+-Haraka Signatures on a Fault-tolerant Quantum Computer Robin M. Berger, Marcel Tiepelt
2021/1483 (PDF ) A Practical Forward-Secure DualRing Nan Li, Yingjiu Li, Atsuko Miyaji, Yangguang Tian, Tsz Hon Yuen
2021/1482 (PDF ) The Optimal Error Resilience of Interactive Communication Over Binary Channels Meghal Gupta, Rachel Yun Zhang
2021/1481 (PDF ) Interactive Error Correcting Codes Over Binary Erasure Channels Resilient to $>\frac12$ Adversarial Corruption Meghal Gupta, Yael Tauman Kalai, Rachel Zhang
2021/1480 (PDF ) Extractors: Low Entropy Requirements Colliding With Non-Malleability Eldon Chung, Maciej Obremski, Divesh Aggarwal
2021/1479 (PDF ) Reducing the Cost of Machine Learning Differential Attacks Using Bit Selection and aPartial ML-Distinguisher Amirhossein Ebrahimi, Francesco Regazzoni, Paolo Palmieri
2021/1478 (PDF ) Zarcanum: A Proof-of-Stake Scheme for Confidential Transactions with Hidden Amounts sowle, koe
2021/1477 (PDF ) Multisignature with double threshold condition in the blockchain and its application to and strong keys generating Ruslan Skuratovskii, Alexandr Kalenyk
2021/1476 (PDF ) Multivariate public key cryptography with polynomial composition Emile Hautefeuille
2021/1475 (PDF ) Circuit-based PSI for Covid-19 Risk Scoring Leonie Reichert, Marcel Pazelt, Björn Scheuermann
2021/1474 (PDF ) Foundations of Transaction Fee Mechanism Design Hao Chung, Elaine Shi
2021/1473 (PDF ) Computational self-testing for entangled magic states Akihiro Mizutani, Yuki Takeuchi, Ryo Hiromasa, Yusuke Aikawa, Seiichiro Tani
2021/1472 (PDF ) Improving Cryptography Based On Entropoids Anisha Mukherjee, Saibal K. Pal
2021/1471 (PDF ) Efficient Searchable Symmetric Encryption for Join Queries Charanjit Jutla, Sikhar Patranabis
2021/1470 (PDF ) Concurrent-Secure Two-Party Computation in Two Rounds from Subexponential LWE Saikrishna Badrinarayanan, Rex Fernando, Amit Sahai
2021/1469 (PDF ) New Indifferentiability Security Proof of MDPH Hash Function Chun Guo, Tetsu Iwata, Kazuhiko Minematsu
2021/1468 (PDF ) LeakageVerif: Scalable and Efficient Leakage Verification in Symbolic Expressions Quentin L. Meunier, Etienne Pons, Karine Heydemann
2021/1467 (PDF ) On the Round Complexity of Black-box Secure MPC Yuval Ishai, Dakshita Khurana, Amit Sahai, Akshayaram Srinivasan
2021/1466 (PDF ) On semigroups of multivariate transformations constructed in terms of time dependent linguistic graphs and solutions of Post Quantum Multivariate Cryptography. V. Ustimenko
2021/1465 (PDF ) Themis: Fast, Strong Order-Fairness in Byzantine Consensus Mahimna Kelkar, Soubhik Deb, Sishan Long, Ari Juels, Sreeram Kannan
2021/1464 (PDF ) Polynomial-time targeted attacks on coin tossing for any number of corruptions Omid Etesami, Ji Gao, Saeed Mahloujifar, Mohammad Mahmoody
2021/1463 (PDF ) 3-Party Distributed ORAM from Oblivious Set Membership Brett Hemenway Falk, Daniel Noble, Rafail Ostrovsky
2021/1462 (PDF ) Prime pairing in algorithms searching for smooth group order Pavel Atnashev, George Woltman
2021/1461 (PDF ) A Unified Cryptoprocessor for Lattice-based Signature and Key-exchange Aikata Aikata, Ahmet Can Mert, David Jacquemin, Amitabh Das, Donald Matthews, Santosh Ghosh, Sujoy Sinha Roy
2021/1460 (PDF ) Fine-Grained Cryptanalysis: Tight Conditional Bounds for Dense k-SUM and k-XOR Itai Dinur, Nathan Keller, Ohad Klein
2021/1459 (PDF ) Privacy-preserving Identity Management System Jeonghyuk Lee, Jaekyung Choi, Hyunok Oh, Jihye Kim
2021/1458 (PDF ) QC-MDPC codes DFR and the IND-CCA security of BIKE Valentin Vasseur
2021/1457 (PDF ) An In-Depth Symbolic Security Analysis of the ACME Standard Karthikeyan Bhargavan, Abhishek Bichhawat, Quoc Huy Do, Pedram Hosseyni, Ralf Kuesters, Guido Schmitz, Tim Wuertele
2021/1456 (PDF ) Server-Aided Continuous Group Key Agreement Joël Alwen, Dominik Hartmann, Eike Kiltz, Marta Mularczyk
2021/1455 (PDF ) Dynamic Random Probing Expansion with Quasi Linear Asymptotic Complexity Sonia Belaïd, Matthieu Rivain, Abdul Rahman Taleb, Damien Vergnaud
2021/1454 (PDF ) Russian Federal Remote E-voting Scheme of 2021 -- Protocol Description and Analysis Jelizaveta Vakarjuk, Nikita Snetkov, Jan Willemson
2021/1453 (PDF ) A State-Separating Proof for Yao’s Garbling Scheme Chris Brzuska, Sabine Oechsner
2021/1452 (PDF ) A Lightweight Implementation of Saber Resistant Against Side-Channel Attacks Abubakr Abdulgadir, Kamyar Mohajerani, Viet Ba Dang, Jens-Peter Kaps, Kris Gaj
2021/1451 (PDF ) High-Performance Hardware Implementation of CRYSTALS-Dilithium Luke Beckwith, Duc Tri Nguyen, Kris Gaj
2021/1450 (PDF ) Efficient Zero-Knowledge Argument in Discrete Logarithm Setting: Sublogarithmic Proof or Sublinear Verifier Sungwook Kim, Hyeonbum Lee, Jae Hong Seo
2021/1449 (PDF ) One-more Unforgeability of Blind ECDSA Xianrui Qin, Cailing Cai, Tsz Hon Yuen
2021/1448 (PDF ) Secure Featurization and Applications to Secure Phishing Detection Akash Shah, Nishanth Chandran, Mesfin Dema, Divya Gupta, Arun Gururajan, Huan Yu
2021/1447 (PDF ) Mixed Certificate Chains for the Transition to Post-Quantum Authentication in TLS 1.3 Sebastian Paul, Yulia Kuzovkova, Norman Lahr, Ruben Niederhagen
2021/1446 (PDF ) Batch point compression in the context of advanced pairing-based protocols Dmitrii Koshelev
2021/1445 (PDF ) Sleepy Channels: Bitcoin-Compatible Bi-directional Payment Channels without Watchtowers Lukas Aumayr, Sri AravindaKrishnan Thyagarajan, Giulio Malavolta, Pedro Moreno-Sanchez, Matteo Maffei
2021/1444 (PDF ) Streamlined NTRU Prime on FPGA Bo-Yuan Peng, Adrian Marotzke, Ming-Han Tsai, Bo-Yin Yang, Ho-Lin Chen
2021/1443 (PDF ) Platypus: A Central Bank Digital Currency with Unlinkable Transactions and Privacy Preserving Regulation Karl Wüst, Kari Kostiainen, Noah Delius, Srdjan Capkun
2021/1442 (PDF ) $P/poly$ Invalidity of the Agr17 Functional Encryption Scheme Yupu Hu, Jun Liu, Baocang Wang, Xingting Dong, Yanbin Pan
2021/1441 (PDF ) Length-preserving encryption with HCTR2 Paul Crowley, Nathan Huckleberry, Eric Biggers
2021/1440 (PDF ) Improved Circuit-based PSI via Equality Preserving Compression Kyoohyung Han, Dukjae Moon, Yongha Son
2021/1439 (PDF ) An Addendum to the ZUC-256 Stream Cipher ZUC Design Team
2021/1438 (PDF ) Incremental Offline/Online PIR (extended version) Yiping Ma, Ke Zhong, Tal Rabin, Sebastian Angel
2021/1437 (PDF ) ModuloNET: Neural Networks Meet Modular Arithmetic for Efficient Hardware Masking Anuj Dubey, Afzal Ahmad, Muhammad Adeel Pasha, Rosario Cammarota, Aydin Aysu
2021/1436 (PDF ) Efficient Representation of Numerical Optimization Problems for SNARKs Sebastian Angel, Andrew J. Blumberg, Eleftherios Ioannidis, Jess Woods
2021/1435 (PDF ) Vectorial Decoding Algorithm for Fast Correlation Attack and Its Applications to Stream Cipher Grain-128a ZhaoCun Zhou, DengGuo Feng, Bin Zhang
2021/1434 (PDF ) The Language's Impact on the Enigma Machine Daniel Matyas Perendi, Prosanta Gope
2021/1433 (PDF ) Oblivious Transfer from Trapdoor Permutations in Minimal Rounds Arka Rai Choudhuri, Michele Ciampi, Vipul Goyal, Abhishek Jain, Rafail Ostrovsky
2021/1432 (PDF ) Wavelet: Code-based postquantum signatures with fast verification on microcontrollers Gustavo Banegas, Thomas Debris-Alazard, Milena Nedeljković, Benjamin Smith
2021/1431 (PDF ) Secure and Efficient Multi-Key FHE Scheme Supporting Multi-bit Messages from LWE Preserving Non-Interactive Decryption Chinmoy Biswas, Ratna Dutta
2021/1430 (PDF ) Improved Zero-Knowledge Argument of Encrypted Extended Permutation Yi Liu, Qi Wang, Siu-Ming Yiu
2021/1429 (PDF ) Reviewing ISO/IEC Standard for Time-stamping Services Long Meng, Liqun Chen
2021/1428 (PDF ) Non-randomness of S-unit lattices Daniel J. Bernstein, Tanja Lange
2021/1427 (PDF ) Public-Key Quantum Money with a Classical Bank Omri Shmueli
2021/1426 (PDF ) On Unpadded NTRU Quantum (In)Security Théodore Conrad-Frenkiel, Rémi Géraud-Stewart, David Naccache
2021/1425 (PDF ) Improving First-Order Threshold Implementations of SKINNY Andrea Caforio, Daniel Collins, Ognjen Glamocanin, Subhadeep Banik
2021/1424 (PDF ) PREs with HRA Security and Key Privacy Based on Standard LWE Assumptions Yang Wang, Yanmin Zhao, Mingqiang Wang
2021/1423 (PDF ) Encryption to the Future: A Paradigm for Sending Secret Messages to Future (Anonymous) Committees Matteo Campanelli, Bernardo David, Hamidreza Khoshakhlagh, Anders Konring, Jesper Buus Nielsen
2021/1422 (PDF ) Higher-Order Masked Ciphertext Comparison for Lattice-Based Cryptography Jan-Pieter D'Anvers, Daniel Heinz, Peter Pessl, Michiel van Beirendonck, Ingrid Verbauwhede
2021/1421 (PDF ) Breaking the $IKEp182 Challenge Aleksei Udovenko, Giuseppe Vitto
2021/1420 (PDF ) Extending the Tally-Hiding Ordinos System: Implementations for Borda, Hare-Niemeyer, Condorcet, and Instant-Runoff Voting Fabian Hertel, Nicolas Huber, Jonas Kittelberger, Ralf Kuesters, Julian Liedtke, Daniel Rausch
2021/1419 (PDF ) With a Little Help from My Friends: Constructing Practical Anonymous Credentials Lucjan Hanzlik, Daniel Slamanig
2021/1418 (PDF ) Autoencoder Assist: An Efficient Profiling Attack on High-dimensional Datasets Qi Lei, Zijia Yang, Qin Wang, Yaoling Ding, Zhe Ma, An Wang
2021/1417 (PDF ) How to Handle Invalid Queries for Malicious-Private Protocols Based on Homomorphic Encryption Koji Nuida
2021/1416 (PDF ) SME: Scalable Masking Extensions Ben Marshall, Dan Page
2021/1415 (PDF ) A Note on the Pseudorandomness of Low-Degree Polynomials over the Integers Aayush Jain, Alexis Korb, Paul Lou, Amit Sahai
2021/1414 (PDF ) Exploring Feature Selection Scenarios for Deep Learning-based Side-Channel Analysis Guilherme Perin, Lichao Wu, Stjepan Picek
2021/1413 (PDF ) Three Attacks on Proof-of-Stake Ethereum Caspar Schwarz-Schilling, Joachim Neu, Barnabé Monnot, Aditya Asgaonkar, Ertem Nusret Tas, David Tse
2021/1412 (PDF ) A Unified Framework of Homomorphic Encryption for Multiple Parties with Non-Interactive Setup Hyesun Kwak, Dongwon Lee, Yongsoo Song, Sameer Wagh
2021/1411 (PDF ) Analysis of Client-side Security for Long-term Time-stamping Services Long Meng, Liqun Chen
2021/1410 (PDF ) Franchised Quantum Money Bhaskar Roberts, Mark Zhandry
2021/1409 (PDF ) Hiding in Plain Sight: Memory-tight Proofs via Randomness Programming Ashrujit Ghoshal, Riddhi Ghosal, Joseph Jaeger, Stefano Tessaro
2021/1408 (PDF ) Focus is Key to Success: A Focal Loss Function for Deep Learning-based Side-channel Analysis Maikel Kerkhof, Lichao Wu, Guilherme Perin, Stjepan Picek
2021/1407 (PDF ) A Concrete Treatment of Efficient Continuous Group Key Agreement via Multi-Recipient PKEs Keitaro Hashimoto, Shuichi Katsumata, Eamonn Postlethwaite, Thomas Prest, Bas Westerbaan
2021/1406 (PDF ) Non-Slanderability of Linkable Spontaneous Anonymous Group Signature (LSAG) Veronika Kuchta, Joseph K. Liu
2021/1405 (PDF ) Leaking Arbitrarily Many Secrets: Any-out-of-Many Proofs and Applications to RingCT Protocols Tianyu Zheng, Shang Gao, Bin Xiao, Yubo Song
2021/1404 (PDF ) Non-interactive Distributional Indistinguishability (NIDI) and Non-Malleable Commitments Dakshita Khurana
2021/1403 (PDF ) Efficient Adaptively-Secure Byzantine Agreement for Long Messages Amey Bhangale, Chen-Da Liu-Zhang, Julian Loss, Kartik Nayak
2021/1402 (PDF ) Guide to Fully Homomorphic Encryption over the [Discretized] Torus Marc Joye
2021/1401 (PDF ) HIDE & SEEK: Privacy-Preserving Rebalancing on Payment Channel Networks Zeta Avarikioti, Krzysztof Pietrzak, Iosif Salem, Stefan Schmid, Samarth Tiwari, Michelle Yeo
2021/1400 (PDF ) Three Input Exclusive-OR Gate Support For Boyar-Peralta's Algorithm (Extended Version) Anubhab Baksi, Vishnu Asutosh Dasu, Banashri Karmakar, Anupam Chattopadhyay, Takanori Isobe
2021/1399 (PDF ) Iterated Inhomogeneous Polynomials Jiaxin Guan, Mark Zhandry
2021/1398 (PDF ) Universally Composable Almost-Everywhere Secure Computation Nishanth Chandran, Pouyan Forghani, Juan Garay, Rafail Ostrovsky, Rutvik Patel, Vassilis Zikas
2021/1397 (PDF ) Practical Non-interactive Publicly Verifiable Secret Sharing with Thousands of Parties Craig Gentry, Shai Halevi, Vadim Lyubashevsky
2021/1396 (PDF ) NTT software optimization using an extended Harvey butterfly Jonathan Bradbury, Nir Drucker, Marius Hillenbrand
2021/1395 (PDF ) Homomorphic Secret Sharing for Multipartite and General Adversary Structures Supporting Parallel Evaluation of Low-degree Polynomials Reo Eriguchi, Koji Nuida
2021/1394 (PDF ) Rethinking Modular Multi-Exponentiation in Real-World Applications Vidal Attias, Luigi Vigneri, Vassil Dimitrov
2021/1393 (PDF ) Fiat–Shamir Bulletproofs are Non-Malleable (in the Algebraic Group Model) Chaya Ganesh, Claudio Orlandi, Mahak Pancholi, Akira Takahashi, Daniel Tschudi
2021/1392 (PDF ) Differential fault attack on DEFAULT Chandan Dey, Sumit Kumar Pandey, Tapabrata Roy, Santanu Sarkar
2021/1391 (PDF ) A note on a Claim of Eldar & Hallgren: LLL already solves it Léo Ducas, Wessel van Woerden
2021/1390 (PDF ) UC Secure Private Branching Program and Decision Tree Evaluation Keyu Ji, Bingsheng Zhang, Tianpei Lu, Lichun Li, Kui Ren
2021/1389 (PDF ) DPCrypto: Acceleration of Post-quantum Cryptographic Algorithms using Dot-Product Instruction on GPUs Wai-Kong Lee, Hwajeong Seo, Seong Oun Hwang, Angshuman Karmakar, Jose Maria Bermudo Mera, Ramachandra Achar
2021/1388 (PDF ) Modeling Large S-box in MILP and a (Related-key) Differential Attack on Full Round PIPO-64/128 Tarun Yadav, Manoj Kumar
2021/1387 (PDF ) Triplicate functions Lilya Budaghyan, Ivana Ivkovic, Nikolay Kaleyski
2021/1386 (PDF ) Efficient Threshold-Optimal ECDSA Michaella Pettit
2021/1385 (PDF ) BlindOR: An Efficient Lattice-Based Blind Signature Scheme from OR-Proofs Nabil Alkeilani Alkadri, Patrick Harasser, Christian Janson
2021/1384 (PDF ) Log-$\mathcal{S}$-unit lattices using Explicit Stickelberger Generators to solve Approx Ideal-SVP Olivier Bernard, Andrea Lesavourey, Tuong-Huy Nguyen, Adeline Roux-Langlois
2021/1383 (PDF ) MHz2k: MPC from HE over $\mathbb{Z}_{2^k}$ with New Packing, Simpler Reshare, and Better ZKP Jung Hee Cheon, Dongwoo Kim, Keewoo Lee
2021/1382 (PDF ) ZPiE: Zero-knowledge Proofs in Embedded systems Xavier Salleras, Vanesa Daza
2021/1381 (PDF ) Multi-Authority ABE, Revisited Miguel Ambrona, Romain Gay
2021/1380 (PDF ) Orca: Blocklisting in Sender-Anonymous Messaging Nirvan Tyagi, Julia Len, Ian Miers, Thomas Ristenpart
2021/1379 (PDF ) Ofelimos: Combinatorial Optimization via Proof-of-Useful-Work \\ A Provably Secure Blockchain Protocol Matthias Fitzi, Aggelos Kiayias, Giorgos Panagiotakos, Alexander Russell
2021/1378 (PDF ) Cryptanalysis of Efficient Masked Ciphers: Applications to Low Latency Tim Beyne, Siemen Dhooghe, Amir Moradi, Aein Rezaei Shahmirzadi
2021/1377 (PDF ) Fiat-Shamir Transformation of Multi-Round Interactive Proofs Thomas Attema, Serge Fehr, Michael Klooß
2021/1376 (PDF ) Phoenix: Secure Computation in an Unstable Network with Dropouts and Comebacks Ivan Damgård, Daniel Escudero, Antigoni Polychroniadou
2021/1375 (PDF ) How to Prove Schnorr Assuming Schnorr: Security of Multi- and Threshold Signatures Elizabeth Crites, Chelsea Komlo, Mary Maller
2021/1374 (PDF ) Information-Combining Differential Fault Attacks on DEFAULT Marcel Nageler, Christoph Dobraunig, Maria Eichlseder
2021/1373 (PDF ) Highly Efficient OT-Based Multiplication Protocols Iftach Haitner, Nikolaos Makriyannis, Samuel Ranellucci, Eliad Tsfadia
2021/1372 (PDF ) Arrows in a Quiver: A Secure Certificateless Group Key Distribution Protocol for Drones Eugene Frimpong, Reyhaneh Rabbaninejad, Antonis Michalas
2021/1371 (PDF ) A Generic Construction of CCA-secure Attribute-based Encryption with Equality Test Kyoichi Asano, Keita Emura, Atsushi Takayasu, Yohei Watanabe
2021/1370 (PDF ) Masquerade: Verifiable Multi-Party Aggregation with Secure Multiplicative Commitments Dimitris Mouris, Nektarios Georgios Tsoutsos
2021/1369 (PDF ) Faster Isogenies for Quantum-Safe SIKE Rami Elkhatib, Brian Koziel, Reza Azarderakhsh
2021/1368 (PDF ) Isogeny-based Group Signatures and Accountable Ring Signatures in QROM Kai-Min Chung, Yao-Ching Hsieh, Mi-Ying Huang, Yu-Hsuan Huang, Tanja Lange, Bo-Yin Yang
2021/1366 (PDF ) Group Signatures and More from Isogenies and Lattices: Generic, Simple, and Efficient Ward Beullens, Samuel Dobson, Shuichi Katsumata, Yi-Fu Lai, Federico Pintore
2021/1365 (PDF ) Collusion Resistant Revocable Ring Signatures and Group Signatures from Hard Homogeneous Spaces Yi-Fu Lai, Samuel Dobson
2021/1364 (PDF ) Non-applicability of the Gaborit&Aguilar-Melchor patent to Kyber and Saber Vadim Lyubashevsky, Damien Stehlé
2021/1363 (PDF ) On Entropy and Bit Patterns of Ring Oscillator Jitter Markku-Juhani O. Saarinen
2021/1362 (PDF ) Practical Multiple Persistent Faults Analysis Hadi Soleimany, Nasour Bagheri, Hosein Hadipour, Prasanna Ravi, Shivam Bhasin, Sara Mansouri
2021/1361 (PDF ) Plumo: An Ultralight Blockchain Client Psi Vesely, Kobi Gurkan, Michael Straka, Ariel Gabizon, Philipp Jovanovic, Georgios Konstantopoulos, Asa Oines, Marek Olszewski, Eran Tromer
2021/1360 (PDF ) Updatable Trapdoor SPHFs: Modular Construction of Updatable Zero-Knowledge Arguments and More Behzad Abdolmaleki, Daniel Slamanig
2021/1359 (PDF ) Families of SNARK-friendly 2-chains of elliptic curves Youssef El Housni, Aurore Guillevic
2021/1358 (PDF ) The Hardness of LWE and Ring-LWE: A Survey David Balbás
2021/1356 (PDF ) Structural Mutual Information and Its Application Youliang Tian, Zhiying Zhang, Jinbo Xiong, Jianfeng Ma
2021/1355 (PDF ) Curve448 on 32-bit ARM Cortex-M4 Hwajeong Seo, Reza Azarderakhsh
2021/1354 (PDF ) SoK: On the Security of Cryptographic Problems from Linear Algebra Carl Bootland, Wouter Castryck, Alan Szepieniec, Frederik Vercauteren
2021/1353 (PDF ) Noise-Tolerant Quantum Tokens for MAC Amit Behera, Or Sattath, Uriel Shinar
2021/1352 (PDF ) A Thorough Treatment of Highly-Efficient NTRU Instantiations Julien Duman, Kathrin Hövelmanns, Eike Kiltz, Vadim Lyubashevsky, Gregor Seiler, Dominique Unruh
2021/1351 (PDF ) Faster Lattice-Based KEMs via a Generic Fujisaki-Okamoto Transform Using Prefix Hashing Julien Duman, Eike Kiltz, Kathrin Hövelmanns, Vadim Lyubashevsky, Gregor Seiler
2021/1350 (PDF ) Generalized Proof of Liabilities Yan Ji, Konstantinos Chalkias
2021/1349 (PDF ) Updatable Private Set Intersection Saikrishna Badrinarayanan, Peihan Miao, Tiancheng Xie
2021/1348 (PDF ) Beyond quadratic speedups in quantum attacks on symmetric schemes Xavier Bonnetain, André Schrottenloher, Ferdinand Sibleyras
2021/1347 (PDF ) TOTA: Fully Homomorphic Encryption with Smaller Parameters and Stronger Security Zhaomin Yang, Xiang Xie, Huajie Shen, Shiying Chen, Jun Zhou
2021/1346 (PDF ) WeStat: a Privacy-Preserving Mobile Data Usage Statistics System Sébastien Canard, Nicolas Desmoulins, Sébastien Hallay, Adel Hamdi, Dominique Le Hello
2021/1345 (PDF ) New Attacks on LowMC instances with a Single Plaintext/Ciphertext pair Subhadeep Banik, Khashayar Barooti, Serge Vaudenay, Hailun Yan
2021/1344 (PDF ) Racing BIKE: Improved Polynomial Multiplication and Inversion in Hardware Jan Richter-Brockmann, Ming-Shing Chen, Santosh Ghosh, Tim Güneysu
2021/1343 (PDF ) A Non-heuristic Approach to Time-space Tradeoffs and Optimizations for BKW Hanlin Liu, Yu Yu
2021/1342 (PDF ) Efficient Functional Commitments: How to Commit to a Private Function Dan Boneh, Wilson Nguyen, Alex Ozdemir
2021/1341 (PDF ) Anonymous Whistleblowing over Authenticated Channels Thomas Agrikola, Geoffroy Couteau, Sven Maier
2021/1340 (PDF ) TEDT2 - Highly Secure Leakage-resilient TBC-based Authenticated Encryption Eik List
2021/1339 (PDF ) Safe-Error Analysis of Post-Quantum Cryptography Mechanisms Luk Bettale, Simon Montoya, Guénaël Renault
2021/1338 (PDF ) Embedded Multilayer Equations: a New Hard Problem for Constructing Post-Quantum Signatures Smaller than RSA (without Hardness Assumption) Dongxi Liu
2021/1337 (PDF ) Large-Precision Homomorphic Sign Evaluation using FHEW/TFHE Bootstrapping Zeyu Liu, Daniele Micciancio, Yuriy Polyakov
2021/1336 (PDF ) Improved Computational Extractors and their Applications Dakshita Khurana, Akshayaram Srinivasan
2021/1335 (PDF ) Integer Functions Suitable for Homomorphic Encryption over Finite Fields Ilia Iliashenko, Christophe Nègre, Vincent Zucca
2021/1334 (PDF ) Indistinguishability Obfuscation from LPN over F_p, DLIN, and PRGs in NC^0 Aayush Jain, Huijia Lin, Amit Sahai
2021/1333 (PDF ) Paradoxical Compression with Verifiable Delay Functions Thomas Pornin
2021/1332 (PDF ) On the Lattice Isomorphism Problem, Quadratic Forms, Remarkable Lattices, and Cryptography Léo Ducas, Wessel van Woerden
2021/1331 (PDF ) Communicating Through Subliminal-Free Signatures George Teseleanu
2021/1330 (PDF ) On the security of ECDSA with additive key derivation and presignatures Jens Groth, Victor Shoup
2021/1329 (PDF ) Trail Search with CRHS Equations John Petter Indrøy, Håvard Raddum
2021/1328 (PDF ) Cross Subkey Side Channel Analysis Based on Small Samples Fanliang Hu, Huanyu Wang, Junnian Wang
2021/1327 (PDF ) Secure Multiparty Computation in the Bounded Storage Model Jiahui Liu, Satyanarayana Vusirikala
2021/1326 (PDF ) FuzzyKey: Comparing Fuzzy Cryptographic Primitives on Resource-Constrained Devices Mo Zhang, Eduard Marin, David Oswald, Dave Singelee
2021/1325 (PDF ) Decentralized Multi-Authority ABE for NC^1 from Computational-BDH Pratish Datta, Ilan Komargodski, Brent Waters
2021/1324 (PDF ) Lockable Obfuscation from Circularly Insecure Fully Homomorphic Encryption Kamil Kluczniak
2021/1323 (PDF ) Anonymity of NIST PQC Round 3 KEMs Keita Xagawa
2021/1322 (PDF ) A New Adaptive Attack on SIDH Tako Boris Fouotsa, Christophe Petit
2021/1321 (PDF ) Blockchain-based Privacy-preserving Fair Data Trading Protocol Yao Jiang Galteland, Shuang Wu
2021/1320 (PDF ) Faster Key Generation of Supersingular Isogeny Diffie-Hellman Kaizhan Lin, Fangguo Zhang, Chang-An Zhao
2021/1319 (PDF ) Maliciously-Secure MrNISC in the Plain Model Rex Fernando, Aayush Jain, Ilan Komargodski
2021/1318 (PDF ) Supersingular Isogeny-Based Ring Signature Maryam Sheikhi Garjan, N. Gamze Orhon Kılıç, Murat Cenk
2021/1317 (PDF ) m-Stability: Threshold Security Meets Transferable Utility Osman Biçer, Burcu Yıldız, Alptekin Küpçü
2021/1316 (PDF ) Towards Human Dependency Elimination: AI Approach to SCA Robustness Assessment Unai Rioja, Lejla Batina, Igor Armendariz, Jose Luis Flores
2021/1315 (PDF ) Certified Everlasting Zero-Knowledge Proof for QMA Taiga Hiroka, Tomoyuki Morimae, Ryo Nishimaki, Takashi Yamakawa
2021/1314 (PDF ) High-order Table-based Conversion Algorithms and Masking Lattice-based Encryption Jean-Sébastien Coron, François Gérard, Simon Montoya, Rina Zeitoun
2021/1313 (PDF ) Hybrid Memristor-CMOS Obfuscation Against Untrusted Foundries Amin Rezaei, Jie Gu, Hai Zhou
2021/1312 (PDF ) Selectively Linkable Group Signatures - Stronger Security and Preserved Verifiability Ashley Fraser, Lydia Garms, Anja Lehmann
2021/1311 (PDF ) Power analysis attack on Kyber Alexandre Karlov, Natacha Linard de Guertechin
2021/1310 (PDF ) Related-Tweak Impossible Differential Cryptanalysis of Reduced-Round TweAES Chao Niu, Muzhou Li, Meiqin Wang, Qingju Wang, Siu-Ming Yiu
2021/1309 (PDF ) Faster Final Exponentiation on the KSS18 Curve Shiping Cai, Zhi Hu, Chang-An Zhao
2021/1308 (PDF ) No-Commit Proofs: Defeating Livelock in BFT Neil Giridharan, Heidi Howard, Ittai Abraham, Natacha Crooks, Alin Tomescu
2021/1307 (PDF ) In-depth Analysis of Side-Channel Countermeasures for CRYSTALS-Kyber Message Encoding on ARM Cortex-M4 Hauke Malte Steffen, Lucie Johanna Kogelheide, Timo Bartkewitz
2021/1306 (PDF ) Probabilistic micropayments with transferability Taisei Takahashi, Akira Otsuka
2021/1305 (PDF ) (Compact) Adaptively Secure FE for Attribute-Weighted Sums from k-Lin Pratish Datta, Tapas Pal
2021/1304 (PDF ) An Open Problem on the Bentness of Mesnager’s Functions Chunming Tang, Peng Han, Qi Wang, Jun Zhang, Yanfeng Qi
2021/1303 (PDF ) Black-Box Accumulation Based on Lattices Sebastian H. Faller, Pascal Baumer, Michael Klooß, Alexander Koch, Astrid Ottenhues, Markus Raiber
2021/1302 (PDF ) Using Blockchain to Achieve Decentralized Privacy In IoT Healthcare Sajad Meisami, Mohammad Beheshti-Atashgah, Mohammad Reza Aref
2021/1301 (PDF ) An Isogeny-Based ID Protocol Using Structured Public Keys Karim Baghery, Daniele Cozzo, Robi Pedersen
2021/1300 (PDF ) Report and Trace Ring Signatures Ashley Fraser, Elizabeth A. Quaglia
2021/1299 (PDF ) Towards Quantum Large-Scale Password Guessing on Real-World Distributions Markus Dürmuth, Maximilian Golla, Philipp Markert, Alexander May, Lars Schlieper
2021/1298 (PDF ) Post-Quantum Authentication with Lightweight Cryptographic Primitives Henrique Faria, José Manuel Valença
2021/1297 (PDF ) Listen to Your Heart: Evaluation of the Cardiologic Ecosystem Endres Puschner, Christoph Saatjohann, Markus Willing, Christian Dresen, Julia Köbe, Benjamin Rath, Christof Paar, Lars Eckardt, Uwe Haverkamp, Sebastian Schinzel
2021/1296 (PDF ) Partition Oracles from Weak Key Forgeries Marcel Armour, Carlos Cid
2021/1295 (PDF ) Improved Quantum Hypercone Locality Sensitive Filtering in Lattice Sieving Max Heiser
2021/1294 (PDF ) Quantum Money from Quaternion Algebras Daniel M. Kane, Shahed Sharif, Alice Silverberg
2021/1293 (PDF ) TIDE: A novel approach to constructing timed-release encryption Angelique Faye Loe, Liam Medley, Christian O’Connell, Elizabeth A. Quaglia
2021/1292 (PDF ) A Fast Large-Integer Extended GCD Algorithm and Hardware Design for Verifiable Delay Functions and Modular Inversion Kavya Sreedhar, Mark Horowitz, Christopher Torng
2021/1291 (PDF ) MyOPE: Malicious securitY for Oblivious Polynomial Evaluation Malika Izabachène, Anca Nitulescu, Paola de Perthuis, David Pointcheval
2021/1290 (PDF ) Large-Scale Non-Interactive Threshold Cryptosystems in the YOSO Model Andreas Erwig, Sebastian Faust, Siavash Riahi
2021/1289 (PDF ) Verifiable Isogeny Walks: Towards an Isogeny-based Postquantum VDF Jorge Chavez-Saab, Francisco Rodríguez Henríquez, Mehdi Tibouchi
2021/1288 (PDF ) FO-like Combiners and Hybrid Post-Quantum Cryptography Loïs Huguenin-Dumittan, Serge Vaudenay
2021/1287 (PDF ) The Exact Security of BIP32 Wallets Poulami Das, Andreas Erwig, Sebastian Faust, Julian Loss, Siavash Riahi
2021/1286 (PDF ) Post-quantum Efficient Proof for Graph 3-Coloring Problem Ehsan Ebrahimi
2021/1285 (PDF ) Convexity of division property transitions: theory, algorithms and compact models Aleksei Udovenko
2021/1284 (PDF ) APAS: Application-Specific Accelerators for RLWE-based Homomorphic Linear Transformations Song Bian, Dur E Shahwar Kundi, Kazuma Hirozawa, Weiqiang Liu, Takashi Sato
2021/1283 (PDF ) Parallel Verification of Serial MAC and AE Modes Kazuhiko Minematsu, Akiko Inoue, Katsuya Moriwaki, Maki Shigeri, Hiroyasu Kubo
2021/1282 (PDF ) On the Claims of Weak Block Synchronization in Bitcoin Seungjin Baek, Hocheol Nam, Yongwoo Oh, Muoi Tran, Min Suk Kang
2021/1281 (PDF ) Leveled Fully Homomorphic Encryption Schemes with Hensel Codes David W. H. A. da Silva, Luke Harmon, Gaetan Delavignette, Carlos Araujo
2021/1280 (PDF ) Snoopy: Surpassing the Scalability Bottleneck of Oblivious Storage Emma Dauterman, Vivian Fang, Ioannis Demertzis, Natacha Crooks, Raluca Ada Popa
2021/1279 (PDF ) Quantum Diffie-Hellman Key Exchange Dirk Fischer
2021/1278 (PDF ) A survey of algorithmic methods in IC reverse engineering Leonid Azriel, Julian Speith, Nils Albartus, Ran Ginosara, Avi Mendelson, Christof Paar
2021/1277 (PDF ) LifeLine for FPGA Protection: Obfuscated Cryptography for Real-World Security Florian Stolz, Nils Albartus, Julian Speith, Simon Klix, Clemens Nasenberg, Aiden Gula, Marc Fyrbiak, Christof Paar, Tim Güneysu, Russell Tessier
2021/1276 (PDF ) On the Security and Performance of Blockchain Sharding Runchao Han, Jiangshan Yu, Haoyu Lin, Shiping Chen, Paulo Esteves-Veríssimo
2021/1275 (PDF ) Counterexample to OWF Self-XOR Being a DOWF Nathan Geier
2021/1274 (PDF ) A Tight Computational Indistinguishability Bound for Product Distributions Nathan Geier
2021/1273 (PDF ) OpenSquare: Decentralized Repeated Modular Squaring Service Sri AravindaKrishnan Thyagarajan, Tiantian Gong, Adithya Bhat, Aniket Kate, Dominique Schröder
2021/1272 (PDF ) Efficient CCA Timed Commitments in Class Groups Sri AravindaKrishnan Thyagarajan, Guilhem Castagnos, Fabien Laguillaumie, Giulio Malavolta
2021/1271 (PDF ) Computing the Jacobi symbol using Bernstein-Yang Mike Hamburg
2021/1270 (PDF ) Speak Much, Remember Little: Cryptography in the Bounded Storage Model, Revisited Yevgeniy Dodis, Willy Quach, Daniel Wichs
2021/1269 (PDF ) Practical Continuously Non-Malleable Randomness Encoders in the Random Oracle Model Antonio Faonio
2021/1268 (PDF ) Simulation-Based Bi-Selective Opening Security for Public Key Encryption Junzuo Lai, Rupeng Yang, Zhengan Huang, Jian Weng
2021/1267 (PDF ) Tight Quantum Indifferentiability of a Rate-1/3 Compression Function Jan Czajkowski
2021/1266 (PDF ) Update-Sensitive Structured Encryption with Backward Privacy Zhiqiang Wu, Jin Wang, Keqin Li
2021/1265 (PDF ) Special Soundness in the Random Oracle Model Douglas Wikström
2021/1264 (PDF ) Verifiably-Extractable OWFs and Their Applications to Subversion Zero-Knowledge Prastudy Fauzi, Helger Lipmaa, Janno Siim, Michal Zajac, Arne Tobias Ødegaard
2021/1263 (PDF ) Transparency Dictionaries with Succinct Proofs of Correct Operation Ioanna Tzialla, Abhiram Kothapalli, Bryan Parno, Srinath Setty
2021/1262 (PDF ) Reverse Firewalls for Adaptively Secure MPC without Setup Suvradip Chakraborty, Chaya Ganesh, Mahak Pancholi, Pratik Sarkar
2021/1261 (PDF ) Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-secure IBE Yi Wang, Rongmao Chen, Xinyi Huang, Jianting Ning, Baosheng Wang, Moti Yung
2021/1260 (PDF ) Compare Before You Buy: Privacy-Preserving Selection of Threat Intelligence Providers Jelle Vos, Zekeriya Erkin, Christian Doerr
2021/1259 (PDF ) Parallel Repetition of $(k_1,\dots,k_{\mu})$-Special-Sound Multi-Round Interactive Proofs Thomas Attema, Serge Fehr
2021/1258 (PDF ) Bit Security as Computational Cost for Winning Games with High Probability Shun Watanabe, Kenji Yasunaga
2021/1257 (PDF ) Spreading the Privacy Blanket: Differentially Oblivious Shuffling for Differential Privacy S. Dov Gordon, Jonathan Katz, Mingyu Liang, Jiayu Xu
2021/1256 (PDF ) Oblivious Message Retrieval Zeyu Liu, Eran Tromer
2021/1255 (PDF ) How to Find Ternary LWE Keys Using Locality Sensitive Hashing Elena Kirshanova, Alexander May
2021/1254 (PDF ) Vector and Functional Commitments from Lattices Chris Peikert, Zachary Pepin, Chad Sharp
2021/1253 (PDF ) EasyPQC: Verifying Post-Quantum Cryptography Manuel Barbosa, Gilles Barthe, Xiong Fan, Benjamin Grégoire, Shih-Han Hung, Jonathan Katz, Pierre-Yves Strub, Xiaodi Wu, Li Zhou
2021/1252 (PDF ) Complete Practical Side-Channel-Assisted Reverse Engineering of AES-Like Ciphers Andrea Caforio, Fatih Balli, Subhadeep Banik
2021/1251 (PDF ) Efficient NIZKs for Algebraic Sets Geoffroy Couteau, Helger Lipmaa, Roberto Parisella, Arne Tobias Ødegaard
2021/1250 (PDF ) Efficient Leakage-Resilient MACs without Idealized Assumptions Francesco Berti, Chun Guo, Thomas Peters, François-Xavier Standaert
2021/1249 (PDF ) Flexible Anonymous Transactions (FLAX): Towards Privacy-Preserving and Composable Decentralized Finance Wei Dai
2021/1248 (PDF ) The Adversary Capabilities In Practical Byzantine Fault Tolerance Yongge Wang
2021/1247 (PDF ) A Geometric Approach to Linear Cryptanalysis Tim Beyne
2021/1246 (PDF ) Astrolabous: A Universally Composable Time-Lock Encryption Scheme Myrto Arapinis, Nikolaos Lamprou, Thomas Zacharias
2021/1245 (PDF ) SeqL+: Secure Scan-Obfuscation with Theoretical and Empirical Validation Seetal Potluri, Shamik Kundu, Akash Kumar, Kanad Basu, Aydin Aysu
2021/1244 (PDF ) IvyCross: A Privacy-Preserving and Concurrency Control Framework for Blockchain Interoperability Ming Li, Jian Weng, Yi Li, Yongdong Wu, Jiasi Weng, Dingcheng Li, Guowen Xu, Robert Deng
2021/1243 (PDF ) Syndrome Decoding Estimator Andre Esser, Emanuele Bellini
2021/1242 (PDF ) Non-Interactive Differentially Anonymous Router Benedikt Bünz, Yuncong Hu, Shin’ichiro Matsuo, Elaine Shi
2021/1241 (PDF ) Shuffling Public Keys (A Peer-to-peer Voting Algorithm) Santi J. Vives
2021/1240 (PDF ) Count Me In! Extendability for Threshold Ring Signatures Diego F. Aranha, Mathias Hall-Andersen, Anca Nitulescu, Elena Pagnin, Sophia Yakoubov
2021/1239 (PDF ) Quantum Linearization Attacks Xavier Bonnetain, Gaëtan Leurent, María Naya-Plasencia, André Schrottenloher
2021/1238 (PDF ) Generic Framework for Key-Guessing Improvements Marek Broll, Federico Canale, Antonio Flórez-Gutiérrez, Gregor Leander, María Naya-Plasencia
2021/1237 (PDF ) Hierarchical Integrated Signature and Encryption Yu Chen, Qiang Tang, Yuyu Wang
2021/1236 (PDF ) Architecture Support for Bitslicing Pantea Kiaei, Tom Conroy, Patrick Schaumont
2021/1235 (PDF ) Saidoyoki: Evaluating side-channel leakage in pre- and post-silicon setting Pantea Kiaei, Zhenyuan Liu, Ramazan Kaan Eren, Yuan Yao, Patrick Schaumont
2021/1234 (PDF ) Policy-Compliant Signatures Christian Badertscher, Christian Matt, Hendrik Waldner
2021/1233 (PDF ) Blockchains Enable Non-Interactive MPC Vipul Goyal, Elisaweta Masserova, Bryan Parno, Yifan Song
2021/1232 (PDF ) Gröbner Basis Attack on STARK-Friendly Symmetric-Key Primitives: JARVIS, MiMC and GMiMCerf Gizem Kara, Oğuz Yayla
2021/1231 (PDF ) Estimating (Miner) Extractable Value is Hard, Let’s Go Shopping! Aljosha Judmayer, Nicholas Stifter, Philipp Schindler, Edgar Weippl
2021/1230 (PDF ) Two-Round Maliciously Secure Computation with Super-Polynomial Simulation Amit Agarwal, James Bartusek, Vipul Goyal, Dakshita Khurana, Giulio Malavolta
2021/1229 (PDF ) Direct Product Hardness Amplification David Lanzenberger, Ueli Maurer
2021/1228 (PDF ) Computational Robust (Fuzzy) Extractors for CRS-dependent Sources with Minimal Min-entropy Hanwen Feng, Qiang Tang
2021/1227 (PDF ) Efficient Boolean Search over Encrypted Data with Reduced Leakage Sarvar Patel, Giuseppe Persiano, Joon Young Seo, Kevin Yeo
2021/1226 (PDF ) Succinct LWE Sampling, Random Polynomials, and Obfuscation Lalita Devadas, Willy Quach, Vinod Vaikuntanathan, Hoeteck Wee, Daniel Wichs
2021/1225 (PDF ) Massive Superpoly Recovery with Nested Monomial Predictions Kai Hu, Siwei Sun, Yosuke Todo, Meiqin Wang, Qingju Wang
2021/1224 (PDF ) Trojan-Resilience without Cryptography Suvradip Chakraborty, Stefan Dziembowski, Malgorzata Galazka, Tomasz Lizurej, Krzysztof Pietrzak, Michelle Yeo
2021/1223 (PDF ) Generalized Pseudorandom Secret Sharing and Efficient Straggler-Resilient Secure Computation Fabrice Benhamouda, Elette Boyle, Niv Gilboa, Shai Halevi, Yuval Ishai, Ariel Nof
2021/1222 (PDF ) Fault-enabled chosen-ciphertext attacks on Kyber Julius Hermelink, Peter Pessl, Thomas Pöppelmann
2021/1221 (PDF ) Simple, Fast Malicious Multiparty Private Set Intersection Ofri Nevo, Ni Trieu, Avishay Yanai
2021/1220 (PDF ) Digital Signatures with Memory-Tight Security in the Multi-Challenge Setting Denis Diemert, Kai Gellert, Tibor Jager, Lin Lyu
2021/1219 (PDF ) Towards Tight Adaptive Security of Non-Interactive Key Exchange Julia Hesse, Dennis Hofheinz, Lisa Kohl, Roman Langrehr
2021/1218 (PDF ) Algebraic Adversaries in the Universal Composability Framework Michel Abdalla, Manuel Barbosa, Jonathan Katz, Julian Loss, Jiayu Xu
2021/1217 (PDF ) EMFI for Safety-Critical Testing of Automotive Systems Colin O'Flynn
2021/1216 (PDF ) Toward Optimal Deep-Learning Based Side-Channel Attacks: Probability Concentration Inequality Loss and Its Usage Akira Ito, Rei Ueno, Naofumi Homma
2021/1215 (PDF ) Optimization of Homomorphic Comparison Algorithm on RNS-CKKS Scheme Eunsang Lee, Joon-Woo Lee, Young-Sik Kim, Jong-Seon No
2021/1214 (PDF ) Black-Box Impossibilities of Obtaining 2-Round Weak ZK and Strong WI from Polynomial Hardness Susumu Kiyoshima
2021/1213 (PDF ) DualRing: Generic Construction of Ring Signatures with Efficient Instantiations Tsz Hon Yuen, Muhammed F. Esgin, Joseph K. Liu, Man Ho Au, Zhimin Ding
2021/1212 (PDF ) SPEEDY on Cortex--M3: Efficient Software Implementation of SPEEDY on ARM Cortex--M3 Hyunjun Kim, Kyungbae Jang, Gyeongju Song, Minjoo Sim, Siwoo Eum, Hyunji Kim, Hyeokdong Kwon, Wai-Kong Lee, Hwajeong Seo
2021/1211 (PDF ) Grover on SPEEDY Gyeongju Song, Kyungbae Jang, Hyunjun Kim, Siwoo Eum, Minjoo Sim, Hyunji Kim, Wai-Kong Lee, Hwajeong Seo
2021/1210 (PDF ) LedMAC: More Efficient Variants of LightMAC Yaobin Shen, Lei Wang, Dawu Gu
2021/1209 (PDF ) Simple and Efficient Batch Verification Techniques for Verifiable Delay Functions Lior Rotem
2021/1208 (PDF ) On Actively-Secure Elementary MPC Reductions Benny Applebaum, Aarushi Goel
2021/1207 (PDF ) Non-Malleable Vector Commitments via Local Equivocability Lior Rotem, Gil Segev
2021/1206 (PDF ) Efficient Perfectly Secure Computation with Optimal Resilience Ittai Abraham, Gilad Asharov, Avishay Yanai
2021/1205 (PDF ) FASTA - a stream cipher for fast FHE evaluation Carlos Cid, John Petter Indrøy, Håvard Raddum
2021/1204 (PDF ) Attacks on Pseudo Random Number Generators Hiding a Linear Structure Florette Martinez
2021/1203 (PDF ) The irreducible vectors of a lattice: Some theory and applications Emmanouil Doulgerakis, Thijs Laarhoven, Benne de Weger
2021/1202 (PDF ) Design Space Exploration of SABER in 65nm ASIC Malik Imran, Felipe Almeida, Jaan Raik, Andrea Basso, Sujoy Sinha Roy, Samuel Pagliarini
2021/1201 (PDF ) Provably Improving Election Verifiability in Belenios Sevdenur Baloglu, Sergiu Bursuc, Sjouke Mauw, Jun Pang
2021/1200 (PDF ) KDM Security for the Fujisaki-Okamoto Transformations in the QROM Fuyuki Kitagawa, Ryo Nishimaki
2021/1199 (PDF ) Compressed Oblivious Encoding for Homomorphically Encrypted Search Seung Geol Choi, Dana Dachman-Soled, S. Dov Gordon, Linsheng Liu, Arkady Yerukhimovich
2021/1198 (PDF ) Clustering Effect in Simon and Simeck Gaëtan Leurent, Clara Pernot, André Schrottenloher
2021/1197 (PDF ) ($\epsilon,\delta$)-indistinguishable Mixing for Cryptocurrencies Mingyu Liang, Ioanna Karantaidou, Foteini Baldimtsi, Dov Gordon, Mayank Varia
2021/1196 (PDF ) Concurrent Composition of Differential Privacy Salil Vadhan, Tianhao Wang
2021/1195 (PDF ) Do you feel a chill? Using PIR against chilling effects for censorship-resistant publishing Miti Mazmudar, Stan Gurtler, Ian Goldberg
2021/1194 (PDF ) Automated Truncation of Differential Trails and Trail Clustering in ARX Alex Biryukov, Luan Cardoso dos Santos, Daniel Feher, Vesselin Velichkov, Giuseppe Vitto
2021/1193 (PDF ) JUBILEE: Secure Debt Relief and Forgiveness David Cerezo Sánchez
2021/1192 (PDF ) Simple Constructions from (Almost) Regular One-Way Functions Noam Mazor, Jiapeng Zhang
2021/1191 (PDF ) A Simpler Model for Recovering Superpoly onTrivium Stéphanie Delaune, Patrick Derbez, Arthur Gontier, Charles Prud'homme
2021/1190 (PDF ) Differential Fault Attack on Lightweight Block Cipher PIPO SeongHyuck Lim, JaeSeung Han, Tae-Ho Lee, Dong-Guk Han
2021/1189 (PDF ) A Configurable Crystals-Kyber Hardware Implementation with Side-Channel Protection Arpan Jati, Naina Gupta, Anupam Chattopadhyay, Somitra Kumar Sanadhya
2021/1188 (PDF ) Interhead Hydra Two Heads are Better than One Maxim Jourenko, Mario Larangeira, Keisuke Tanaka
2021/1187 (PDF ) Post-Quantum Signal Key Agreement with SIDH Samuel Dobson, Steven D. Galbraith
2021/1186 (PDF ) A Privacy-Preserving Distributed Identity Offline-First PoCP Blockchain Paradigm Andrew M. K. Nassief
2021/1185 (PDF ) Giving an Adversary Guarantees (Or: How to Model Designated Verifier Signatures in a Composable Framework) Ueli Maurer, Christopher Portmann, Guilherme Rito
2021/1184 (PDF ) On Time-Lock Cryptographic Assumptions in Abelian Hidden-Order Groups Aron van Baarsen, Marc Stevens
2021/1183 (PDF ) ZKAttest: Ring and Group Signatures for Existing ECDSA Keys Armando Faz-Hernández, Watson Ladd, Deepak Maram
2021/1182 (PDF ) Opportunistic Algorithmic Double-Spending: How I learned to stop worrying and hedge the Fork Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Edgar Weippl
2021/1181 (PDF ) Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic Code Madura A. Shelton, Łukasz Chmielewski, Niels Samwel, Markus Wagner, Lejla Batina, Yuval Yarom
2021/1180 (PDF ) The Effect of False Positives: Why Fuzzy Message Detection Leads to Fuzzy Privacy Guarantees? István András Seres, Balázs Pejó, Péter Burcsi
2021/1179 (PDF ) Improved Attacks on GIFT-64 Ling Sun, Wei Wang, Meiqin Wang
2021/1178 (PDF ) Onion Routing with Replies Christiane Kuhn, Dennis Hofheinz, Andy Rupp, Thorsten Strufe
2021/1177 (PDF ) Algebraic Restriction Codes and their Applications Divesh Aggarwal, Nico Döttling, Jesko Dujmovic, Mohammad Hajiabadi, Giulio Malavolta, Maciej Obremski
2021/1176 (PDF ) Amortized Threshold Symmetric-key Encryption Mihai Christodorescu, Sivanarayana Gaddam, Pratyay Mukherjee, Rohit Sinha
2021/1175 (PDF ) Adaptive Security of Multi-Party Protocols, Revisited Martin Hirt, Chen-Da Liu-Zhang, Ueli Maurer
2021/1174 (PDF ) On Communication-Efficient Asynchronous MPC with Adaptive Security Annick Chopard, Martin Hirt, Chen-Da Liu-Zhang
2021/1173 (PDF ) Lelantus Spark: Secure and Flexible Private Transactions Aram Jivanyan, Aaron Feickert
2021/1172 (PDF ) Systematizing Core Properties of Pairing-Based Attribute-Based Encryption to Uncover Remaining Challenges in Enforcing Access Control in Practice Marloes Venema, Greg Alpár, Jaap-Henk Hoepman
2021/1171 (PDF ) FAST: Secure and High Performance Format-Preserving Encryption and Tokenization F. Betül Durak, Henning Horst, Michael Horst, Serge Vaudenay
2021/1170 (PDF ) Downgradable Identity-Based Signatures and Trapdoor Sanitizable Signatures from Downgradable Affine MACs Masahito Ishizaka, Shinsaku Kiyomoto
2021/1169 (PDF ) As easy as ABC: Optimal (A)ccountable (B)yzantine (C)onsensus is easy! Pierre Civit, Seth Gilbert, Vincent Gramoli, Rachid Guerraoui, Jovan Komatovic
2021/1168 (PDF ) Toward a Fully Secure Authenticated Encryption Scheme From a Pseudorandom Permutation (Full Version) Wonseok Choi, Byeonghak Lee, Jooyoung Lee, Yeongmin Lee
2021/1167 (PDF ) fflonk: a Fast-Fourier inspired verifier efficient version of PlonK Ariel Gabizon, Zachary J. Williamson
2021/1166 (PDF ) Fine-tuning the ISO/IEC Standard LightMAC Soumya Chattopadhyay, Ashwin Jha, Mridul Nandi
2021/1165 (PDF ) Reputation at Stake! A Trust Layer over Decentralized Ledger for Multiparty Computation and Reputation-Fair Lottery Mario Larangeira
2021/1164 (PDF ) Cube Attacks on Round-Reduced TinyJAMBU Wil Liam Teng, Iftekhar Salam, Wei-Chuen Yau, Josef Pieprzyk, Raphaël C. -W. Phan
2021/1163 (PDF ) Information-Theoretically Secure MPC against Mixed Dynamic Adversaries Ivan Damgård, Daniel Escudero, Divya Ravi
2021/1162 (PDF ) Software Implementation of Optimal Pairings on Elliptic Curves with Odd Prime Embedding Degrees Yu Dai, Zijian Zhou, Fangguo Zhang, Chang-An Zhao
2021/1161 (PDF ) Balanced Non-Adjacent Forms Marc Joye
2021/1160 (PDF ) Classical Attacks on a Variant of the RSA Cryptosystem Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin, Nurul Nur Hanisah Adenan, Nur Azman Abu
2021/1159 (PDF ) Compact and Malicious Private Set Intersection for Small Sets Mike Rosulek, Ni Trieu
2021/1158 (PDF ) Grafting Key Trees: Efficient Key Management for Overlapping Groups Joël Alwen, Benedikt Auerbach, Mirza Ahad Baig, Miguel Cueto, Karen Klein, Guillermo Pascual-Perez, Krzysztof Pietrzak, Michael Walter
2021/1157 (PDF ) Private Approximate Nearest Neighbor Search with Sublinear Communication Sacha Servan-Schreiber, Simon Langowski, Srinivas Devadas
2021/1156 (PDF ) Evolving Secret Sharing in Almost Semi-honest Model Jyotirmoy Pramanik, Avishek Adhikari
2021/1155 (PDF ) GPS: Integration of Graphene, PALISADE, and SGX for Large-scale Aggregations of Distributed Data Jonathan Takeshita, Colin McKechney, Justin Pajak, Antonis Papadimitriou, Ryan Karl, Taeho Jung
2021/1154 (PDF ) 1, 2, 3, Fork: Counter Mode Variants based on a Generalized Forkcipher Elena Andreeva, Amit Singh Bhati, Bart Preneel, Damian Vizar
2021/1153 (PDF ) SynCirc: Efficient Synthesis of Depth-Optimized Circuits for Secure Computation Arpita Patra, Thomas Schneider, Ajith Suresh, Hossein Yalame
2021/1152 (PDF ) Bandersnatch: a fast elliptic curve built over the BLS12-381 scalar field Simon Masson, Antonio Sanso, Zhenfei Zhang
2021/1151 (PDF ) Efficient Modular Multiplication Joppe W. Bos, Thorsten Kleinjung, Dan Page
2021/1150 (PDF ) Silver: Silent VOLE and Oblivious Transfer from Hardness of Decoding Structured LDPC Codes Geoffroy Couteau, Peter Rindal, Srinivasan Raghuraman
2021/1149 (PDF ) Machine-checked ZKP for NP-relations: Formally Verified Security Proofs and Implementations of MPC-in-the-Head José Bacelar Almeida, Manuel Barbosa, Manuel L Correia, Karim Eldefrawy, Stéphane Graham-Lengrand, Hugo Pacheco, Vitor Pereira
2021/1148 (PDF ) Fighting Fake News in Encrypted Messaging with the Fuzzy Anonymous Complaint Tally System (FACTS) Linsheng Liu, Daniel S. Roche, Austin Theriault, Arkady Yerukhimovich
2021/1147 (PDF ) Clockwork Finance: Automated Analysis of Economic Security in Smart Contracts Kushal Babel, Philip Daian, Mahimna Kelkar, Ari Juels
2021/1146 (PDF ) Key Encapsulation Mechanism with Tight Enhanced Security in the Multi-User Setting: Impossibility Result and Optimal Tightness Shuai Han, Shengli Liu, Dawu Gu
2021/1145 (PDF ) Recurring Contingent Payment for Proofs of Retrievability Aydin Abadi, Steven J. Murdoch, Thomas Zacharias
2021/1144 (PDF ) MAYO: Practical Post-Quantum Signatures from Oil-and-Vinegar Maps Ward Beullens
2021/1143 (PDF ) Facial Recognition for Remote Electronic Voting – Missing Piece of the Puzzle or Yet Another Liability? Sven Heiberg, Kristjan Krips, Jan Willemson, Priit Vinkel
2021/1141 (PDF ) Round-Efficient Byzantine Agreement and Multi-Party Computation with Asynchronous Fallback Giovanni Deligios, Martin Hirt, Chen-Da Liu-Zhang
2021/1140 (PDF ) Computing Discrete Logarithms Robert Granger, Antoine Joux
2021/1139 (PDF ) HyperLogLog: Exponentially Bad in Adversarial Settings Kenneth G. Paterson, Mathilde Raynal
2021/1138 (PDF ) Optimal Good-case Latency for Rotating Leader Synchronous BFT Ittai Abraham, Kartik Nayak, Nibesh Shrestha
2021/1137 (PDF ) qTESLA: Practical Implementations of a Quantum Attack Resistant Signature Scheme Michael Burger, Juliane Krämer, Christian Bischof
2021/1136 (PDF ) A new Parallelization for p3Enum and Parallelized Generation of Optimized Pruning Functions Michael Burger, Christian Bischof, Juliane Krämer
2021/1135 (PDF ) FDFB: Full Domain Functional Bootstrapping Towards Practical Fully Homomorphic Encryption Kamil Kluczniak, Leonard Schild
2021/1134 (PDF ) Some observations on ZUC-256 Alexander Maximov
2021/1133 (PDF ) Multiradical isogenies Wouter Castryck, Thomas Decru
2021/1132 (PDF ) Safe-Error Attacks on SIKE and CSIDH Fabio Campos, Juliane Krämer, Marcel Müller
2021/1131 (PDF ) Multi-key Fully Homomorphic Encryption Scheme with Compact Ciphertexts Tanping Zhou, Long Chen, Xiaoliang Che, Wenchao Liu, Zhenfeng Zhang, Xiaoyuan Yang
2021/1130 (PDF ) A note on group membership tests for $\G_1$, $\G_2$ and $\G_T$ on BLS pairing-friendly curves Michael Scott
2021/1129 (PDF ) Beauty of Cryptography: the Cryptographic Sequences and the Golden Ratio Shenghui Su, Jianhua Zheng, Shuwang Lv
2021/1128 (PDF ) Continuously Non-Malleable Secret Sharing: Joint Tampering, Plain Model and Capacity Gianluca Brian, Antonio Faonio, Daniele Venturi
2021/1127 (PDF ) Bigdata-facilitated Two-party Authenticated Key Exchange for IoT Bowen Liu, Qiang Tang, Jianying Zhou
2021/1126 (PDF ) Turn-Based Communication Channels Carlo Brunetta, Mario Larangeira, Bei Liang, Aikaterini Mitrokotsa, Keisuke Tanaka
2021/1125 (PDF ) Towards Explaining Epsilon: A Worst-Case Study of Differential Privacy Risks Luise Mehner, Saskia Nuñez von Voigt, Florian Tschorsch
2021/1124 (PDF ) A Semi-Permanent Stuck-At Fault Analysis on AES Rijndael SBox Priyanka Joshi, Bodhisatwa Mazumdar
2021/1123 (PDF ) Oblivious RAM with Worst-Case Logarithmic Overhead Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Elaine Shi
2021/1122 (PDF ) And Paper-Based is Better? Towards Comparability of Classic and Cryptographic Voting Schemes Marc Nemes, Rebecca Schwerdt, Dirk Achenbach, Bernhard Löwe, Jörn Müller-Quade
2021/1121 (PDF ) Constant-Time Arithmetic for Safer Cryptography Lúcás Críostóir Meier, Simone Colombo, Marin Thiercelin, Bryan Ford
2021/1120 (PDF ) Simpira Gets Simpler: Optimized Simpira on Microcontrollers Minjoo Sim, Siwoo Eum, Hyeokdong Kwon, Kyungbae Jang, Hyunjun Kim, Hyunji Kim, Gyeongju Song, Wai-Kong Lee, Hwajeong Seo
2021/1119 (PDF ) Automatic Classical and Quantum Rebound Attacks on AES-like Hashing by Exploiting Related-key Differentials Xiaoyang Dong, Zhiyu Zhang, Siwei Sun, Congming Wei, Xiaoyun Wang, Lei Hu
2021/1118 (PDF ) THC: Practical and Cost-Effective Verification of Delegated Computation Pablo Rauzy, Ali Nehme
2021/1117 (PDF ) All the Polynomial Multiplication You Need on RISC-V Hwajeong Seo, Hyeokdong Kwon, Siwoo Eum, Kyungbae Jang, Hyunjun Kim, Hyunji Kim, Minjoo Sim, Gyeongju Song, Wai-Kong Lee
2021/1116 (PDF ) Labeled PSI from Homomorphic Encryption with Reduced Computation and Communication Kelong Cong, Radames Cruz Moreno, Mariana Botelho da Gama, Wei Dai, Ilia Iliashenko, Kim Laine, Michael Rosenberg
2021/1115 (PDF ) Evolving Secret Sharing Schemes Based on Polynomial Evaluations and Algebraic Geometry Codes Chaoping Xing, Chen Yuan
2021/1114 (PDF ) Remarks on MOBS and cryptosystems using semidirect products Chris Monico
2021/1113 (PDF ) On the Security of Doubly Efficient PIR Elette Boyle, Justin Holmgren, Fermi Ma, Mor Weiss
2021/1112 (PDF ) Key agreement: security / division Daniel R. L. Brown
2021/1111 (PDF ) A Low-Randomness Second-Order Masked AES Tim Beyne, Siemen Dhooghe, Adrián Ranea, Danilo Šijačić
2021/1110 (PDF ) Secure and Efficient Software Masking on Superscalar Pipelined Processors Barbara Gigerl, Robert Primas, Stefan Mangard
2021/1109 (PDF ) On Actively Secure Fine-grained Access Structures from Isogeny Assumptions Philipp Muth, Fabio Campos
2021/1108 (PDF ) Preservation of DNA Privacy During the Large Scale Detection of COVID Marcel Hollenstein, David Naccache, Peter B. Roenne, Peter Y A Ryan, Robert Weil, Ofer Yifrach-Stav
2021/1107 (PDF ) Multi-Leak Deep-Learning Side-Channel Analysis Fanliang Hu, Huanyu Wang, Junnian Wang
2021/1106 (PDF ) Primary Elements in Cyclotomic Fields with Applications to Power Residue Symbols, and More Eric Brier, Rémi Géraud-Stewart, Marc Joye, David Naccache
2021/1105 (PDF ) Improved Linear Approximations of SNOW-V and SNOW-Vi Zhen Shi, Chenhui Jin, Yu Jin
2021/1104 (PDF ) New Cryptanalysis of ZUC-256 Initialization Using Modular Differences Fukang Liu, Willi Meier, Santanu Sarkar, Gaoli Wang, Ryoma Ito, Takanori Isobe
2021/1103 (PDF ) Exploring Differential-Based Distinguishers and Forgeries for ASCON David Gerault, Thomas Peyrin, Quan Quan Tan
2021/1101 (PDF ) Differential Privacy in Constant Function Market Makers Tarun Chitra, Guillermo Angeris, Alex Evans
2021/1100 (PDF ) REDsec: Running Encrypted Discretized Neural Networks in Seconds Lars Folkerts, Charles Gouert, Nektarios Georgios Tsoutsos
2021/1099 (PDF ) MILP modeling of Boolean functions by minimum number of inequalities Aleksei Udovenko
2021/1098 (PDF ) Individual Verifiability and Revoting in the Estonian Internet Voting System Olivier Pereira
2021/1096 (PDF ) Mt. Random: Multi-Tiered Randomness Beacons Ignacio Cascudo, Bernardo David, Omer Shlomovits, Denis Varlakov
2021/1095 (PDF ) Analyzing Masked Ciphers Against Transition and Coupling Effects Siemen Dhooghe
2021/1094 (PDF ) Resilient Uniformity: Applying Resiliency in Masking Siemen Dhooghe, Svetla Nikova
2021/1093 (PDF ) Quantum Algorithms for Variants of Average-Case Lattice Problems via Filtering Yilei Chen, Qipeng Liu, Mark Zhandry
2021/1092 (PDF ) SoK: Deep Learning-based Physical Side-channel Analysis Stjepan Picek, Guilherme Perin, Luca Mariot, Lichao Wu, Lejla Batina
2021/1091 (PDF ) No (Good) Loss no Gain: Systematic Evaluation of Loss functions in Deep Learning-based Side-channel Analysis Maikel Kerkhof, Lichao Wu, Guilherme Perin, Stjepan Picek
2021/1090 (PDF ) Towards Accountability in CRS Generation Prabhanjan Ananth, Gilad Asharov, Hila Dahari, Vipul Goyal
2021/1089 (PDF ) Threshold scheme to share a secret by means of sound ranging Sergij V. Goncharov
2021/1088 (PDF ) Studying Bitcoin privacy attacks and their Impact on Bitcoin-based Identity Methods Simin Ghesmati, Walid Fdhila, Edgar Weippl
2021/1087 (PDF ) Methods for Decentralized Identities: Evaluation and Insights Walid Fdhila, Nicholas Stifter, Kristian Kostal, Cihan Saglam, Markus Sabadello
2021/1086 (PDF ) How do the Arbiter PUFs Sample the Boolean Function Class? Animesh Roy, Dibyendu Roy, Subhamoy Maitra
2021/1085 (PDF ) Homomorphic Encryption for Multiple Users with Less Communications Jeongeun Park
2021/1084 (PDF ) Towards the Least Inequalities for Describing a Subset in $Z_2^n$ Yao Sun
2021/1083 (PDF ) Modular Design of Secure Group Messaging Protocols and the Security of MLS Joël Alwen, Sandro Coretti, Yevgeniy Dodis, Yiannis Tselekounis
2021/1082 (PDF ) Some remarks on how to hash faster onto elliptic curves Dmitrii Koshelev
2021/1081 (PDF ) OnionPIR: Response Efficient Single-Server PIR Muhammad Haris Mughees, Hao Chen, Ling Ren
2021/1080 (PDF ) SplitGuard: Detecting and Mitigating Training-Hijacking Attacks in Split Learning Ege Erdogan, Alptekin Kupcu, A. Ercument Cicek
2021/1079 (PDF ) The Exact Complexity of Pseudorandom Functions and Tight Barriers to Lower Bound Proofs Zhiyuan Fan, Jiatu Li, Tianqi Yang
2021/1078 (PDF ) Reflection, Rewinding, and Coin-Toss in EasyCrypt Denis Firsov, Dominique Unruh
2021/1077 (PDF ) MProve+ : Privacy Enhancing Proof of Reserves Protocol for Monero Arijit Dutta, Suyash Bagad, Saravanan Vijayakumaran
2021/1076 (PDF ) Hardness of KT Characterizes Parallel Cryptography Hanlin Ren, Rahul Santhanam
2021/1075 (PDF ) The security of the code-based signature scheme based on the Stern identification protocol Victoria Vysotskaya, Ivan Chizhov
2021/1074 (PDF ) UnSplit: Data-Oblivious Model Inversion, Model Stealing, and Label Inference Attacks Against Split Learning Ege Erdogan, Alptekin Kupcu, A. Ercument Cicek
2021/1073 (PDF ) "Act natural!": Having a Private Chat on a Public Blockchain Thore Tiemann, Sebastian Berndt, Thomas Eisenbarth, Maciej Liskiewicz
2021/1072 (PDF ) Streaming SPHINCS+ for Embedded Devices using the Example of TPMs Ruben Niederhagen, Johannes Roth, Julian Wälde
2021/1071 (PDF ) Improved Verifiability for BeleniosVS Thomas Haines, Rajeev Gore
2021/1070 (PDF ) Onyx: New Encryption and Signature Schemes with Multivariate Public Key in Degree 3 Gilles Macario-Rat, Jacques Patarin
2021/1069 (PDF ) Djed: A Formally Verified Crypto-Backed Pegged Algorithmic Stablecoin Joachim Zahnentferner, Dmytro Kaidalov, Jean-Frédéric Etienne, Javier Díaz
2021/1068 (PDF ) A Simple Post-Quantum Non-Interactive Zero-Knowledge Proof from Garbled Circuits Hongrui Cui, Kaiyi Zhang
2021/1067 (PDF ) A Tale of Twin Primitives: Single-chip Solution for PUFs and TRNGs Kuheli Pratihar, Urbi Chatterjee, Manaar Alam, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty
2021/1066 (PDF ) Taphonomical Security: (DNA) Information with Foreseeable Lifespan Fatima-Ezzahra El Orche, Marcel Hollenstein, Sarah Houdaigoui, David Naccache, Daria Pchelina, Peter B. Roenne, Peter Y. A. Ryan, Julien Weibel, Robert Weil
2021/1065 (PDF ) Time, Privacy, Robustness, Accuracy: Trade Offs for the Open Vote Network Protocol Gergei Bana, Marco Biroli, Megi Dervishi, Fatima-Ezzahra El Orche, Rémi Géraud-Stewart, David Naccache, Peter B. Roenne, Peter Y. A. Ryan, Hugo Waltsburger
2021/1064 (PDF ) Glowworm Attack: Optical TEMPEST Sound Recovery via a Device’s Power Indicator LED Ben Nassi, Yaron Pirutin, Tomer Cohen Galor, Yuval Elovici, Boris Zadov
2021/1063 (PDF ) Cairo – a Turing-complete STARK-friendly CPU architecture Lior Goldberg, Shahar Papini, Michael Riabzev
2021/1062 (PDF ) On the Nonsingularity and Equivalence of NFSRs Yingyin Pan, Jianghua Zhong, Dongdai Lin
2021/1061 (PDF ) Edwards curves and FFT-based multiplication Pavel Atnashev, George Woltman
2021/1060 (PDF ) Discovering New $L$-Function Relations Using Algebraic Sieving Hadrien Barral, Éric Brier, Rémi Géraud-Stewart, Arthur Léonard, David Naccache, Quentin Vermande, Samuel Vivien
2021/1059 (PDF ) Revisiting cryptanalysis on ChaCha from Crypto 2020 and Eurocrypt 2021 Sabyasachi Dey, Chandan Dey, Santanu Sarkar, Willi Meier
2021/1058 (PDF ) Cryptanalysis of Caesar using Quantum Support Vector Machine Hyunji Kim, Gyeongju Song, Kyoungbae Jang, Hwajeong Seo
2021/1057 (PDF ) An Efficient Data Protection Scheme Based on Hierarchical ID-Based Encryption for Message Queueing Telemetry Transport Chun-I Fan, Cheng-Han Shie, Yi-Fan Tseng, Hui-Chun Huang
2021/1055 (PDF ) Threshold Schnorr with Stateless Deterministic Signing from Standard Assumptions François Garillot, Yashvanth Kondi, Payman Mohassel, Valeria Nikolaenko
2021/1054 (PDF ) One-time Traceable Ring Signatures Alessandra Scafuro, Bihan Zhang
2021/1053 (PDF ) XDIVINSA: eXtended DIVersifying INStruction Agent to Mitigate Power Side-Channel Leakage Thinh H. Pham, Ben Marshall, Alexander Fell, Siew-Kei Lam, Daniel Page
2021/1052 (PDF ) Comparing Lattice Families for Bounded Distance Decoding near Minkowski’s Bound. Oleksandra Lapiha
2021/1051 (PDF ) Collisions in Supersingular Isogeny Graphs and the SIDH-based Identification Protocol Wissam Ghantous, Shuichi Katsumata, Federico Pintore, Mattia Veroni
2021/1050 (PDF ) Privacy-Enhancing Group Signcryption Scheme Sara Ricci, Petr Dzurenda, Jan Hajny, Lukas Malina
2021/1049 (PDF ) Binary Search in Secure Computation Marina Blanton, Chen Yuan
2021/1048 (PDF ) Aggregating and thresholdizing hash-based signatures using STARKs Irakliy Khaburzaniya, Konstantinos Chalkias, Kevin Lewi, Harjasleen Malvai
2021/1047 (PDF ) A Correlation Attack on Full SNOW-V and SNOW-Vi Zhen Shi, Chenhui Jin, Jiyan Zhang, Ting Cui, Lin Ding, Yu Jin
2021/1046 (PDF ) On the modifier Q for multivariate signature schemes Yasufumi Hashimoto
2021/1045 (PDF ) Minor improvements of algorithm to solve under-defined systems of multivariate quadratic equations Yasufumi Hashimoto
2021/1044 (PDF ) On the security of Hufu-UOV Yasufumi Hashimoto
2021/1043 (PDF ) Brakedown: Linear-time and post-quantum SNARKs for R1CS Alexander Golovnev, Jonathan Lee, Srinath Setty, Justin Thaler, Riad S. Wahby
2021/1042 (PDF ) Rate One-Third Non-malleable Codes Divesh Aggarwal, Sruthi Sekar, Bhavana Kanukurthi, Maciej Obremski, Sai Lakshmi Bhavana Obbattu
2021/1041 (PDF ) On the Multiplicative Complexity of Cubic Boolean Functions Meltem Sonmez Turan, Rene Peralta
2021/1040 (PDF ) MUSE: Secure Inference Resilient to Malicious Clients Ryan Lehmkuhl, Pratyush Mishra, Akshayaram Srinivasan, Raluca Ada Popa
2021/1039 (PDF ) Neyman’s Smoothness Test: a Trade-off between Moment-based and Distribution-based Leakage Detections Si Gao, Elisabeth Oswald, Yan Yan
2021/1038 (PDF ) Reinforced Concrete: A Fast Hash Function for Verifiable Computation Lorenzo Grassi, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger, Roman Walch
2021/1037 (PDF ) Randomness Bounds for Private Simultaneous Messages and Conditional Disclosure of Secrets Akinori Kawachi, Maki Yoshida
2021/1036 (PDF ) Lelantus-CLA Pyrros Chaidos, Vladislav Gelfer
2021/1035 (PDF ) SoK: Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data Seny Kamara, Abdelkarim Kati, Tarik Moataz, Thomas Schneider, Amos Treiber, Michael Yonli
2021/1034 (PDF ) Optimal encodings to elliptic curves of $j$-invariants $0$, $1728$ Dmitrii Koshelev
2021/1033 (PDF ) Limits of Polynomial Packings for $\mathbb{Z}_{p^k}$ and $\mathbb{F}_{p^k}$ Jung Hee Cheon, Keewoo Lee
2021/1032 (PDF ) AdVeil: A Private Targeted Advertising Ecosystem Sacha Servan-Schreiber, Kyle Hogan, Srinivas Devadas
2021/1031 (PDF ) Commitment Schemes from Supersingular Elliptic Curve Isogeny Graphs Bruno Sterner
2021/1030 (PDF ) A lightweight ISE for ChaCha on RISC-V Ben Marshall, Daniel Page, Thinh Hung Pham
2021/1029 (PDF ) LOVE a pairing Diego F. Aranha, Elena Pagnin, Francisco Rodríguez-Henríquez
2021/1028 (PDF ) Structural Attack (and Repair) of Diffused-Input-Blocked-Output White-Box Cryptography Claude Carlet, Sylvain Guilley, Sihem Mesnager
2021/1027 (PDF ) On Fingerprinting Attacks and Length-Hiding Encryption Kai Gellert, Tibor Jager, Lin Lyu, Tom Neuschulten
2021/1025 (PDF ) Efficient Information-Theoretic Multi-Party Computation over Non-Commutative Rings Daniel Escudero, Eduardo Soria-Vazquez
2021/1024 (PDF ) Efficient Implementation of Lightweight Hash Functions on GPU and Quantum Computers for IoT Applications Wai-Kong Lee, Kyungbae Jang, Gyeongju Song, Hyunji Kim, Seong Oun Hwang, Hwajeong Seo
2021/1023 (PDF ) SIDH Proof of Knowledge Luca De Feo, Samuel Dobson, Steven D. Galbraith, Lukas Zobernig
2021/1022 (PDF ) Zero-Knowledge Middleboxes Paul Grubbs, Arasu Arun, Ye Zhang, Joseph Bonneau, Michael Walfish
2021/1021 (PDF ) Power-based Side Channel Attack Analysis on PQC Algorithms Tendayi Kamucheka, Michael Fahr, Tristen Teague, Alexander Nelson, David Andrews, Miaoqing Huang
2021/1020 (PDF ) Designing a Practical Code-based Signature Scheme from Zero-Knowledge Proofs with Trusted Setup Shay Gueron, Edoardo Persichetti, Paolo Santini
2021/1019 (PDF ) Implementing and Measuring KEMTLS Sofía Celi, Armando Faz-Hernández, Nick Sullivan, Goutam Tamvada, Luke Valenta, Thom Wiggers, Bas Westerbaan, Christopher A. Wood
2021/1018 (PDF ) Obfustopia Built on Secret-Key Functional Encryption Fuyuki Kitagawa, Ryo Nishimaki, Keisuke Tanaka
2021/1017 (PDF ) Improve Neural Distinguisher for Cryptanalysis Zezhou Hou, Jiongjiong Ren, Shaozhen Chen
2021/1016 (PDF ) Quantum collision finding for homomorphic hash functions Juan Carlos Garcia-Escartin, Vicent Gimeno, Julio José Moyano-Fernández
2021/1015 (PDF ) Look-up the Rainbow: Efficient Table-based Parallel Implementation of Rainbow Signature on 64-bit ARMv8 Processors Hyeokdong Kwon, Hyunjun Kim, Minjoo Sim, Wai-Kong Lee, Hwajeong Seo
2021/1014 (PDF ) SoC Security Properties and Rules Nusrat Farzana, Farimah Farahmandi, Mark Tehranipoor
2021/1013 (PDF ) Iterative Oblivious Pseudo-Random Functions and Applications Erik-Oliver Blass, Florian Kerschbaum, Travis Mayberry
2021/1012 (PDF ) A Formal Security Analysis of the W3C Web Payment APIs: Attacks and Verification Quoc Huy Do, Pedram Hosseyni, Ralf Kuesters, Guido Schmitz, Nils Wenzler, Tim Wuertele
2021/1011 (PDF ) A Fast and Flexible Multi-Client Functional Encryption for Set Intersection Mojtaba Rafiee
2021/1010 (PDF ) Circuit friendly, post-quantum dynamic accumulators from RingSIS with logarithmic prover time Endre (Silur) Abraham
2021/1009 (PDF ) Polynomial Representation Is Tricky: Maliciously Secure Private Set Intersection Revisited Aydin Abadi, Steven J. Murdoch, Thomas Zacharias
2021/1008 (PDF ) Public-key Authenticated Encryption with Keyword Search: Cryptanalysis, Enhanced Security, and Quantum-resistant Instantiation Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen
2021/1007 (PDF ) Provably Solving the Hidden Subset Sum Problem via Statistical Learning Jean-Sebastien Coron, Agnese Gini
2021/1006 (PDF ) UOV-Pepper: New Public Key Short Signature in Degree 3 Gilles Macario-Rat, Jacques Patarin
2021/1005 (PDF ) On the Construction and Cryptanalysis of Multi-Ciphers Arush Chhatrapati
2021/1004 (PDF ) Towards Attack Resilient Arbiter PUF-Based Strong PUFs Nils Wisiol
2021/1003 (PDF ) SCA-secure ECC in software – mission impossible? Lejla Batina, Łukasz Chmielewski, Björn Haase, Niels Samwel, Peter Schwabe
2021/1002 (PDF ) Online Linear Extractors for Independent Sources Yevgeniy Dodis, Siyao Guo, Noah Stephens-Davidowitz, Zhiye Xie
2021/1001 (PDF ) Classical Binding for Quantum Commitments Nir Bitansky, Zvika Brakerski
2021/1000 (PDF ) A Lattice-based Provably Secure Multisignature Scheme in Quantum Random Oracle Model Masayuki Fukumitsu, Shingo Hasegawa
2021/999 (PDF ) NTRU Fatigue: How Stretched is Overstretched? Léo Ducas, Wessel van Woerden
2021/998 (PDF ) Polynomial multiplication on embedded vector architectures Hanno Becker, Jose Maria Bermudo Mera, Angshuman Karmakar, Joseph Yiu, Ingrid Verbauwhede
2021/997 (PDF ) Higher-Order Lookup Table Masking in Essentially Constant Memory Annapurna Valiveti, Srinivas Vivek
2021/996 (PDF ) Kadcast-NG: A Structured Broadcast Protocol for Blockchain Networks Elias Rohrer, Florian Tschorsch
2021/995 (PDF ) Multi-moduli NTTs for Saber on Cortex-M3 and Cortex-M4 Amin Abdulrahman, Jiun-Peng Chen, Yu-Jia Chen, Vincent Hwang, Matthias J. Kannwischer, Bo-Yin Yang
2021/994 (PDF ) BKW Meets Fourier: New Algorithms for LPN with Sparse Parities Dana Dachman-Soled, Huijing Gong, Hunter Kippen, Aria Shahverdi
2021/993 (PDF ) FLOD: Oblivious Defender for Private Byzantine-Robust Federated Learning with Dishonest-Majority Ye Dong, Xiaojun Chen, Kaiyun Li, Dakui Wang, Shuai Zeng
2021/992 (PDF ) Faster Public-key Compression of SIDH with Less Memory Kaizhan Lin, Jianming Lin, Weize Wang, Chang-An Zhao
2021/991 (PDF ) Fake it till you make it: Data Augmentation using Generative Adversarial Networks for all the crypto you need on small devices Naila Mukhtar, Lejla Batina, Stjepan Picek, Yinan Kong
2021/990 (PDF ) Secret Keys in Genus-2 SIDH Sabrina Kunzweiler, Yan Bo Ti, Charlotte Weitkämper
2021/989 (PDF ) Stateful KEM: Towards Optimal Robust Combiner for Key Encapsulation Mechanism Jia Xu, Yiwen Gao, Hoon Wei Lim, Hongbing Wang, Ee-Chien Chang
2021/988 (PDF ) Concurrent Signatures from a Variety of Keys George Teseleanu
2021/987 (PDF ) A Formal Security Analysis of Session Resumption Across Hostnames Kai Gellert, Tobias Handirk
2021/986 (PDF ) Neon NTT: Faster Dilithium, Kyber, and Saber on Cortex-A72 and Apple M1 Hanno Becker, Vincent Hwang, Matthias J. Kannwischer, Bo-Yin Yang, Shang-Yi Yang
2021/985 (PDF ) PUF Security: Reviewing The Validity of Spoofing Attack Against Safe is the New Smart Karim Lounis
2021/984 (PDF ) On the Use of the Legendre Symbol in Symmetric Cipher Design Alan Szepieniec
2021/983 (PDF ) A Cryptographic Hash Function from Markoff Triples Elena Fuchs, Kristin Lauter, Matthew Litman, Austin Tran
2021/982 (PDF ) Quantum Implementation and Resource Estimates for RECTANGLE and KNOT Anubhab Baksi, Kyungbae Jang, Gyeongju Song, Hwajeong Seo, Zejun Xiang
2021/981 (PDF ) Deep Learning-based Side-channel Analysis against AES Inner Rounds Sudharshan Swaminathan, Lukasz Chmielewski, Guilherme Perin, Stjepan Picek
2021/980 (PDF ) Binary Field Montgomery Multiplication on Quantum Computers Kyoungbae Jang, Gyeong Ju Song, Hyunji Kim, Hyeokdong Kwon, Wai-Kong Lee, Zhi Hu, Hwajeong Seo
2021/979 (PDF ) Constant-Overhead Zero-Knowledge for RAM Programs Nicholas Franzese, Jonathan Katz, Steve Lu, Rafail Ostrovsky, Xiao Wang, Chenkai Weng
2021/978 (PDF ) Polymath: Low-Latency MPC via Secure Polynomial Evaluations and its Applications Donghang Lu, Albert Yu, Aniket Kate, Hemanta Maji
2021/977 (PDF ) Shorter and Faster Post-Quantum Designated-Verifier zkSNARKs from Lattices Yuval Ishai, Hang Su, David J. Wu
2021/976 (PDF ) Reinventing BEDs: Formal Treatment of Broadcast Encryption with Dealership and Practical Constructions Sayantan Mukherjee, Avishek Majumder
2021/975 (PDF ) Bridges connecting Encryption Schemes Mugurel Barcau, Cristian Lupascu, Vicentiu Pasol, George C. Turcas
2021/974 (PDF ) Fast Keyword Search over Encrypted Data with Short Ciphertext in Clouds Yi-Fan Tseng, Chun-I Fan, Zi-Cheng Liu
2021/973 (PDF ) A Multiplatform Parallel Approach for Lattice Sieving Algorithms Michał Andrzejczak, Kris Gaj
2021/972 (PDF ) Partial Key Exposure Attack on Short Secret Exponent CRT-RSA Alexander May, Julian Nowakowski, Santanu Sarkar
2021/971 (PDF ) Tighter Security for Schnorr Identification and Signatures: A High-Moment Forking Lemma for $\Sigma$-Protocols Lior Rotem, Gil Segev
2021/970 (PDF ) Short Identity-Based Signatures with Tight Security from Lattices Jiaxin Pan, Benedikt Wagner
2021/969 (PDF ) Influence of a Set of Variables on a Boolean Function Aniruddha Biswas, Palash Sarkar
2021/968 (PDF ) White-Box Implementations for Hash-Based Signatures and One-Time Passwords Kemal Bicakci, Kemal Ulker, Yusuf Uzunay, Halis Taha Şahin, Muhammed Said Gündoğan
2021/967 (PDF ) Assessment of Quantum Threat To Bitcoin and Derived Cryptocurrencies Stephen Holmes, Liqun Chen
2021/966 (PDF ) Soteria: Preserving Privacy in Distributed Machine Learning Cláudia Brito, Pedro Ferreira, Bernardo Portela, Rui Oliveira, João Paulo
2021/965 (PDF ) Automatic Search for Bit-based Division Property Shibam Ghosh, Orr Dunkelman
2021/964 (PDF ) Secure Quantum Computation with Classical Communication James Bartusek
2021/963 (PDF ) Post-Quantum Key-Blinding for Authentication in Anonymity Networks Edward Eaton, Douglas Stebila, Roy Stracovsky
2021/962 (PDF ) Practically Solving LPN Thom Wiggers, Simona Samardjiska
2021/961 (PDF ) Cryptimeleon: A Library for Fast Prototyping of Privacy-Preserving Cryptographic Schemes Jan Bobolz, Fabian Eidens, Raphael Heitjohann, Jeremy Fell
2021/960 (PDF ) The SPEEDY Family of Block Ciphers - Engineering an Ultra Low-Latency Cipher from Gate Level for Secure Processor Architectures Gregor Leander, Thorben Moos, Amir Moradi, Shahram Rasoolzadeh
2021/959 (PDF ) The Best of Two Worlds: Deep Learning-assisted Template Attack Lichao Wu, Guilherme Perin, Stjepan Picek
2021/958 (PDF ) When the Decoder Has to Look Twice: Glitching a PUF Error Correction Jonas Ruchti, Michael Gruber, Michael Pehl
2021/957 (PDF ) Three-Round Secure Multiparty Computation from Black-Box Two-Round Oblivious Transfer Arpita Patra, Akshayaram Srinivasan
2021/956 (PDF ) Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber Mike Hamburg, Julius Hermelink, Robert Primas, Simona Samardjiska, Thomas Schamberger, Silvan Streit, Emanuele Strieder, Christine van Vredendaal
2021/955 (PDF ) Higher-degree supersingular group actions Mathilde Chenu, Benjamin Smith
2021/954 (PDF ) Scabbard: a suite of efficient learning with rounding key-encapsulation mechanisms Jose Maria Bermudo Mera, Angshuman Karmakar, Suparna Kundu, Ingrid Verbauwhede
2021/953 (PDF ) State-free End-to-End Encrypted Storage and Chat Systems based on Searchable Encryption Keita Emura, Ryoma Ito, Sachiko Kanamori, Ryo Nojima, Yohei Watanabe
2021/952 (PDF ) On the Evaluation of Deep Learning-based Side-channel Analysis Lichao Wu, Guilherme Perin, Stjepan Picek
2021/951 (PDF ) Bitslice Masking and Improved Shuffling: How and When to Mix Them in Software? Melissa Azouaoui, Olivier Bronchain, Vincent Grosso, Kostas Papagiannopoulos, François-Xavier Standaert
2021/950 (PDF ) Exploring Crypto-Physical Dark Matter and Learning with Physical Rounding Towards Secure and Efficient Fresh Re-Keying Sébastien Duval, Pierrick Méaux, Charles Momin, François-Xavier Standaert
2021/949 (PDF ) A High-Speed Architecture for the Reduction in VDF Based on a Class Group Yifeng Song, Danyang Zhu, Jing Tian, Zhongfeng Wang
2021/948 (PDF ) How to Make a Secure Index for Searchable Symmetric Encryption, Revisited Yohei Watanabe, Takeshi Nakai, Kazuma Ohara, Takuya Nojima, Yexuan Liu, Mitsugu Iwamoto, Kazuo Ohta
2021/947 (PDF ) Autocorrelations of vectorial Boolean functions Anne Canteaut, Lukas Kölsch, Chao Li, Chunlei Li, Kangquan Li, Longjiang Qu, Friedrich Wiemer
2021/946 (PDF ) Hidden Cosets and Applications to Unclonable Cryptography Andrea Coladangelo, Jiahui Liu, Qipeng Liu, Mark Zhandry
2021/945 (PDF ) Limits on the Adaptive Security of Yao's Garbling Chethan Kamath, Karen Klein, Krzysztof Pietrzak, Daniel Wichs
2021/944 (PDF ) Systematic Side-channel Analysis of Curve25519 with Machine Learning Léo Weissbart, Łukasz Chmielewski, Stjepan Picek, Lejla Batina
2021/943 (PDF ) Breaking the Circuit-Size Barrier for Secure Computation under Quasi-Polynomial LPN Geoffroy Couteau, Pierre Meyer
2021/942 (PDF ) Compact Ring Signatures from Learning With Errors Rohit Chatterjee, Sanjam Garg, Mohammad Hajiabadi, Dakshita Khurana, Xiao Liang, Giulio Malavolta, Omkant Pandey, Sina Shiehian
2021/941 (PDF ) Spectral Approach to Process the (Multivariate) High-Order Template Attack against Any Masking Scheme Maamar Ouladj, Sylvain Guilley, Philippe Guillot, Farid Mokrane
2021/940 (PDF ) SecretStore: A Secrecy as a Service model to enable the Cloud Storage to store user's secret data Ripon Patgiri, Malaya Dutta Borah, Laiphrakpam Dolendro Singh
2021/939 (PDF ) OmniLytics: A Blockchain-based Secure Data Market for Decentralized Machine Learning Jiacheng Liang, Songze Li, Wensi Jiang, Bochuan Cao, Chaoyang He
2021/938 (PDF ) Plactic signatures (insecure?) Daniel R. L. Brown
2021/937 (PDF ) Storing data that is updated regularly on a client machine securely Artem Los
2021/936 (PDF ) FIVER -- Robust Verification of Countermeasures against Fault Injections Jan Richter-Brockmann, Aein Rezaei Shahmirzadi, Pascal Sasdrich, Amir Moradi, Tim Güneysu
2021/935 (PDF ) ROTed: Random Oblivious Transfer for embedded devices Pedro Branco, Luís Fiolhais, Manuel Goulão, Paulo Martins, Paulo Mateus, Leonel Sousa
2021/934 (PDF ) ECLIPSE: Enhanced Compiling method for Pedersen-committed zkSNARK Engines Diego F. Aranha, Emil Madsen Bennedsen, Matteo Campanelli, Chaya Ganesh, Claudio Orlandi, Akira Takahashi
2021/933 (PDF ) Fast Factoring Integers by SVP Algorithms, corrected Claus Peter Schnorr
2021/932 (PDF ) Succinct Functional Commitment for a Large Class of Arithmetic Circuits Helger Lipmaa, Kateryna Pavlyk
2021/931 (PDF ) Practical Key Recovery Attacks on FlexAEAD Orr Dunkelman, Maria Eichlseder, Daniel Kales, Nathan Keller, Gaëtan Leurent, Markus Schofnegger
2021/930 (PDF ) Darlin: Recursive Proofs using Marlin Ulrich Haböck, Alberto Garoffolo, Daniele Di Benedetto
2021/929 (PDF ) A polynomial time key-recovery attack on the Sidon cryptosystem Pierre Briaud, Jean-Pierre Tillich, Javier Verbel
2021/928 (PDF ) Necessary and Sufficient Conditions for Galois NFSRs Equivalent to Fibonacci Ones and Their Application to the Stream Cipher Trivium Jianghua Zhong, Yingyin Pan, Wenhui Kong, Dongdai Lin
2021/927 (PDF ) A New Simple Technique to Bootstrap Various Lattice Zero-Knowledge Proofs to QROM Secure NIZKs Shuichi Katsumata
2021/926 (PDF ) On Treewidth, Separators and Yao's Garbling Chethan Kamath, Karen Klein, Krzysztof Pietrzak
2021/925 (PDF ) Bilinear Map Based One-Time Signature Scheme with Secret Key Exposure Marten van Dijk, Deniz Gurevin, Chenglu Jin, Omer Khan, Phuong Ha Nguyen
2021/924 (PDF ) On Removing Rejection Conditions in Practical Lattice-Based Signatures Rouzbeh Behnia, Yilei Chen, Daniel Masny
2021/923 (PDF ) On the (in)security of ElGamal in OpenPGP Luca De Feo, Bertram Poettering, Alessandro Sorniotti
2021/920 (PDF ) Non-malleable Commitments against Quantum Attacks Nir Bitansky, Huijia Lin, Omri Shmueli
2021/919 (PDF ) The supersingular isogeny path and endomorphism ring problems are equivalent Benjamin Wesolowski
2021/918 (PDF ) The Round Complexity of Quantum Zero-Knowledge Orestis Chardouvelis, Giulio Malavolta
2021/917 (PDF ) CODBS: A cascading oblivious search protocol optimized for real-world relational database indexes Rogério Pontes, Bernardo Portela, Manuel Barbosa, Ricardo Vilaça
2021/916 (PDF ) Mithril: Stake-based Threshold Multisignatures Pyrros Chaidos, Aggelos Kiayias
2021/915 (PDF ) A PCP Theorem for Interactive Proofs and Applications Gal Arnon, Alessandro Chiesa, Eylon Yogev
2021/914 (PDF ) Principal Component Analysis using CKKS Homomorphic Encryption Scheme Samanvaya Panda
2021/913 (PDF ) Practical complexities of probabilistic algorithms for solving Boolean polynomial systems Stefano Barbero, Emanuele Bellini, Carlo Sanna, Javier Verbel
2021/912 (PDF ) On the looseness of FO derandomization Daniel J. Bernstein
2021/911 (PDF ) SoK: Understanding BFT Consensus in the Age of Blockchains Gang Wang
2021/910 (PDF ) SECDSA: Mobile signing and authentication under classical ``sole control'' Eric Verheul
2021/909 (PDF ) Efficiency through Diversity in Ensemble Models applied to Side-Channel Attacks – A Case Study on Public-Key Algorithms – Gabriel Zaid, Lilian Bossuet, Amaury Habrard, Alexandre Venelli
2021/908 (PDF ) Selection of sampling keys for cryptographic tests George Marinakis
2021/907 (PDF ) zkKYC: A solution concept for KYC without knowing your customer, leveraging self-sovereign identity and zero-knowledge proofs Pieter Pauwels
2021/906 (PDF ) Two Public-Key Cryptosystems Based on Expanded Gabidulin Codes Wenshuo Guo, Fang-Wei Fu
2021/905 (PDF ) A Tale of Two Boards: On the Influence of Microarchitecture on Side-Channel Leakage Vipul Arora, Ileana Buhan, Guilherme Perin, Stjepan Picek
2021/904 (PDF ) Spatial Dependency Analysis to Extract Information from Side-Channel Mixtures Aurélien Vasselle, Hugues Thiebeauld, Philippe Maurine
2021/903 (PDF ) Nowhere to Leak: Forward and Backward Private Symmetric Searchable Encryption in the Multi-Client Setting (Extended Version) Alexandros Bakas, Antonis Michalas
2021/902 (PDF ) Breaking Masked and Shuffled CCA Secure Saber KEM by Power Analysis Kalle Ngo, Elena Dubrova, Thomas Johansson
2021/901 (PDF ) Resolvable Block Designs in Construction of Approximate Real MUBs that are Sparse Ajeet Kumar, Subhamoy Maitra
2021/900 (PDF ) ANS-based Compression and Encryption with 128-bit Security Seyit Camtepe, Jarek Duda, Arash Mahboubi, Pawel Morawiecki, Surya Nepal, Marcin Pawlowski, Josef Pieprzyk
2021/899 (PDF ) Homomorphic decryption in blockchains via compressed discrete-log lookup tables Panagiotis Chatzigiannis, Konstantinos Chalkias, Valeria Nikolaenko
2021/898 (PDF ) On Extremal Expanding Algebraic Graphs and post-quantum secure delivery of passwords, encryption maps and tools for multivariate digital signatures. Vasyl Ustimenko
2021/897 (PDF ) A Rational Protocol Treatment of 51% Attacks Christian Badertscher, Yun Lu, Vassilis Zikas
2021/896 (PDF ) Rebuttal to claims in Section 2.1 of the ePrint report 2021/583 "Entropoid-based cryptography is group exponentiation in disguise" Danilo Gligoroski
2021/895 (PDF ) Targeted Lossy Functions and Applications Willy Quach, Brent Waters, Daniel Wichs
2021/894 (PDF ) History of Cryptographic Key Sizes Nigel P. Smart, Emmanuel Thome
2021/893 (PDF ) DEMO: AirCollect: Efficiently Recovering Hashed Phone Numbers Leaked via Apple AirDrop Alexander Heinrich, Matthias Hollick, Thomas Schneider, Milan Stute, Christian Weinert
2021/892 (PDF ) Low-Latency Keccak at any Arbitrary Order Sara Zarei, Aein Rezaei Shahmirzadi, Hadi Soleimany, Raziye Salarifard, Amir Moradi
2021/891 (PDF ) White Box Traitor Tracing Mark Zhandry
2021/890 (PDF ) On One-way Functions and Sparse Languages Yanyi Liu, Rafael Pass
2021/889 (PDF ) Counterexamples to New Circular Security Assumptions Underlying iO Sam Hopkins, Aayush Jain, Huijia Lin
2021/888 (PDF ) Lifting Standard Model Reductions to Common Setup Assumptions Ngoc Khanh Nguyen, Eftychios Theodorakis, Bogdan Warinschi
2021/886 (PDF ) Computational Records with Aging Hardware: Controlling Half the Output of SHA-256 Mellila Bouam, Charles Bouillaguet, Claire Delaplace, Camille Noûs
2021/885 (PDF ) MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates, Protocols, and Applications Itai Dinur, Steven Goldfeder, Tzipora Halevi, Yuval Ishai, Mahimna Kelkar, Vivek Sharma, Greg Zaverucha
2021/884 (PDF ) Blockchain Layer Zero: Characterizing the Bitcoin Network through Measurements, Models, and Simulations Elias Rohrer, Florian Tschorsch
2021/883 (PDF ) Oblivious Key-Value Stores and Amplification for Private Set Intersection Gayathri Garimella, Benny Pinkas, Mike Rosulek, Ni Trieu, Avishay Yanai
2021/882 (PDF ) Computational Hardness of Optimal FairComputation: Beyond Minicrypt Hemanta K. Maji, Mingyuan Wang
2021/881 (PDF ) Secure Code-Based Key Encapsulation Mechanism with Short Ciphertext and Secret Key Jayashree Dey, Ratna Dutta
2021/880 (PDF ) Towards Tight Random Probing Security Gaëtan Cassiers, Sebastian Faust, Maximilian Orlt, François-Xavier Standaert
2021/879 (PDF ) Rethinking Searchable Symmetric Encryption Zichen Gui, Kenneth G. Paterson, Sikhar Patranabis
2021/878 (PDF ) Programmable RO (PRO): A Multipurpose Countermeasure against Side-channel and Fault Injection Attacks Yuan Yao, Pantea Kiaei, Richa Singh, Shahin Tajik, Patrick Schaumont
2021/877 (PDF ) A Fully Anonymous e-Voting Protocol Employing Universal zk-SNARKs and Smart Contracts Aritra Banerjee
2021/876 (PDF ) Code Constructions and Bounds for Identification via Channels Onur Gunlu, Joerg Kliewer, Rafael F. Schaefer, Vladimir Sidorenko
2021/875 (PDF ) Hybrid Signal protocol for post-quantum email encryption Sara Stadler, Vitor Sakaguti, Harjot Kaur, Anna Lena Fehlhaber
2021/874 (PDF ) Chosen-ciphertext Clustering Attack on CRYSTALS-KYBER using the Side-channel Leakage of Barrett Reduction Bo-Yeon Sim, Aesun Park, Dong-Guk Han
2021/873 (PDF ) KHAPE: Asymmetric PAKE from Key-Hiding Key Exchange Yanqi Gu, Stanislaw Jarecki, Hugo Krawczyk
2021/872 (PDF ) W-OTS(+) up my Sleeve! A Hidden Secure Fallback for Cryptocurrency Wallets David Chaum, Mario Larangeira, Mario Yaksetig, William Carter
2021/871 (PDF ) Traceable Secret Sharing and Applications Vipul Goyal, Yifan Song, Akshayaram Srinivasan
2021/870 (PDF ) SoK: Gröbner Basis Algorithms for Arithmetization Oriented Ciphers Jan Ferdinand Sauer, Alan Szepieniec
2021/869 (PDF ) MiniLedger: Compact-sized Anonymous and Auditable Distributed Payments Panagiotis Chatzigiannis, Foteini Baldimtsi
2021/868 (PDF ) Low-Latency Hardware Masking of PRINCE Nicolai Müller, Thorben Moos, Amir Moradi
2021/867 (PDF ) Key-Policy ABE with Switchable Attributes Cécile Delerablée, Lénaïck Gouriou, David Pointcheval
2021/866 (PDF ) The One-More Discrete Logarithm Assumption in the Generic Group Model Balthazar Bauer, Georg Fuchsbauer, Antoine Plouviez
2021/865 (PDF ) Quantum Key Search for Ternary LWE Iggy van Hoof, Elena Kirshanova, Alexander May
2021/864 (PDF ) A Fast and Simple Partially Oblivious PRF, with Applications Nirvan Tyagi, Sofı́a Celi, Thomas Ristenpart, Nick Sullivan, Stefano Tessaro, Christopher A. Wood
2021/863 (PDF ) Authenticated Key Exchange and Signatures with Tight Security in the Standard Model Shuai Han, Tibor Jager, Eike Kiltz, Shengli Liu, Jiaxin Pan, Doreen Riepel, Sven Schäge
2021/862 (PDF ) Receiver-Anonymity in Rerandomizable RCCA-Secure Cryptosystems Resolved Yi Wang, Rongmao Chen, Guomin Yang, Xinyi Huang, Baosheng Wang, Moti Yung
2021/861 (PDF ) Standard Model Leakage-Resilient Authenticated Key Exchange using Inner-product Extractors Janaka Alawatugoda, Tatsuaki Okamoto
2021/860 (PDF ) Verification of the security in Boolean masked circuits Vahid Jahandideh
2021/859 (PDF ) Concrete Evaluation of the Random Probing Security Vahid Jahandideh
2021/858 (PDF ) Full key recovery side-channel attack against ephemeral SIKE on the Cortex-M4 Aymeric Genêt, Natacha Linard de Guertechin, Novak Kaluđerović
2021/857 (PDF ) Secure Computation for G-Module and its Applications Qizhi Zhang, Bingsheng Zhang, Lichun Li, Shan Yin, Juanjuan Sun
2021/856 (PDF ) Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks Xiaoyang Dong, Lingyue Qin, Siwei Sun, Xiaoyun Wang
2021/855 (PDF ) Breaking and Fixing Virtual Channels: Domino Attack and Donner Lukas Aumayr, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei
2021/854 (PDF ) PQC: R-Propping of a Simple Oblivious Transfer Pedro Hecht
2021/853 (PDF ) Private Signaling Varun Madathil, Alessandra Scafuro, István András Seres, Omer Shlomovits, Denis Varlakov
2021/852 (PDF ) Improved Structured Encryption for SQL Databases via Hybrid Indexing David Cash, Ruth Ng, Adam Rivkin
2021/851 (PDF ) Amun: Securing E-Voting Against Over-the-Shoulder Coercion Riccardo Longo, Chiara Spadafora
2021/850 (PDF ) Resistance of Isogeny-Based Cryptographic Implementations to a Fault Attack Élise Tasso, Luca De Feo, Nadia El Mrabet, Simon Pontié
2021/849 (PDF ) Curse of Re-encryption: A Generic Power/EM Analysis on Post-Quantum KEMs Rei Ueno, Keita Xagawa, Yutaro Tanaka, Akira Ito, Junko Takahashi, Naofumi Homma
2021/848 (PDF ) Functional Encryption for Turing Machines with Dynamic Bounded Collusion from LWE Shweta Agrawal, Monosij Maitra, Narasimha Sai Vempati, Shota Yamada
2021/847 (PDF ) Dynamic Collusion Bounded Functional Encryption from Identity-Based Encryption Rachit Garg, Rishab Goyal, George Lu, Brent Waters
2021/846 (PDF ) Ergo Hackathon: Crowdfunded Smart Contract Pools Research and Conceptualization Bronson Brooks Richard, Gary Waugh
2021/845 (PDF ) An Intermediate Secret-Guessing Attack on Hash-Based Signatures Roland Booth, Yanhong Xu, Sabyasachi Karati, Reihaneh Safavi-Naini
2021/844 (PDF ) A note on IND-qCCA security in the ROM and its applications: CPA security is sufficient for TLS 1.3 Loïs Huguenin-Dumittan, Serge Vaudenay
2021/843 (PDF ) Environmentally Friendly Composable Multi-Party Computation in the Plain Model from Standard (Timed) Assumptions Brandon Broadnax, Jeremias Mechler, Jörn Müller-Quade
2021/842 (PDF ) PCPs and Instance Compression from a Cryptographic Lens Liron Bronfman, Ron D. Rothblum
2021/841 (PDF ) MPC for $Q_2$ Access Structures over Rings and Fields Robin Jadoul, Nigel P. Smart, Barry Van Leeuwen
2021/840 (PDF ) Fault-Injection Attacks against NIST's Post-Quantum Cryptography Round 3 KEM Candidates Keita Xagawa, Akira Ito, Rei Ueno, Junko Takahashi, Naofumi Homma
2021/839 (PDF ) Prudent Practices in Security Standardization Feng Hao
2021/838 (PDF ) Anonymous and Distributed Authentication for Peer-to-Peer Networks Pasan Tennakoon, Supipi Karunathilaka, Rishikeshan Lavakumar, Janaka Alawatugoda
2021/837 (PDF ) On McEliece type cryptosystems using self-dual codes with large minimum weight Luca Mariot, Stjepan Picek, Radinka Yorgova
2021/836 (PDF ) Towards a Unified Approach to Black-Box Constructions of Zero-Knowledge Proofs Xiao Liang, Omkant Pandey
2021/835 (PDF ) Practical, Label Private Deep Learning Training based on Secure Multiparty Computation and Differential Privacy Sen Yuan, Milan Shen, Ilya Mironov, Anderson C. A. Nascimento
2021/834 (PDF ) Unconditional Communication-Efficient MPC via Hall's Marriage Theorem Vipul Goyal, Antigoni Polychroniadou, Yifan Song
2021/833 (PDF ) ATLAS: Efficient and Scalable MPC in the Honest Majority Setting Vipul Goyal, Hanjun Li, Rafail Ostrovsky, Antigoni Polychroniadou, Yifan Song
2021/832 (PDF ) Progressive And Efficient Verification For Digital Signatures Cecilia Boschini, Dario Fiore, Elena Pagnin
2021/831 (PDF ) Private Remote Sources for Secure Multi-Function Computation Onur Gunlu, Matthieu Bloch, Rafael F. Schaefer
2021/830 (PDF ) Analysis and Protection of the Two-metric Helper Data Scheme Lars Tebelmann, Ulrich Kühne, Jean-Luc Danger, Michael Pehl
2021/829 (PDF ) Constructing and Deconstructing Intentional Weaknesses in Symmetric Ciphers Christof Beierle, Tim Beyne, Patrick Felke, Gregor Leander
2021/828 (PDF ) Row, Row, Row Your Boat: How to Not Find Weak Keys in Pilsung Chitchanok Chuengsatiansup, Eyal Ronen, Gregory G. Rose, Yuval Yarom
2021/827 (PDF ) TransNet: Shift Invariant Transformer Network for Side Channel Analysis Suvadeep Hajra, Sayandeep Saha, Manaar Alam, Debdeep Mukhopadhyay
2021/826 (PDF ) OpenSSLNTRU: Faster post-quantum TLS key exchange Daniel J. Bernstein, Billy Bob Brumley, Ming-Shing Chen, Nicola Tuveri
2021/825 (PDF ) Balancing Quality and Efficiency in Private Clustering with Affinity Propagation Hannah Keller, Helen Möllering, Thomas Schneider, Hossein Yalame
2021/824 (PDF ) Security Characterization of J-PAKE and its Variants Michel Abdalla, Manuel Barbosa, Peter B. Rønne, Peter Y. A. Ryan, Petra Šala
2021/823 (PDF ) GPU-accelerated PIR with Client-Independent Preprocessing for Large-Scale Applications Daniel Günther, Maurice Heymann, Benny Pinkas, Thomas Schneider
2021/822 (PDF ) One-out-of-$q$ OT Combiners Oriol Farràs, Jordi Ribes-González
2021/821 (PDF ) On the hardness of the NTRU problem Alice Pellet-Mary, Damien Stehlé
2021/820 (PDF ) Further Improving Differential-Linear Attacks: Applications to Chaskey and Serpent Marek Broll, Federico Canale, Nicolas David, Antonio Florez-Gutierrez, Gregor Leander, María Naya-Plasencia, Yosuke Todo
2021/819 (PDF ) Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2 Christof Beierle, Patrick Derbez, Gregor Leander, Gaëtan Leurent, Håvard Raddum, Yann Rotella, David Rupprecht, Lukas Stennes
2021/818 (PDF ) CTng: Secure Certificate and Revocation Transparency Hemi Leibowitz, Haitham Ghalwash, Ewa Syta, Amir Herzberg
2021/817 (PDF ) Give Me 5 Minutes: Attacking ASCAD with a Single Side-Channel Trace Olivier Bronchain, Gaëtan Cassiers, François-Xavier Standaert
2021/816 (PDF ) Privacy-Preserving Approximate k-Nearest-Neighbors Search that Hides Access, Query and Volume Patterns Alexandra Boldyreva, Tianxin Tang
2021/815 (PDF ) Linear Cryptanalysis of FF3-1 and FEA Tim Beyne
2021/814 (PDF ) A New Way to Achieve Round-Efficient Byzantine Agreement Matthias Fitzi, Chen-Da Liu-Zhang, Julian Loss
2021/813 (PDF ) Intelligent Composed Algorithms Frank Byszio, Dr. Klaus-Dieter Wirth, Dr. Kim Nguyen
2021/812 (PDF ) TOPPool: Time-aware Optimized Privacy-Preserving Ridesharing Elena Pagnin, Gunnar Gunnarsson, Pedram Talebi, Claudio Orlandi, Andrei Sabelfeld
2021/811 (PDF ) A General Purpose Transpiler for Fully Homomorphic Encryption Shruthi Gorantala, Rob Springer, Sean Purser-Haskell, William Lam, Royce Wilson, Asra Ali, Eric P. Astor, Itai Zukerman, Sam Ruth, Christoph Dibak, Phillipp Schoppmann, Sasha Kulankhina, Alain Forget, David Marn, Cameron Tew, Rafael Misoczki, Bernat Guillen, Xinyu Ye, Dennis Kraft, Damien Desfontaines, Aishe Krishnamurthy, Miguel Guevara, Irippuge Milinda Perera, Yurii Sushko, Bryant Gipson
2021/810 (PDF ) Efficient Asynchronous Byzantine Agreement without Private Setups Yingzi Gao, Yuan Lu, Zhenliang Lu, Qiang Tang, Jing Xu, Zhenfeng Zhang
2021/809 (PDF ) SoK: Efficient Privacy-preserving Clustering Aditya Hegde, Helen Möllering, Thomas Schneider, Hossein Yalame
2021/808 (PDF ) SNARGs for $\mathcal{P}$ from LWE Arka Rai Choudhuri, Abhishek Jain, Zhengzhong Jin
2021/807 (PDF ) Non-Interactive Batch Arguments for NP from Standard Assumptions Arka Rai Choudhuri, Abhishek Jain, Zhengzhong Jin
2021/806 (PDF ) Boosting the Security of Blind Signature Schemes Jonathan Katz, Julian Loss, Michael Rosenberg
2021/805 (PDF ) Practical Settlement Bounds for Proof-of-Work Blockchains Peter Gaži, Ling Ren, Alexander Russell
2021/804 (PDF ) A Note on ``Reduction Modulo $2^{448}-2^{224}-1$'' Timothy Shelton
2021/803 (PDF ) On the Privacy of Protocols based on CPA-Secure Homomorphic Encryption Adi Akavia, Margarita Vald
2021/802 (PDF ) On Secret Sharing, Randomness, and Random-less Reductions for Secret Sharing Divesh Aggarwal, Eldon Chung, Maciej Obremski, João Ribeiro
2021/801 (PDF ) Memory-Hard Puzzles in the Standard Model with Applications to Memory-Hard Functions and Resource-Bounded Locally Decodable Codes Mohammad Hassan Ameri, Alexander R. Block, Jeremiah Blocki
2021/800 (PDF ) i-TiRE: Incremental Timed-Release Encryption or How to use Timed-Release Encryption on Blockchains? Leemon Baird, Pratyay Mukherjee, Rohit Sinha
2021/799 (PDF ) Lattice Attacks on NTRU and LWE: A History of Refinements Martin Albrecht, Léo Ducas
2021/798 (PDF ) Probabilistic Dynamic Input Output Automata (Extended Version) Pierre Civit, Maria Potop-Butucaru
2021/797 (PDF ) LLVM-based Circuit Compilation for Practical Secure Computation Tim Heldmann, Thomas Schneider, Oleksandr Tkachenko, Christian Weinert, Hossein Yalame
2021/796 (PDF ) How Byzantine is a Send Corruption? Karim Eldefrawy, Julian Loss, Ben Terner
2021/795 (PDF ) Transforming Secure Comparison Protocol from Passive to Active Adversary Model Wei Jiang
2021/794 (PDF ) Reverse Engineering the Micro-Architectural Leakage Features of a Commercial Processor Si Gao, Elisabeth Oswald, Dan Page
2021/793 (PDF ) Property-Preserving Hash Functions for Hamming Distance from Standard Assumptions Nils Fleischhacker, Kasper Green Larsen, Mark Simkin
2021/792 (PDF ) Pseudo-Random Walk on Ideals: Practical Speed-Up in Relation Collection for Class Group Computation Madhurima Mukhopadhyay, Palash Sarkar
2021/791 (PDF ) Open Sesame: A Novel Non-SAT-Attack against CAS-Lock Akashdeep Saha, Urbi Chatterjee, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty
2021/790 (PDF ) A Side-Channel Assisted Attack on NTRU Amund Askeland, Sondre Rønjom
2021/789 (PDF ) P2DPI: Practical and Privacy-Preserving Deep Packet Inspection Jongkil Kim, Seyit Camtepe, Joonsang Baek, Willy Susilo, Josef Pieprzyk, Surya Nepal
2021/788 (PDF ) Somewhere Statistical Soundness, Post-Quantum Security, and SNARGs Yael Tauman Kalai, Vinod Vaikuntanathan, Rachel Yun Zhang
2021/787 (PDF ) Mobile Voting -- Still Too Risky? Sven Heiberg, Kristjan Krips, Jan Willemson
2021/786 (PDF ) Volume-Hiding Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy Yongjun Zhao, Huaxiong Wang, Kwok-Yan Lam
2021/785 (PDF ) Lower bounds on lattice sieving and information set decoding Elena Kirshanova, Thijs Laarhoven
2021/784 (PDF ) Analysis and Recommendations for MAC and Key Lengths in Delayed Disclosure GNSS Authentication Protocols Ignacio Fernández-Hernández, Tomer Ashur, Vincent Rijmen
2021/783 (PDF ) Privacy-Preserving Machine Learning with Fully Homomorphic Encryption for Deep Neural Network Joon-Woo Lee, HyungChul Kang, Yongwoo Lee, Woosuk Choi, Jieun Eom, Maxim Deryabin, Eunsang Lee, Junghyun Lee, Donghoon Yoo, Young-Sik Kim, Jong-Seon No
2021/782 (PDF ) On the deployment of FlyClient as a velvet fork: chain-sewing attacks and countermeasures Tristan Nemoz, Alexei Zamyatin
2021/781 (PDF ) Quantum-Resistant Security for Software Updates on Low-power Networked Embedded Devices Gustavo Banegas, Koen Zandberg, Adrian Herrmann, Emmanuel Baccelli, Benjamin Smith
2021/780 (PDF ) Netlist Decompilation Workflow for Recovered Design Verification, Validation, and Assurance Katie Liszewski, Tim McDonley, Josh Delozier, Andrew Elliott, Dylan Jones, Matt Sutter, Adam Kimura
2021/779 (PDF ) More efficient post-quantum KEMTLS with pre-distributed public keys Peter Schwabe, Douglas Stebila, Thom Wiggers
2021/778 (PDF ) Efficient secret key reusing attribute-based encryption from lattices Xinyuan Qian, Wenyuan Wu
2021/777 (PDF ) Asynchronous Data Dissemination and its Applications Sourav Das, Zhuolun Xiang, Ling Ren
2021/776 (PDF ) SoK: Applying Blockchain Technology in Industrial Internet of Things Gang Wang
2021/775 (PDF ) Completeness Theorems for Adaptively Secure Broadcast Ran Cohen, Juan Garay, Vassilis Zikas
2021/774 (PDF ) On Tight Quantum Security of HMAC and NMAC in the Quantum Random Oracle Model Akinori Hosoyamada, Tetsu Iwata
2021/773 (PDF ) HEX-BLOOM: An Efficient Method for Authenticity and Integrity Verification in Privacy-preserving Computing Ripon Patgiri, Malaya Dutta Borah
2021/772 (PDF ) Falcon Down: Breaking Falcon Post-Quantum Signature Scheme through Side-Channel Attacks Emre Karabulut, Aydin Aysu
2021/771 (PDF ) Securing Secure Aggregation: Mitigating Multi-Round Privacy Leakage in Federated Learning Jinhyun So, Ramy E. Ali, Basak Guler, Jiantao Jiao, Salman Avestimehr
2021/770 (PDF ) Multi-key Private Matching for Compute Prasad Buddhavarapu, Benjamin M Case, Logan Gore, Andrew Knox, Payman Mohassel, Shubho Sengupta, Erik Taubeneck, Min Xue
2021/769 (PDF ) Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake Jacqueline Brendel, Rune Fiedler, Felix Günther, Christian Janson, Douglas Stebila
2021/768 (PDF ) Privacy-Preserving Decision Trees Training and Prediction Adi Akavia, Max Leibovich, Yehezkel S. Resheff, Roey Ron, Moni Shahar, Margarita Vald
2021/767 (PDF ) White-box cryptography with global device binding from message-recoverable signatures and token-based obfuscation Shashank Agrawal, Estuardo Alpirez Bock, Yilei Chen, Gaven Watson
2021/766 (PDF ) Etherless Ethereum Tokens: Simulating Native Tokens in Ethereum John Andrews, Michele Ciampi, Vassilis Zikas
2021/765 (PDF ) Dynamic Volume-Hiding Encrypted Multi-Maps with Applications to Searchable Encryption Ghous Amjad, Sarvar Patel, Giuseppe Persiano, Kevin Yeo, Moti Yung
2021/764 (PDF ) Covert Learning: How to Learn with an Untrusted Intermediary Ran Canetti, Ari Karchmer
2021/763 (PDF ) Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation Mathy Vanhoef
2021/762 (PDF ) A wide class of Boolean functions generalizing the hidden weight bit function Claude Carlet
2021/761 (PDF ) Parameterization of Boolean functions by vectorial functions and associated constructions Claude Carlet
2021/760 (PDF ) Analysis of CryptoNote Transaction Graphs using the Dulmage-Mendelsohn Decomposition Saravanan Vijayakumaran
2021/759 (PDF ) Cerebro: A Platform for Multi-Party Cryptographic Collaborative Learning Wenting Zheng, Ryan Deng, Weikeng Chen, Raluca Ada Popa, Aurojit Panda, Ion Stoica
2021/758 (PDF ) Quantum cryptography based on an algorithm for determining simultaneously all the mappings of a Boolean function Koji Nagata, Renata Wong, Do Ngoc Diep, Tadao Nakamura
2021/757 (PDF ) On the Dual of Generalized Bent Functions Jiaxin Wang, Fang-Wei Fu
2021/756 (PDF ) A Novel Completeness Test and its Application to Side Channel Attacks and Simulators Si Gao, Elisabeth Oswald
2021/755 (PDF ) Tetrad: Actively Secure 4PC for Secure Training and Inference Nishat Koti, Arpita Patra, Rahul Rachuri, Ajith Suresh
2021/754 (PDF ) Privacy-Preserving Training of Tree Ensembles over Continuous Data Samuel Adams, Chaitali Choudhary, Martine De Cock, Rafael Dowsley, David Melanson, Anderson C. A. Nascimento, Davis Railsback, Jianwei Shen
2021/753 (PDF ) Anonymous Device Authorization for Cellular Networks Abida Haque, Varun Madathil, Bradley Reaves, Alessandra Scafuro
2021/752 (PDF ) Quantum Reduction of Finding Short Code Vectors to the Decoding Problem Thomas Debris-Alazard, Maxime Remaud, Jean-Pierre Tillich
2021/751 (PDF ) Grain-128AEADv2: Strengthening the Initialization Against Key Reconstruction Martin Hell, Thomas Johansson, Alexander Maximov, Willi Meier, Hirotaka Yoshida
2021/750 (PDF ) Appenzeller to Brie: Efficient Zero-Knowledge Proofs for Mixed-Mode Arithmetic and $\mathbb{Z}_{2^k}$ Carsten Baum, Lennart Braun, Alexander Munch-Hansen, Benoit Razet, Peter Scholl
2021/749 (PDF ) Three Halves Make a Whole? Beating the Half-Gates Lower Bound for Garbled Circuits Mike Rosulek, Lawrence Roy
2021/748 (PDF ) A Complete Characterization of Game-Theoretically Fair, Multi-Party Coin Toss Ke Wu, Gilad Asharov, Elaine Shi
2021/747 (PDF ) Elmo: Recursive Virtual Payment Channels for Bitcoin Aggelos Kiayias, Orfeas Stefanos Thyfronitis Litos
2021/746 (PDF ) What is All the FaaS About? - Remote Exploitation of FPGA-as-a-Service Platforms Nitin Pundir, Fahim Rahman, Farimah Farahmandi, Mark Tehranipoor
2021/745 (PDF ) Generic-Group Identity-Based Encryption: A Tight Impossibility Result Gili Schul-Ganz, Gil Segev
2021/743 (PDF ) Manta: a Plug and Play Private DeFi Stack Shumo Chu, Yu Xia, Zhenfei Zhang
2021/742 (PDF ) Conclave: A Collective Stake Pool Protocol Dimitris Karakostas, Aggelos Kiayias, Mario Larangeira
2021/740 (PDF ) The Boneh-Katz Transformation, Revisited: Pseudorandom/Obliviously-Samplable PKE from Lattices and Codes and Its Application Keita Xagawa
2021/739 (PDF ) A New Approach to Garbled Circuits Anasuya Acharya, Tomer Ashur, Efrat Cohen, Carmit Hazay, Avishay Yanai
2021/738 (PDF ) On the Impossibility of Purely Algebraic Signatures Nico Döttling, Dominik Hartmann, Dennis Hofheinz, Eike Kiltz, Sven Schäge, Bogdan Ursu
2021/737 (PDF ) GIFT-COFB is Tightly Birthday Secure with Encryption Queries Akiko Inoue, Kazuhiko Minematsu
2021/736 (PDF ) Adam in Private: Secure and Fast Training of Deep Neural Networks with Adaptive Moment Estimation Nuttapong Attrapadung, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Takahiro Matsuda, Ibuki Mishina, Hiraku Morita, Jacob C. N. Schuldt
2021/735 (PDF ) Side-Channel Protections for Picnic Signatures Diego F. Aranha, Sebastian Berndt, Thomas Eisenbarth, Okan Seker, Akira Takahashi, Luca Wilke, Greg Zaverucha
2021/734 (PDF ) Guarding the First Order: The Rise of AES Maskings Amund Askeland, Siemen Dhooghe, Svetla Nikova, Vincent Rijmen, Zhenda Zhang
2021/733 (PDF ) GenoPPML – a framework for genomic privacy-preserving machine learning Sergiu Carpov, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev
2021/732 (PDF ) Preimage Attacks on 4-round Keccak by Solving Multivariate Quadratic Systems Congming Wei, Chenhao Wu, Ximing Fu, Xiaoyang Dong, Kai He, Jue Hong, Xiaoyun Wang
2021/731 (PDF ) Pasta: A Case for Hybrid Homomorphic Encryption Christoph Dobraunig, Lorenzo Grassi, Lukas Helminger, Christian Rechberger, Markus Schofnegger, Roman Walch
2021/730 (PDF ) Mystique: Efficient Conversions for Zero-Knowledge Proofs with Applications to Machine Learning Chenkai Weng, Kang Yang, Xiang Xie, Jonathan Katz, Xiao Wang
2021/729 (PDF ) Improved Programmable Bootstrapping with Larger Precision and Efficient Arithmetic Circuits for TFHE Ilaria Chillotti, Damien Ligier, Jean-Baptiste Orfila, Samuel Tap
2021/728 (PDF ) Laconic Private Set Intersection and Applications Navid Alamati, Pedro Branco, Nico Döttling, Sanjam Garg, Mohammad Hajiabadi, Sihang Pu
2021/727 (PDF ) SoK: Privacy-Preserving Computing in the Blockchain Era Ghada Almashaqbeh, Ravital Solomon
2021/726 (PDF ) Asymmetric All-or-nothing Transforms Navid Nasr Esfahani, Douglas R. Stinson
2021/725 (PDF ) KEMTLS with Delayed Forward Identity Protection in (Almost) a Single Round Trip Felix Günther, Simon Rastikian, Patrick Towa, Thom Wiggers
2021/724 (PDF ) Tri-op redactable blockchains with block modification, removal, and insertion Mohammad Sadeq Dousti, Alptekin Küpçü
2021/723 (PDF ) Cache attack on MISTY1 Haopeng Fan, Wenhao Wang, Yongjuan Wang, Wenyu Zhang, Qingjun Yuan
2021/722 (PDF ) Chosen Ciphertext Secure Keyed Two-Level Homomorphic Encryption Yusaku Maeda, Koji Nuida
2021/721 (PDF ) Index Calculus Attacks on Hyperelliptic Jacobians with Effective Endomorphisms Sulamithe Tsakou, Sorina Ionica
2021/720 (PDF ) On Reverse Engineering Neural Network Implementation on GPU Łukasz Chmielewski, Léo Weissbart
2021/719 (PDF ) Enhancing Differential-Neural Cryptanalysis Zhenzhen Bao, Jian Guo, Meicheng Liu, Li Ma, Yi Tu
2021/718 (PDF ) Will You Cross the Threshold for Me? - Generic Side-Channel Assisted Chosen-Ciphertext Attacks on NTRU-based KEMs Prasanna Ravi, Martianus Frederic Ezerman, Shivam Bhasin, Anupam Chattopadhyay, Sujoy Sinha Roy
2021/717 (PDF ) Explain Some Noise: Ablation Analysis for Deep Learning-based Physical Side-channel Analysis Lichao Wu, Yoo-Seung Won, Dirmanto Jap, Guilherme Perin, Shivam Bhasin, Stjepan Picek
2021/716 (PDF ) SSE and SSD: Page-Efficient Searchable Symmetric Encryption Angèle Bossuat, Raphael Bost, Pierre-Alain Fouque, Brice Minaud, Michael Reichle
2021/715 (PDF ) Hours of Horus: Keyless Cryptocurrency Wallets Dionysis Zindros
2021/714 (PDF ) CARiMoL: A Configurable Hardware Accelerator for Ringand Module Lattice-Based Post-Quantum Cryptography Afifa Ishtiaq, Dr. Muhammad Shafique, Dr. Osman Hassan
2021/713 (PDF ) Public Key Encryption with Flexible Pattern Matching Élie Bouscatié, Guilhem Castagnos, Olivier Sanders
2021/712 (PDF ) DEFAULT: Cipher Level Resistance Against Differential Fault Attack Anubhab Baksi, Shivam Bhasin, Jakub Breier, Mustafa Khairallah, Thomas Peyrin, Sumanta Sarkar, Siang Meng Sim
2021/711 (PDF ) The Matrix Reloaded: Multiplication Strategies in FrodoKEM Joppe W. Bos, Maximilian Ofner, Joost Renes, Tobias Schneider, Christine van Vredendaal
2021/710 (PDF ) VOProof: Efficient zkSNARKs from Vector Oracle Compilers Yuncong Zhang, Alan Szepieniec, Ren Zhang, Shi-Feng Sun, Geng Wang, Dawu Gu
2021/709 (PDF ) Bounded Collusion ABE for TMs from IBE Rishab Goyal, Ridwan Syed, Brent Waters
2021/708 (PDF ) Anonymous, Robust Post-Quantum Public Key Encryption Paul Grubbs, Varun Maram, Kenneth G. Paterson
2021/707 (PDF ) Lattice Enumeration for Tower NFS: a 521-bit Discrete Logarithm Computation Gabrielle De Micheli, Pierrick Gaudry, Cécile Pierrot
2021/706 (PDF ) Cryptanalysis of an oblivious PRF from supersingular isogenies Andrea Basso, Péter Kutas, Simon-Philipp Merz, Christophe Petit, Antonio Sanso
2021/705 (PDF ) Bridging Machine Learning and Cryptanalysis via EDLCT Yi Chen, Hongbo Yu
2021/704 (PDF ) IBM Digital Health Pass Whitepaper: A Privacy-Respectful Platform for Proving Health Status Elli Androulaki, Ilie Circiumaru, Jesus Diaz Vico, Miguel Prada, Alessandro Sorniotti, Marc Stoecklin, Marko Vukolic, Marie Wallace
2021/703 (PDF ) Quantum Multi-Collision Distinguishers Zhenzhen Bao, Jian Guo, Shun Li, Phuong Pham
2021/702 (PDF ) Symmetric Key Exchange with Full Forward Security and Robust Synchronization Colin Boyd, Gareth T. Davies, Bor de Kock, Kai Gellert, Tibor Jager, Lise Millerjord
2021/701 (PDF ) Multidimentional ModDiv public key exchange protocol Samir Bouftass
2021/700 (PDF ) DeCSIDH: Delegating isogeny computations in the CSIDH setting Robi Pedersen
2021/699 (PDF ) Radical Isogenies on Montgomery Curves Hiroshi Onuki, Tomoki Moriya
2021/698 (PDF ) Multi-Dimensional Sub/Super-Range Signatures Masahito Ishizaka, Shinsaku Kiyomoto
2021/697 (PDF ) GoAT: File Geolocation via Anchor Timestamping Deepak Maram, Iddo Bentov, Mahimna Kelkar, Ari Juels
2021/696 (PDF ) The "quantum annoying" property of password-authenticated key exchange protocols Edward Eaton, Douglas Stebila
2021/695 (PDF ) Adaptively Secure Lattice-based Revocable IBE in the QROM: Compact Parameters, Tight Security, and Anonymity Atsushi Takayasu
2021/694 (PDF ) On Interactive Oracle Proofs for Boolean R1CS Statements Ignacio Cascudo, Emanuele Giunta
2021/693 (PDF ) Hardware Penetration Testing Knocks Your SoCs Off Mark Fischer, Fabian Langer, Johannes Mono, Clemens Nasenberg, Nils Albartus
2021/692 (PDF ) Shorter Signatures Based on Tailor-Made Minimalist Symmetric-Key Crypto Christoph Dobraunig, Daniel Kales, Christian Rechberger, Markus Schofnegger, Greg Zaverucha
2021/691 (PDF ) General Bootstrapping Approach for RLWE-based Homomorphic Encryption Andrey Kim, Maxim Deryabin, Jieun Eom, Rakyong Choi, Yongwoo Lee, Whan Ghang, Donghoon Yoo
2021/690 (PDF ) On Communication Models and Best-Achievable Security in Two-Round MPC Aarushi Goel, Abhishek Jain, Manoj Prabhakaran, Rajeev Raghunath
2021/689 (PDF ) OSHA: A General-purpose and Next Generation One-way Secure Hash Algorithm Ripon Patgiri
2021/688 (PDF ) Statistical ZAPs from Group-Based Assumptions Geoffroy Couteau, Shuichi Katsumata, Elahe Sadeghi, Bogdan Ursu
2021/687 (PDF ) Towards Understanding Practical Randomness Beyond Noise: Differential Privacy and Mixup Hanshen Xiao, Srinivas Devadas
2021/686 (PDF ) Meteor: Cryptographically Secure Steganography for Realistic Distributions Gabriel Kaptchuk, Tushar M. Jois, Matthew Green, Aviel Rubin
2021/685 (PDF ) Blind Side-Channel SIFA Melissa Azouaoui, Kostas Papagiannopoulos, Dominik Zürner
2021/684 (PDF ) Tight Setup Bounds for Identifiable Abort Nicholas Brandt
2021/683 (PDF ) S2Dedup: SGX-enabled Secure Deduplication Tânia Esteves, Mariana Miranda, João Paulo, Bernardo Portela
2021/682 (PDF ) Batching Base Oblivious Transfers Ian McQuoid, Mike Rosulek, Lawrence Roy
2021/681 (PDF ) Learnability of Multiplexer PUF and $S_N$-PUF : A Fourier-based Approach Durba Chatterjee, Debdeep Mukhopadhyay, Aritra Hazra
2021/679 (PDF ) Permutation Based EDM: An Inverse Free BBB Secure PRF Avijit Dutta, Mridul Nandi, Suprita Talnikar
2021/678 (PDF ) Faster indifferentiable hashing to elliptic $\mathbb{F}_{\!q^2}$-curves Dmitrii Koshelev
2021/677 (PDF ) Generalized Galbraith's Test: Characterization and Applications to Anonymous IBE Schemes Paul Cotan, George Teseleanu
2021/676 (PDF ) Extending the GLS endomorphism to speed up GHS Weil descent using Magma Jesús-Javier Chi-Domínguez, Francisco Rodríguez-Henríquez, Benjamin Smith
2021/675 (PDF ) 3-round Feistel is Not Superpseudorandom Over Any Group Hector B. Hougaard
2021/674 (PDF ) On the Effect of the Key-expansion Algorithm in Simon-like Ciphers Jinyu Lu, Yunwen Liu, Tomer Ashur, Chao Li
2021/673 (PDF ) zkCNN: Zero Knowledge Proofs for Convolutional Neural Network Predictions and Accuracy Tianyi Liu, Xiang Xie, Yupeng Zhang
2021/672 (PDF ) PQC: R-Propping a Chaotic Cellular Automata Pedro Hecht
2021/671 (PDF ) Multi-Threshold Byzantine Fault Tolerance Atsuki Momose, Ling Ren
2021/670 (PDF ) AOT: Anonymization by Oblivious Transfer Farid Javani, Alan T. Sherman
2021/669 (PDF ) Pravuil: Global Consensus for a United World David Cerezo Sánchez
2021/668 (PDF ) Grover on SM3 Gyeongju Song, Kyungbae Jang, Hyunji Kim, Wai-Kong Lee, Zhi Hu, Hwajeong Seo
2021/667 (PDF ) Optimized Implementation of SM4 on AVR Microcontrollers, RISC-V Processors, and ARM Processors Hyeokdong Kwon, Hyunjun Kim, Siwoo Eum, Minjoo Sim, Hyunji Kim, Wai-Kong Lee, Zhi Hu, Hwajeong Seo
2021/666 (PDF ) Secure cloud-of-clouds storage with space-efficient secret sharing Ahad Niknia, Miguel Correia, Jaber Karimpour
2021/665 (PDF ) On the algebraic immunity of direct sum constructions Pierrick Méaux
2021/664 (PDF ) A Trustless GQ Multi-Signature Scheme with Identifiable Abort Handong Cui, Tsz Hon Yuen
2021/663 (PDF ) On the Design and Misuse of Microcoded (Embedded) Processors — A Cautionary Note Nils Albartus, Clemens Nasenberg, Florian Stolz, Marc Fyrbiak, Christof Paar, Russell Tessier
2021/662 (PDF ) Verifying Post-Quantum Signatures in 8 kB of RAM Ruben Gonzalez, Andreas Hülsing, Matthias J. Kannwischer, Juliane Krämer, Tanja Lange, Marc Stöttinger, Elisabeth Waitz, Thom Wiggers, Bo-Yin Yang
2021/661 (PDF ) Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives Ling Sun, Wei Wang, Meiqin Wang
2021/660 (PDF ) A Permissionless Proof-of-Stake Blockchain with Best-Possible Unpredictability Lei Fan, Jonathan Katz, Phuc Thai, Hong-Sheng Zhou
2021/659 (PDF ) Technical report: CoPHEE: Co-processor forPartially Homomorphic Encrypted Execution Mohammed Nabeel, Mohammed Ashraf, Eduardo Chielle, Nektarios G. Tsoutsos, Michail Maniatakos
2021/658 (PDF ) A Practical Adaptive Key Recovery Attack on the LGM (GSW-like) Cryptosystem Prastudy Fauzi, Martha Norberg Hovd, Håvard Raddum
2021/657 (PDF ) Locally Reconstructable Non-malleable Secret Sharing Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar, Jenit Tomy
2021/656 (PDF ) Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule: Applications to Boomerangs in SKINNY and ForkSkinny Lingyue Qin, Xiaoyang Dong, Xiaoyun Wang, Keting Jia, Yunwen Liu
2021/655 (PDF ) On the Effect of Projection on Rank Attacks in Multivariate Cryptography Morten Øygarden, Daniel Smith-Tone, Javier Verbel
2021/654 (PDF ) Non-Interactive, Secure Verifiable Aggregation for Decentralized, Privacy-Preserving Learning Carlo Brunetta, Georgia Tsaloli, Bei Liang, Gustavo Banegas, Aikaterini Mitrokotsa
2021/653 (PDF ) Smooth Zero-Knowledge Hash Functions Behzad Abdolmaleki, Hamidreza Khoshakhlagh, Helger Lipmaa
2021/652 (PDF ) Detector+: An Approach for Detecting, Isolating, and Preventing Timing Attacks Arsalan Javeed, Cemal Yilmaz, Erkay Savas
2021/651 (PDF ) Leo: A Programming Language for Formally Verified, Zero-Knowledge Applications Collin Chin, Howard Wu, Raymond Chu, Alessandro Coglio, Eric McCarthy, Eric Smith
2021/650 (PDF ) Structured Leakage and Applications to Cryptographic Constant-Time and Cost Gilles Barthe, Benjamin Gregoire, Vincent Laporte, Swarn Priya
2021/649 (PDF ) On the Algebraic Immunity - Resiliency trade-off, implications for Goldreich's Pseudorandom Generator Aurélien Dupin, Pierrick Méaux, Mélissa Rossi
2021/648 (PDF ) Security of COFB against Chosen Ciphertext Attacks Mustafa Khairallah
2021/647 (PDF ) privateDH: An Enhanced Diffie-Hellman Key-Exchange Protocol using RSA and AES Algorithm Ripon Patgiri
2021/646 (PDF ) Optimization of Advanced Encryption Standard on Graphics Processing Units Cihangir Tezcan
2021/645 (PDF ) Legendre PRF (Multiple) Key Attacks and the Power of Preprocessing Alexander May, Floyd Zweydinger
2021/644 (PDF ) Cryptanalysis of Semidirect Product Key Exchange Using Matrices Over Non-Commutative Rings Christopher Battarbee, Delaram Kahrobaei, Siamak F. Shahandashti
2021/643 (PDF ) On MILP-based Automatic Search for Bit-Based Division Property for Ciphers with (large) Linear Layers Muhammad ElSheikh, Amr M. Youssef
2021/642 (PDF ) On the Cryptographic Deniability of the Signal Protocol Nihal Vatandas, Rosario Gennaro, Bertrand Ithurburn, Hugo Krawczyk
2021/641 (PDF ) Hydra: Succinct Fully Pipelineable Interactive Arguments of Knowledge William Zhang, Yu Xia
2021/640 (PDF ) Security and Trust in Open Source Security Tokens Marc Schink, Alexander Wagner, Florian Unterstein, Johann Heyszl
2021/639 (PDF ) Indifferentiable Signatures: High Performance and Fallback Security Charalampos Papamanthou, Cong Zhang, Hong-Sheng Zhou
2021/638 (PDF ) Efficient Constructions of Pairing Based Accumulators Ioanna Karantaidou, Foteini Baldimtsi
2021/637 (PDF ) Doubly-Affine Extractors, and their Applications Yevgeniy Dodis, Kevin Yeo
2021/636 (PDF ) Communication Complexity of Private simultaneous Quantum Messages Protocols Akinori Kawachi, Harumichi Nishimura
2021/635 (PDF ) symKrypt: A General-purpose and Lightweight Symmetric-Key Cryptography Ripon Patgiri
2021/634 (PDF ) Setting Up Efficient TFHE Parameters for Multivalue Plaintexts and Multiple Additions Jakub Klemsa
2021/633 (PDF ) CTIDH: faster constant-time CSIDH Gustavo Banegas, Daniel J. Bernstein, Fabio Campos, Tung Chou, Tanja Lange, Michael Meyer, Benjamin Smith, Jana Sotáková
2021/632 (PDF ) Internet Computer Consensus Jan Camenisch, Manu Drijvers, Timo Hanke, Yvonne-Anne Pignolet, Victor Shoup, Dominic Williams
2021/631 (PDF ) SwapCT: Swap Confidential Transactions for Privacy-Preserving Multi-Token Exchanges Felix Engelmann, Lukas Müller, Andreas Peter, Frank Kargl, Christoph Bösch
2021/630 (PDF ) Non-Interactive CCA2-Secure Threshold Cryptosystems: Achieving Adaptive Security in the Standard Model Without Pairings Julien Devevey, Benoît Libert, Khoa Nguyen, Thomas Peters, Moti Yung
2021/629 (PDF ) SoK: How private is Bitcoin? Classification and Evaluation of Bitcoin Mixing Techniques Simin Ghesmati, Walid Fdhila, Edgar Weippl
2021/628 (PDF ) The Availability-Accountability Dilemma and its Resolution via Accountability Gadgets Joachim Neu, Ertem Nusret Tas, David Tse
2021/627 (PDF ) VeRSA: Verifiable Registries with Efficient Client Audits from RSA Authenticated Dictionaries Nirvan Tyagi, Ben Fisch, Andrew Zitek, Joseph Bonneau, Stefano Tessaro
2021/626 (PDF ) Help, my Signal has bad Device! Breaking the Signal Messenger’s Post-CompromiseSecurity through a Malicious Device Jan Wichelmann, Sebastian Berndt, Claudius Pott, Thomas Eisenbarth
2021/625 (PDF ) Plactic key agreement (insecure?) Daniel R. L. Brown
2021/624 (PDF ) Group Structure in Correlations and its Applications in Cryptography Guru-Vamsi Policharla, Manoj Prabhakaran, Rajeev Raghunath, Parjanya Vyas
2021/623 (PDF ) Mining in Logarithmic Space Aggelos Kiayias, Nikos Leonardos, Dionysis Zindros
2021/622 (PDF ) Stealth: A Highly Secured End-to-End Symmetric Communication Protocol Ripon Patgiri, Naresh Babu Muppalaneni
2021/621 (PDF ) R-SWAP: Relay based atomic cross-chain swap protocol Léonard Lys, Arthur Micoulet, Maria Potop-Butucaru
2021/620 (PDF ) Algebraic attacks on block ciphers using quantum annealing Elżbieta Burek, Michał Misztal, Michał Wroński
2021/619 (PDF ) Polar Coding for Ring-LWE-Based Public Key Encryption Jiabo Wang, Cong Ling
2021/618 (PDF ) Quantum Secure Privacy Preserving Technique to Obtain the Intersection of Two Datasets for Contact Tracing Sumit Kumar Debnath, Vikas Srivastava, Tapaswini Mohanty, Nibedita Kundu, Kouichi Sakurai
2021/617 (PDF ) Quantum Encryption with Certified Deletion, Revisited: Public Key, Attribute-Based, and Classical Communication Taiga Hiroka, Tomoyuki Morimae, Ryo Nishimaki, Takashi Yamakawa
2021/616 (PDF ) An Efficient and Generic Construction for Signal's Handshake (X3DH): Post-Quantum, State Leakage Secure, and Deniable Keitaro Hashimoto, Shuichi Katsumata, Kris Kwiatkowski, Thomas Prest
2021/615 (PDF ) A Tutorial on Concurrent Zero Knowledge Rafael Pass
2021/614 (PDF ) Unprovability of Leakage-Resilient Cryptography Beyond the Information-Theoretic Limit Rafael Pass
2021/613 (PDF ) Attribute-Based Conditional Proxy Re-Encryption in the Standard Model under LWE Xiaojian Liang, Jian Weng, Anjia Yang, Lisha Yao, Zike Jiang, Zhenghao Wu
2021/612 (PDF ) Privacy-preserving Density-based Clustering Beyza Bozdemir, Sébastien Canard, Orhan Ermis, Helen Möllering, Melek Önen, Thomas Schneider
2021/611 (PDF ) Some Applications of Hamming Weight Correlations Fatih Balli, Andrea Caforio, Subhadeep Banik
2021/610 (PDF ) A Weighted Bit Flipping Decoder for QC-MDPC-based Cryptosystems Alexander Nilsson, Irina E. Bocharova, Boris D. Kudryashov, Thomas Johansson
2021/609 (PDF ) FairMM: A Fast and Frontrunning-Resistant Crypto Market-Maker Michele Ciampi, Muhammad Ishaq, Malik Magdon-Ismail, Rafail Ostrovsky, Vassilis Zikas
2021/608 (PDF ) Layering diverse cryptography to lower risks of future and secret attacks: post-quantum estimates Daniel R. L. Brown
2021/607 (PDF ) Signed (Group) Diffie-Hellman Key Exchange with Tight Security Jiaxin Pan, Chen Qian, Magnus Ringerud
2021/606 (PDF ) ZK-PCPs from Leakage-Resilient Secret Sharing Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss
2021/605 (PDF ) On the Randomness Complexity of Interactive Proofs and Statistical Zero-Knowledge Proofs Benny Applebaum, Eyal Golombek
2021/604 (PDF ) Masked Triples: Amortizing Multiplication Triples across Conditionals David Heath, Vladimir Kolesnikov, Stanislav Peceny
2021/603 (PDF ) Making Synchronous BFT Protocols Secure in the Presence of Mobile Sluggish Faults Justin Kim, Vandan Mehta, Kartik Nayak, Nibesh Shrestha
2021/602 (PDF ) Autonomous Secure Remote Attestation even when all Used and to be Used Digital Keys Leak Marten van Dijk, Deniz Gurevin, Chenglu Jin, Omer Khan, Phuong Ha Nguyen
2021/601 (PDF ) The Art of Labeling: Task Augmentation for Private(Collaborative) Learning on Transformed Data Hanshen Xiao, Srinivas Devadas
2021/600 (PDF ) Subfield Algorithms for Ideal- and Module-SVP Based on the Decomposition Group Christian Porter, Andrew Mendelsohn, Cong Ling
2021/599 (PDF ) Hyperproofs: Aggregating and Maintaining Proofs in Vector Commitments Shravan Srinivasan, Alexander Chepurnoy, Charalampos Papamanthou, Alin Tomescu, Yupeng Zhang
2021/598 (PDF ) Proof of Assets in the Diem Blockchain Panagiotis Chatzigiannis, Konstantinos Chalkias
2021/597 (PDF ) Accelerated RISC-V for Post-Quantum SIKE Rami Elkhatib, Reza Azarderakhsh, Mehran Mozaffari-Kermani
2021/596 (PDF ) Mutual Accountability Layer: Accountable Anonymity within Accountable Trust Vanesa Daza, Abida Haque, Alessandra Scafuro, Alexandros Zacharakis, Arantxa Zapico
2021/595 (PDF ) Securing Parallel-chain Protocols under Variable Mining Power Xuechao Wang, Viswa Virinchi Muppirala, Lei Yang, Sreeram Kannan, Pramod Viswanath
2021/594 (PDF ) Zero Knowledge Contingent Payments for Trained Neural Networks Zhelei Zhou, Xinlei Cao, Jian Liu, Bingsheng Zhang, Kui Ren
2021/593 (PDF ) Differentially Oblivious Database Joins: Overcoming the Worst-Case Curse of Fully Oblivious Algorithms Shumo Chu, Danyang Zhuo, Elaine Shi, T-H. Hubert Chan
2021/592 (PDF ) Side Channel Analysis against the ANSSI’s protected AES implementation on ARM Loïc Masure, Rémi Strullu
2021/591 (PDF ) Automated Detection of Side Channels in Cryptographic Protocols: DROWN the ROBOTs! Jan Peter Drees, Pritha Gupta, Eyke Hüllermeier, Tibor Jager, Alexander Konze, Claudia Priesterjahn, Arunselvan Ramaswamy, Juraj Somorovsky
2021/590 (PDF ) An Algebraic Framework for Universal and Updatable SNARKs Carla Ràfols, Arantxa Zapico
2021/589 (PDF ) White-Box Encryption Scheme Using a Quantum Memory Hidenori Kuwakado, Shoichi Hirose, Masahiro Mambo
2021/588 (PDF ) A Novel Proof of Shuffle: Exponentially Secure Cut-and-Choose Thomas Haines, Johannes Mueller
2021/587 (PDF ) PrORAM: Fast $O(\log n)$ Private Coin ZK ORAM David Heath, Vladimir Kolesnikov
2021/586 (PDF ) A New Approach for finding Low-Weight Polynomial Multiples Laila El Aimani
2021/585 (PDF ) Exact Lattice Sampling from Non-Gaussian Distributions Maxime Plançon, Thomas Prest
2021/584 (PDF ) Effects of Quantization on the Multiple-Round Secret-Key Capacity Onur Gunlu, Ueli Maurer, Joao Ribeiro
2021/583 (PDF ) Entropoids: Groups in Disguise Lorenz Panny
2021/582 (PDF ) ethSTARK Documentation StarkWare
2021/581 (PDF ) Breaking CAS-Lock and Its Variants by Exploiting Structural Traces Abhrajit Sengupta, Nimisha Limaye, Ozgur Sinanoglu
2021/580 (PDF ) Lightweight, Maliciously Secure Verifiable Function Secret Sharing Leo de Castro, Antigoni Polychroniadou
2021/579 (PDF ) Quantum Key-length Extension Joseph Jaeger, Fang Song, Stefano Tessaro
2021/578 (PDF ) Cryptanalytic Applications of the Polynomial Method for Solving Multivariate Equation Systems over GF(2) Itai Dinur
2021/577 (PDF ) Soft Power: Upgrading Chain Macroeconomic Policy Through Soft Forks Dionysis Zindros
2021/576 (PDF ) Prio+: Privacy Preserving Aggregate Statistics via Boolean Shares Surya Addanki, Kevin Garbe, Eli Jaffe, Rafail Ostrovsky, Antigoni Polychroniadou
2021/575 (PDF ) Superposition Meet-in-the-Middle Attacks: Updates on Fundamental Security of AES-like Hashing Zhenzhen Bao, Jian Guo, Danping Shi, Yi Tu
2021/574 (PDF ) Constructing More Quadratic APN Functions with the QAM Method Yuyin Yu, Leo Perrin
2021/573 (PDF ) Compactness of Hashing Modes and Efficiency beyond Merkle Tree Elena Andreeva, Rishiraj Bhattacharyya, Arnab Roy
2021/572 (PDF ) Sine Series Approximation of the Mod Function for Bootstrapping of Approximate HE Charanjit Singh Jutla, Nathan Manohar
2021/571 (PDF ) Post-Quantum Cryptography: Computational-Hardness Assumptions and Beyond Thomas Attema, Nicole Gervasoni, Michiel Marcus, Gabriele Spini
2021/570 (PDF ) Lattice sieving via quantum random walks André Chailloux, Johanna Loyer
2021/569 (PDF ) Automated Generation of Masked Hardware David Knichel, Amir Moradi, Nicolai Müller, Pascal Sasdrich
2021/568 (PDF ) ReTRACe: Revocable and Traceable Blockchain Rewrites using Attribute-based Cryptosystems Gaurav Panwar, Roopa Vishwanathan, Satyajayant Misra
2021/567 (PDF ) Forward-secure Multi-user Aggregate Signatures based on zk-SNARKs Jeonghyuk Lee, Jihye Kim, Hyunok Oh
2021/566 (PDF ) From Random Oracles to Ideal Signatures, and Back Cong Zhang, Hong-Sheng Zhou
2021/565 (PDF ) The return of Eratosthenes: Secure Generation of RSA Moduli using Distributed Sieving Cyprien Delpech de Saint Guilhem, Eleftheria Makri, Dragos Rotaru, Titouan Tanguy
2021/564 (PDF ) SMILE: Set Membership from Ideal Lattices with Applications to Ring Signatures and Confidential Transactions Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler
2021/563 (PDF ) High-Speed NTT-based Polynomial Multiplication Accelerator for CRYSTALS-Kyber Post-Quantum Cryptography Mojtaba Bisheh-Niasar, Reza Azarderakhsh, Mehran Mozaffari-Kermani
2021/562 (PDF ) A fusion algorithm for solving the hidden shift problem in finite abelian groups Wouter Castryck, Ann Dooms, Carlo Emerencia, Alexander Lemmens
2021/561 (PDF ) Kyber on ARM64: Compact Implementations of Kyber on 64-bit ARM Cortex-A Processors Pakize Sanal, Emrah Karagoz, Hwajeong Seo, Reza Azarderakhsh, Mehran Mozaffari-Kermani
2021/560 (PDF ) MOBS (Matrices Over Bit Strings) public key exchange Nael Rahman, Vladimir Shpilrain
2021/559 (PDF ) A Fresh Approach to Updatable Symmetric Encryption Andrés Fabrega, Ueli Maurer, Marta Mularczyk
2021/558 (PDF ) Verifiable Decryption in the Head Kristian Gjøsteen, Thomas Haines, Johannes Müller, Peter Rønne, Tjerand Silde
2021/557 (PDF ) Dual lattice attacks for closest vector problems (with preprocessing) Thijs Laarhoven, Michael Walter
2021/556 (PDF ) Interactive Physical ZKP for Connectivity:Applications to Nurikabe and Hitori Leo Robert, Daiki Miyahara, Pascal Lafourcade, Takaaki Mizuk
2021/555 (PDF ) Neural-Network-Based Modeling Attacks on XOR Arbiter PUFs Revisited Nils Wisiol, Bipana Thapaliya, Khalid T. Mursi, Jean-Pierre Seifert, Yu Zhuang
2021/554 (PDF ) Grover on Caesar and Vigenère Ciphers Gyeongju Song, Kyungbae Jang, Hyunji Kim, Wai-Kong Lee, Hwajeong Seo
2021/553 (PDF ) PARASITE: PAssword Recovery Attack against Srp Implementations in ThE wild Daniel De Almeida Braga, Pierre-Alain Fouque, Mohamed Sabt
2021/552 (PDF ) Classical and Quantum algorithms for generic Syndrome Decoding problems and applications to the Lee metric André Chailloux, Thomas Debris-Alazard, Simona Etinski
2021/551 (PDF ) Efficient Sorting of Homomorphic Encrypted Data with $k$-way Sorting Network Seungwan Hong, Seunghong Kim, Jiheon Choi, Younho Lee, Jung Hee Cheon
2021/550 (PDF ) Quadratic almost bent functions - their partial characterization and design in the spectral domain Amar Bapić, Samir Hodžić, Enes Pasalic
2021/549 (PDF ) High-assurance field inversion for curve-based cryptography Benjamin Salling Hvass, Diego F. Aranha, Bas Spitters
2021/548 (PDF ) Secure Computation by Secret Sharing Using Input Encrypted with Random Number (Full Paper) Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal
2021/547 (PDF ) Cube Attack against 843-Round Trivium Yao Sun
2021/546 (PDF ) Distinguishing and Key Recovery Attacks on the Reduced-Round SNOW-V and SNOW-Vi Jin Hoki, Takanori Isobe, Ryoma Ito, Fukang Liu, Kosei Sakamoto
2021/545 (PDF ) MatRiCT+: More Efficient Post-Quantum Private Blockchain Payments Muhammed F. Esgin, Ron Steinfeld, Raymond K. Zhao
2021/544 (PDF ) Improved guess-and-determine and distinguishing attacks on SNOW-V Jing Yang, Thomas Johansson, Alexander Maximov
2021/543 (PDF ) The Case for SIKE: A Decade of the Supersingular Isogeny Problem Craig Costello
2021/542 (PDF ) Symetric encryption algorithms based on the mathematical structure underlying the three body problem Samir Bouftass.
2021/541 (PDF ) Hardware Deployment of Hybrid PQC Reza Azarderakhsh, Rami El Khatib, Brian Koziel, Brandon Langenberg
2021/540 (PDF ) Efficient Range Proofs with Transparent Setup from Bounded Integer Commitments Geoffroy Couteau, Michael Klooß, Huang Lin, Michael Reichle
2021/539 (PDF ) More Efficient Adaptively Secure Revocable Hierarchical Identity-based Encryption with Compact Ciphertexts: Achieving Shorter Keys and Tighter Reductions Atsushi Takayasu
2021/538 (PDF ) A Composable Look at Updatable Encryption Françoise Levy-dit-Vehel, Maxime Roméas
2021/537 (PDF ) SoK: Exploring Blockchains Interoperability Gang Wang
2021/535 (PDF ) On the Possibility of Basing Cryptography on $\EXP \neq \BPP$ Yanyi Liu, Rafael Pass
2021/534 (PDF ) Splitting authentication codes with perfect secrecy: new results, constructions and connections with algebraic manipulation detection codes Maura B. Paterson, Douglas R. Stinson
2021/533 (PDF ) CryptGPU: Fast Privacy-Preserving Machine Learning on the GPU Sijun Tan, Brian Knott, Yuan Tian, David J. Wu
2021/532 (PDF ) Rainbow on Cortex-M4 Tung Chou, Matthias J. Kannwischer, Bo-Yin Yang
2021/531 (PDF ) LogStack: Stacked Garbling with $O(b \log b)$ Computation David Heath, Vladimir Kolesnikov
2021/530 (PDF ) Pre-silicon Architecture Correlation Analysis (PACA): Identifying and Mitigating the Source of Side-channel Leakage at Gate-level Yuan Yao, Tuna Tufan, Tarun Kathuria, Baris Ege, Ulkuhan Guler, Patrick Schaumont
2021/529 (PDF ) SnarkPack: Practical SNARK Aggregation Nicolas Gailly, Mary Maller, Anca Nitulescu
2021/528 (PDF ) Verified Multiple-Time Signature Scheme from One-Time Signatures and Timestamping Denis Firsov, Henri Lakk, Ahto Truu
2021/527 (PDF ) Practical solving of discrete logarithm problem over prime fields using quantum annealing Michał Wroński
2021/526 (PDF ) Reinforcement Learning-based Design of Side-channel Countermeasures Jorai Rijsdijk, Lichao Wu, Guilherme Perin
2021/525 (PDF ) On the Importance of Pooling Layer Tuning for Profiling Side-channel Analysis Lichao Wu, Guilherme Perin
2021/524 (PDF ) Decentralized Multi-Client Functional Encryption for Set Intersection with Improved Efficiency Kwangsu Lee
2021/523 (PDF ) No Time to Hash: On Super Efficient Entropy Accumulation Yevgeniy Dodis, Siyao Guo, Noah Stephens-Davidowitz, Zhiye Xie
2021/522 (PDF ) Public-key Cryptosystems and Signature Schemes from p-adic Lattices Yingpu Deng, Lixia Luo, Yanbin Pan, Zhaonan Wang, Guanju Xiao
2021/521 (PDF ) Improved Circuit Compilation for Hybrid MPC via Compiler Intermediate Representation Daniel Demmler, Stefan Katzenbeisser, Thomas Schneider, Tom Schuster, Christian Weinert
2021/520 (PDF ) Optimal Randomized Partial Checking for Decryption Mix Nets Thomas Haines, Johannes Mueller
2021/519 (PDF ) Cryptanalysis of Izza et al.'s Protocol: An Enhanced Scalable and Secure RFID Authentication Protocol for WBAN Within An IoT Environment Atakan Arslan, Muhammed Ali Bingöl
2021/518 (PDF ) How to Share and Own a Secret Victor Ermolaev, Gamze Tillem
2021/517 (PDF ) Cryptography from Sublinear-Time Average-Case Hardness of Time-Bounded Kolmogorov Complexity Yanyi Liu, Rafael Pass
2021/515 (PDF ) Generic Constructions of Revocable Hierarchical Identity-based Encryption Keita Emura, Atsushi Takayasu, Yohei Watanabe
2021/514 (PDF ) Non-Interactive Zero Knowledge from Sub-exponential DDH Abhishek Jain, Zhengzhong Jin
2021/513 (PDF ) On One-way Functions from NP-Complete Problems Yanyi Liu, Rafael Pass
2021/512 (PDF ) Chosen Ciphertext Secure Functional Encryption from Constrained Witness PRF Tapas Pal, Ratna Dutta
2021/511 (PDF ) What Makes Fiat--Shamir zkSNARKs (Updatable SRS) Simulation Extractable? Chaya Ganesh, Hamidreza Khoshakhlagh, Markulf Kohlweiss, Anca Nitulescu, Michal Zajac
2021/510 (PDF ) Signer and Message Ambiguity from a Variety of Keys George Teseleanu
2021/509 (PDF ) On using the same key pair for Ed25519 and an X25519 based KEM Erik Thormarker
2021/508 (PDF ) Over 100x Faster Bootstrapping in Fully Homomorphic Encryption through Memory-centric Optimization with GPUs Wonkyung Jung, Sangpyo Kim, Jung Ho Ahn, Jung Hee Cheon, Younho Lee
2021/507 (PDF ) The t-wise Independence of Substitution-Permutation Networks Tianren Liu, Stefano Tessaro, Vinod Vaikuntanathan
2021/506 (PDF ) Delegating Supersingular Isogenies over $\mathbb{F}_{p^2}$ with Cryptographic Applications Robi Pedersen, Osmanbey Uzunkol
2021/505 (PDF ) Cryptanalysis of Boyen’s Attribute-Based Encryption Scheme in TCC 2013 Shweta Agrawal, Rajarshi Biswas, Ryo Nishimaki, Keita Xagawa, Xiang Xie, Shota Yamada
2021/504 (PDF ) A Generic Method for Investigating Nonsingular Galois NFSRs Xiao-Juan Wang, Tian Tian, Wen-Feng Qi
2021/503 (PDF ) Almost-Asynchronous MPC under Honest Majority, Revisited Matthieu Rambaud, Antoine Urban
2021/502 (PDF ) A Generic Approach to Build Revocable Hierarchical Identity-Based Encryption Kwangsu Lee, Joon Sik Kim
2021/501 (PDF ) zkHawk: Practical Private Smart Contracts from MPC-based Hawk Aritra Banerjee, Michael Clear, Hitesh Tewari
2021/500 (PDF ) Order-C Secure Multiparty Computation for Highly Repetitive Circuits Gabrielle Beck, Aarushi Goel, Abhishek Jain, Gabriel Kaptchuk
2021/499 (PDF ) Optimizing Registration Based Encryption Kelong Cong, Karim Eldefrawy, Nigel P. Smart
2021/498 (PDF ) SoK: Multi-Device Secure Instant Messaging Antonio Dimeo, Felix Gohla, Daniel Goßen, Niko Lockenvitz
2021/497 (PDF ) SoK: Design Tools for Side-Channel-Aware Implementations IR Buhan, Lejla Batina, Yuval Yarom, Patrick Schaumont
2021/496 (PDF ) Applications of SKREM-like symmetric key ciphers Mircea Digulescu
2021/495 (PDF ) Hiding Data in Plain Sight: Towards Provably Unbreakable Encryption with Short Secret Keys and One-Way Functions Mircea Digulescu
2021/494 (PDF ) Key-Oblivious Encryption from isogenies and its application to Accountable Tracing Signatures. Surbhi Shaw, Ratna Dutta
2021/493 (PDF ) Optimizing BIKE for the Intel Haswell and ARM Cortex-M4 Ming-Shing Chen, Tung Chou, Markus Krausz
2021/492 (PDF ) Classic McEliece on the ARM Cortex-M4 Ming-Shing Chen, Tung Chou
2021/491 (PDF ) A toolbox for verifiable tally-hiding e-voting systems Véronique Cortier, Pierrick Gaudry, Quentin Yang
2021/490 (PDF ) Optimizing Bootstrapping and Evaluating Large FHE Gates in the LWE-based GSW-FHE Chao Liu, Anyu Wang, Zhongxiang Zheng
2021/488 (PDF ) Shorter Lattice-based Zero-Knowledge Proofs for the Correctness of a Shuffle Javier Herranz, Ramiro Martínez, Manuel Sánchez
2021/487 (PDF ) Xifrat Cryptanalysis - Compute the Mixing Function Without the Key "Danny" Niu Jianfang
2021/486 (PDF ) Security Analysis of End-to-End Encryption for Zoom Meetings Takanori Isobe, Ryoma Ito
2021/485 (PDF ) A Hardware Accelerator for Polynomial Multiplication Operation of CRYSTALS-KYBER PQC Scheme Ferhat Yaman, Ahmet Can Mert, Erdinç Öztürk, Erkay Savaş
2021/484 (PDF ) Efficient Scalable Multi-Party Private Set Intersection Using Oblivious PRF Alireza Kavousi, Javad Mohajeri, Mahmoud Salmasizadeh
2021/483 (PDF ) Masking Kyber: First- and Higher-Order Implementations Joppe W. Bos, Marc Gourjon, Joost Renes, Tobias Schneider, Christine van Vredendaal
2021/482 (PDF ) Inconsistency of Simulation and Practice in Delay-based Strong PUFs Anita Aghaie, Amir Moradi
2021/481 (PDF ) PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop Alexander Heinrich, Matthias Hollick, Thomas Schneider, Milan Stute, Christian Weinert
2021/480 (PDF ) Fast and Error-Free Negacyclic Integer Convolution using Extended Fourier Transform Jakub Klemsa
2021/479 (PDF ) Masked Accelerators and Instruction Set Extensions for Post-Quantum Cryptography Tim Fritzmann, Michiel Van Beirendonck, Debapriya Basu Roy, Patrick Karl, Thomas Schamberger, Ingrid Verbauwhede, Georg Sigl
2021/478 (PDF ) TurboIKOS: Improved Non-interactive Zero Knowledge and Post-Quantum Signatures Yaron Gvili, Julie Ha, Sarah Scheffler, Mayank Varia, Ziling Yang, Xinyuan Zhang
2021/477 (PDF ) Exploiting ROLLO's Constant-Time Implementations with a Single-Trace Analysis Agathe Cheriere, Lina Mortajine, Tania Richmond, Nadia El Mrabet
2021/476 (PDF ) Revisiting Lightweight Block Ciphers: Review, Taxonomy and Future directions Aaqib Bashir Dar, Mashhood Jeelani Lone, Nuzhat Hussain
2021/475 (PDF ) Private Liquidity Matching using MPC Shahla Atapoor, Nigel P. Smart, Younes Talibi Alaoui
2021/474 (PDF ) Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations Fukang Liu, Santanu Sarkar, Willi Meier, Takanori Isobe
2021/473 (PDF ) Cryptonomial: A Framework for Private Time-Series Polynomial Calculations Ryan Karl, Jonathan Takeshita, Alamin Mohammed, Aaron Striegel, Taeho Jung
2021/472 (PDF ) CryptoGram: Fast Private Calculations of Histograms over Multiple Users’ Inputs Ryan Karl, Jonathan Takeshita, Alamin Mohammed, Aaron Striegel, Taeho Jung
2021/471 (PDF ) Size, Speed, and Security: An Ed25519 Case Study Cesar Pereida García, Sampo Sovio
2021/470 (PDF ) Upslices, Downslices, and Secret-Sharing with Complexity of $1.5^n$ Benny Applebaum, Oded Nir
2021/469 (PDF ) Entropoid Based Cryptography Danilo Gligoroski
2021/468 (PDF ) Viaduct: An Extensible, Optimizing Compiler for Secure Distributed Programs (Technical Report) Coşku Acay, Rolph Recto, Joshua Gancher, Andrew C. Myers, Elaine Shi
2021/467 (PDF ) Key-schedule Security for the TLS 1.3 Standard Chris Brzuska, Antoine Delignat-Lavaud, Christoph Egger, Cédric Fournet, Konrad Kohbrok, Markulf Kohlweiss
2021/465 (PDF ) Cryptanalysis of `MAKE' Daniel Brown, Neal Koblitz, Jason LeGrow
2021/464 (PDF ) iTimed: Cache Attacks on the Apple A10 Fusion SoC Gregor Haas, Seetal Potluri, Aydin Aysu
2021/463 (PDF ) Improving Recent Side-Channel Attacks Against the DES Key Schedule Andreas Wiemers, Johannes Mittmann
2021/462 (PDF ) SoK: How (not) to Design and Implement Post-Quantum Cryptography James Howe, Thomas Prest, Daniel Apon
2021/461 (PDF ) Second-Order SCA Security with almost no Fresh Randomness Aein Rezaei Shahmirzadi, Amir Moradi
2021/460 (PDF ) Let’s Take it Offline: Boosting Brute-Force Attacks on iPhone’s User Authentication through SCA Oleksiy Lisovets, David Knichel, Thorben Moos, Amir Moradi
2021/459 (PDF ) SIRNN: A Math Library for Secure RNN Inference Deevashwer Rathee, Mayank Rathee, Rahul Kranti Kiran Goli, Divya Gupta, Rahul Sharma, Nishanth Chandran, Aseem Rastogi
2021/458 (PDF ) FAMILY KEY CRYPTOGRAPHY: Interchangeable Symmetric Keys; a Different Cryptographic Paradigm Gideon Samid
2021/457 (PDF ) Non-Interactive Composition of Sigma-Protocols via Share-then-Hash Masayuki Abe, Miguel Ambrona, Andrej Bogdanov, Miyako Ohkubo, Alon Rosen
2021/456 (PDF ) Hardening Circuit-Design IP Against Reverse-Engineering Attacks Animesh Chhotaray, Thomas Shrimpton
2021/455 (PDF ) Guessing Bits: Improved Lattice Attacks on (EC)DSA with Nonce Leakage Chao Sun, Thomas Espitau, Mehdi Tibouchi, Masayuki Abe
2021/454 (PDF ) Measure-Rewind-Measure: Tighter Quantum Random Oracle Model Proofs for One-Way to Hiding and CCA Security Veronika Kuchta, Amin Sakzad, Damien Stehle, Ron Steinfeld, Shi-Feng Sun
2021/453 (PDF ) Merkle^2: A Low-Latency Transparency Log System Yuncong Hu, Kian Hooshmand, Harika Kalidhindi, Seung Jin Yang, Raluca Ada Popa
2021/451 (PDF ) RepShard: Reputation-based Sharding Scheme Achieves Linearly Scaling Efficiency and Security Simultaneously Gang Wang
2021/450 (PDF ) RandChain: Practical Scalable Decentralized Randomness Attested by Blockchain Gang Wang, Mark Nixon
2021/449 (PDF ) Towards Cloud-assisted Industrial IoT Platform for Large-scale Continuous Condition Monitoring Gang Wang, Mark Nixon, Mike Boudreaux
2021/448 (PDF ) On the Memory-Tightness of Hashed ElGamal Ashrujit Ghoshal, Stefano Tessaro
2021/447 (PDF ) Explicit, Closed-form, General bounds for Cuckoo Hashing with a Stash Daniel Noble
2021/446 (PDF ) Towards practical GGM-based PRF from (Module-)Learning-with-Rounding Chitchanok Chuengsatiansup, Damien Stehle
2021/445 (PDF ) A Survey on Perfectly-Secure Verifiable Secret-Sharing Anirudh Chandramouli, Ashish Choudhury, Arpita Patra
2021/444 (PDF ) Xifrat - Compact Public-Key Cryptosystems based on Quasigroups Daniel Nager, "Danny" Niu Jianfang
2021/443 (PDF ) Constructing a pairing-free certificateless proxy signature scheme from ECDSA Cholun Kim
2021/442 (PDF ) How to Backdoor a Cipher Raluca Posteuca, Tomer Ashur
2021/441 (PDF ) Watermarking PRFs from Lattices: Public Extract and Collusion Resistant Yukun Wang, Mingqiang Wang
2021/440 (PDF ) Two modifications for Loidreau's code-based cryptosystem Wenshuo Guo, Fangwei Fu
2021/439 (PDF ) Recovering the Key from the Internal State of Grain-128AEAD Donghoon Chang, Meltem Sonmez Turan
2021/438 (PDF ) More Efficient Shuffle Argument from Unique Factorization Toomas Krips, Helger Lipmaa
2021/437 (PDF ) Formal security analysis of MPC-in-the-head zero-knowledge protocols Nikolaj Sidorenco, Sabine Oechsner, Bas Spitters
2021/436 (PDF ) Algebraic Differential Fault Analysis on SIMON block cipher Duc-Phong Le, Sze Ling Yeo, Khoongming Khoo
2021/435 (PDF ) Non-Interactive Anonymous Router Elaine Shi, Ke Wu
2021/434 (PDF ) On the Power of Expansion: More Efficient Constructions in the Random Probing Model Sonia Belaïd, Matthieu Rivain, Abdul Rahman Taleb
2021/433 (PDF ) Formations for the Quantum Random Oracle Aaram Yun
2021/432 (PDF ) XORBoost: Tree Boosting in the Multiparty Computation Setting Kevin Deforth, Marc Desgroseilliers, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev, Marius Vuille
2021/431 (PDF ) Unbounded Multi-Party Computation from Learning with Errors Prabhanjan Ananth, Abhishek Jain, Zhengzhong Jin, Giulio Malavolta
2021/430 (PDF ) Lattice Enumeration on GPUs for fplll Simon Pohmann, Marc Stevens, Jens Zumbrägel
2021/429 (PDF ) New Practical Multivariate Signatures from a Nonlinear Modifier Daniel Smith-Tone
2021/428 (PDF ) A Coq proof of the correctness of X25519 in TweetNaCl Peter Schwabe, Benoît Viguier, Timmy Weerwag, Freek Wiedijk
2021/427 (PDF ) Meet-in-the-Middle Attacks Revisited: Key-recovery, Collision, and Preimage Attacks Xiaoyang Dong, Jialiang Hua, Siwei Sun, Zheng Li, Xiaoyun Wang, Lei Hu
2021/426 (PDF ) Generic Plaintext Equality and Inequality Proofs (Extended Version) Olivier Blazy, Xavier Bultel, Pascal Lafourcade, Octavio Perez Kempner
2021/425 (PDF ) Related-Key Analysis of Generalized Feistel Networks with Expanding Round Functions Yuqing Zhao, Wenqi Yu, Chun Guo
2021/424 (PDF ) Security Analysis of SFrame Takanori Isobe, Ryoma Ito, Kazuhiko Minematsu
2021/423 (PDF ) On effective computations in special subsemigroups of polynomial transformations and protocol based multivariate cryptosystems Vasyl Ustimenko
2021/422 (PDF ) Stacking Sigmas: A Framework to Compose $\Sigma$-Protocols for Disjunctions Aarushi Goel, Matthew Green, Mathias Hall-Andersen, Gabriel Kaptchuk
2021/421 (PDF ) Indistinguishability Obfuscation of Null Quantum Circuits and Applications James Bartusek, Giulio Malavolta
2021/420 (PDF ) Intel HEXL: Accelerating Homomorphic Encryption with Intel AVX512-IFMA52 Fabian Boemer, Sejun Kim, Gelila Seifu, Fillipe D. M. de Souza, Vinodh Gopal
2021/418 (PDF ) Ring-LWE over two-to-power cyclotomics is not hard Hao Chen
2021/417 (PDF ) History Binding Signature Shlomi Dolev, Matan Liber
2021/416 (PDF ) Cryptocurrencies with Security Policies and Two-Factor Authentication Florian Breuer, Vipul Goyal, Giulio Malavolta
2021/415 (PDF ) Efficient Verification of Optimized Code: Correct High-speed X25519 Marc Schoolderman, Jonathan Moerman, Sjaak Smetsers, Marko van Eekelen
2021/414 (PDF ) Cryptanalysis of an Anonymous Identity-based Identification Scheme in Ad-Hoc Group without Pairings Sook Yan Hue, Jason Chia, Ji-Jian Chin
2021/413 (PDF ) Blind Polynomial Evaluation and Data Trading Yi Liu, Qi Wang, Siu-Ming Yiu
2021/412 (PDF ) Unclonable Encryption, Revisited Prabhanjan Ananth, Fatih Kaleoglu
2021/411 (PDF ) Privacy, Secrecy, and Storage with Nested Randomized Polar Subcode Constructions Onur Gunlu, Peter Trifonov, Muah Kim, Rafael F. Schaefer, Vladimir Sidorenko
2021/410 (PDF ) Blindly Follow: SITS CRT and FHE for DCLSMPC of DUFSM Shlomi Dolev, Stav Doolman
2021/409 (PDF ) On the Anonymity Guarantees of Anonymous Proof-of-Stake Protocols Markulf Kohlweiss, Varun Madathil, Kartik Nayak, Alessandra Scafuro
2021/408 (PDF ) Limitations on Uncloneable Encryption and Simultaneous One-Way-to-Hiding Christian Majenz, Christian Schaffner, Mehrdad Tahmasbi
2021/407 (PDF ) Improved Quantum Algorithms for the k-XOR Problem André Schrottenloher
2021/406 (PDF ) Disappearing Cryptography in the Bounded Storage Model Jiaxin Guan, Mark Zhandry
2021/405 (PDF ) Revisiting some results on APN and algebraic immune functions Claude Carlet
2021/404 (PDF ) Chain Reductions for Multi-Signatures and the HBMS Scheme Mihir Bellare, Wei Dai
2021/403 (PDF ) Atom: A Stream Cipher with Double Key Filter Subhadeep Banik, Andrea Caforio, Takanori Isobe, Fukang Liu, Willi Meier, Kosei Sakamoto, Santanu Sarkar
2021/402 (PDF ) Leakage Resilient Value Comparison With Application to Message Authentication Christoph Dobraunig, Bart Mennink
2021/401 (PDF ) Output Prediction Attacks on Block Ciphers using Deep Learning Hayato Kimura, Keita Emura, Takanori Isobe, Ryoma Ito, Kazuto Ogawa, Toshihiro Ohigashi
2021/400 (PDF ) Size of IK00 Branching Program Yupu Hu, Xingting Dong, Baocang Wang
2021/399 (PDF ) Latus Incentive Scheme: Enabling Decentralization in Blockchains based on Recursive SNARKs Alberto Garoffolo, Dmytro Kaidalov, Roman Oliynykov
2021/398 (PDF ) Cryptanalysis of the Binary Permuted Kernel Problem Thales Bandiera Paiva, Routo Terada
2021/397 (PDF ) SSProve: A Foundational Framework for Modular Cryptographic Proofs in Coq Philipp G. Haselwarter, Exequiel Rivas, Antoine Van Muylder, Théo Winterhalter, Carmine Abate, Nikolaj Sidorenco, Catalin Hritcu, Kenji Maillard, Bas Spitters
2021/396 (PDF ) LESS-FM: Fine-tuning Signatures from the Code Equivalence Problem Alessandro Barenghi, Jean-Francois Biasse, Edoardo Persichetti, Paolo Santini
2021/395 (PDF ) On the Validity of Spoofing Attack Against Safe is the New Smart Harishma Boyapally, Urbi Chatterjee, Debdeep Mukhopadhyay
2021/394 (PDF ) Quantum Encryption with Certified Deletion: Public Key and Attribute-Based Ryo Nishimaki, Takashi Yamakawa
2021/393 (PDF ) Key Agreement with Correlated Noise and Multiple Entities or Enrollments Onur Gunlu
2021/392 (PDF ) How Private Are Commonly-Used Voting Rules? Ao Liu, Yun Lu, Lirong Xia, Vassilis Zikas
2021/391 (PDF ) New Standards for E-Voting Systems: Reflections on Source Code Examinations Thomas Haines, Peter Roenne
2021/390 (PDF ) Orthros: A Low-Latency PRF Subhadeep Banik, Takanori Isobe, Fukang Liu, Kazuhiko Minematsu, Kosei Sakamoto
2021/389 (PDF ) Physically Related Functions: A New Paradigm for Light-weight Key-Exchange Durba Chatterjee, Harishma Boyapally, Sikhar Patranabis, Urbi Chatterjee, Debdeep Mukhopadhyay, Aritra Hazra
2021/388 (PDF ) Topology-Hiding Communication from Minimal Assumptions. Marshall Ball, Elette Boyle, Ran Cohen, Lisa Kohl, Tal Malkin, Pierre Meyer, Tal Moran
2021/387 (PDF ) Quantum-access security of the Winternitz one-time signature scheme Christian Majenz, Chanelle Matadah Manfouo, Maris Ozols
2021/386 (PDF ) SAFELearn: Secure Aggregation for private FEderated Learning Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Helen Möllering, Thien Duc Nguyen, Phillip Rieger, Ahmad Reza Sadeghi, Thomas Schneider, Hossein Yalame, Shaza Zeitouni
2021/385 (PDF ) Solving the problem of Blockwise Isomorphism of Polynomials with Circulant matrices Yasufumi Hashimoto
2021/384 (PDF ) Analysis and Probing of Parallel Channels in the Lightning Network Alex Biryukov, Gleb Naumenko, Sergei Tikhomirov
2021/383 (PDF ) GLV+HWCD for 2y^2=x^3+x/GF(8^91+5) Daniel R. L. Brown
2021/382 (PDF ) Signatures with Tight Multi-User Security from Search Assumptions Jiaxin Pan, Magnus Ringerud
2021/380 (PDF ) Certificateless Designated Verifier Proxy Signature Cholun Kim
2021/379 (PDF ) A Note on the Bias of Rotational Differential-Linear Distinguishers Yunwen Liu, Zhongfeng Niu, Siwei Sun, Chao Li, Lei Hu
2021/378 (PDF ) Multiparty Reusable Non-Interactive Secure Computation from LWE Fabrice Benhamouda, Aayush Jain, Ilan Komargodski, Huijia Lin
2021/377 (PDF ) Attacks and weaknesses of BLS aggregate signatures Nguyen Thoi Minh Quan
2021/376 (PDF ) On the Impossibility of Post-Quantum Black-Box Zero-Knowledge in Constant Rounds Nai-Hui Chia, Kai-Min Chung, Qipeng Liu, Takashi Yamakawa
2021/375 (PDF ) Round and Communication Balanced Protocols for Oblivious Evaluation of Finite State Machines Rafael Dowsley, Caleb Horst, Anderson C A Nascimento
2021/374 (PDF ) ZXAD: High-volume Attack Mitigation for Tor Akshaya Mani, Ian Goldberg
2021/373 (PDF ) T5: Hashing Five Inputs with Three Compression Calls Yevgeniy Dodis, Dmitry Khovratovich, Nicky Mouha, Mridul Nandi
2021/372 (PDF ) Explicit connections between supersingular isogeny graphs and Bruhat–Tits trees Laia Amorós, Annamaria Iezzi, Kristin Lauter, Chloe Martindale, Jana Sotáková
2021/371 (PDF ) Construction of minimal linear codes with few weights from weakly regular plateaued functions Ahmet Sinak
2021/370 (PDF ) Nova: Recursive Zero-Knowledge Arguments from Folding Schemes Abhiram Kothapalli, Srinath Setty, Ioanna Tzialla
2021/369 (PDF ) A Note on Algebraic Decomposition Method for Masked Implementation Shoichi Hirose
2021/368 (PDF ) Memory Optimization Techniques for Computing Discrete Logarithms in Compressed SIKE Aaron Hutchinson, Koray Karabina, Geovandro Pereira
2021/367 (PDF ) Interpolation Cryptanalysis of Unbalanced Feistel Networks with Low Degree Round Functions Arnab Roy, Elena Andreeva, Jan Ferdinand Sauer
2021/366 (PDF ) Multiparty Computation with Covert Security and Public Verifiability Peter Scholl, Mark Simkin, Luisa Siniscalchi
2021/365 (PDF ) Updatable Signatures and Message Authentication Codes Valerio Cini, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks, Erkan Tairi
2021/364 (PDF ) RAGHAV: A new low power S-P network encryption design for resource constrained environment GAURAV BANSOD
2021/363 (PDF ) Information Leakages in Code-based Masking: A Unified Quantification Approach Wei Cheng, Sylvain Guilley, Claude Carlet, Jean-Luc Danger, Sihem Mesnager
2021/362 (PDF ) Cryptanalysis of Round-Reduced SIMON32 Based on Deep Learning Zezhou Hou, Jiongjiong Ren, Shaozhen Chen
2021/361 (PDF ) Some New Constructions of Generalized Plateaued Functions Jiaxin Wang, Fang-Wei Fu
2021/360 (PDF ) An Architecture for Blockchain-based Cloud Banking Thuat Do
2021/359 (PDF ) Cryptanalysis on 'An efficient identity-based proxy signcryption using lattice' Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso
2021/358 (PDF ) Time- and Space-Efficient Arguments from Groups of Unknown Order Alexander R. Block, Justin Holmgren, Alon Rosen, Ron D. Rothblum, Pratik Soni
2021/357 (PDF ) AISY - Deep Learning-based Framework for Side-channel Analysis Guilherme Perin, Lichao Wu, Stjepan Picek
2021/356 (PDF ) Active Implementation of End-to-End Post-Quantum Encryption Anton Tutoveanu
2021/355 (PDF ) A Hard Crystal - Implementing Dilithium on Reconfigurable Hardware Georg Land, Pascal Sasdrich, Tim Güneysu
2021/354 (PDF ) Efficient permutation protocol for MPC in the head Peeter Laud
2021/353 (PDF ) Fully-succinct Publicly Verifiable Delegation from Constant-Size Assumptions Alonso González, Alexandros Zacharakis
2021/352 (PDF ) A Configurable Hardware Implementation of XMSS Jan Philipp Thoma, Tim Güneysu
2021/351 (PDF ) Practical Dynamic Group Signatures Without Knowledge Extractors Hyoseung Kim, Olivier Sanders, Michel Abdalla, Jong Hwan Park
2021/350 (PDF ) Non-interactive half-aggregation of EdDSA and variants of Schnorr signatures Konstantinos Chalkias, Francois Garillot, Yashvanth Kondi, Valeria Nikolaenko
2021/349 (PDF ) Post-quantum Resettably-Sound Zero Knowledge Nir Bitansky, Michael Kellner, Omri Shmueli
2021/348 (PDF ) Decoding supercodes of Gabidulin codes and applications to cryptanalysis Maxime Bombar, Alain Couvreur
2021/347 (PDF ) Attacking (EC)DSA With Partially Known Multiples of Nonces Marios Adamoudis, Konstantinos A. Draziotis, Dimitrios Poulakis
2021/346 (PDF ) Round-optimal Honest-majority MPC in Minicrypt and with Everlasting Security Benny Applebaum, Eliran Kachlon, Arpita Patra
2021/345 (PDF ) Private Blocklist Lookups with Checklist Dmitry Kogan, Henry Corrigan-Gibbs
2021/344 (PDF ) Efficient and Universally Composable Single Secret Leader Election from Pairings Dario Catalano, Dario Fiore, Emanuele Giunta
2021/343 (PDF ) Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups Rishab Goyal, Jiahui Liu, Brent Waters
2021/342 (PDF ) N-for-1 Auth: N-wise Decentralized Authentication via One Authentication Weikeng Chen, Ryan Deng, Raluca Ada Popa
2021/341 (PDF ) Clonable PUF: On the Design of PUFs That Share Equivalent Responses Takashi Sato, Yuki Tanaka, Song Bian
2021/340 (PDF ) Merkle Trees Optimized for Stateless Clients in Bitcoin Bolton Bailey, Suryanarayana Sankagiri
2021/339 (PDF ) Non-interactive distributed key generation and key resharing Jens Groth
2021/338 (PDF ) Lattice-Based Proof of Shuffle and Applications to Electronic Voting Diego F. Aranha, Carsten Baum, Kristian Gjøsteen, Tjerand Silde, Thor Tunge
2021/337 (PDF ) Identity-certifying Authority-aided Identity-based Searchable Encryption Framework in Cloud Systems Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Yu-Chi Chen, Masahiro Mambo
2021/336 (PDF ) On Closed-Cycle Loops and Applicability of Nonlinear Product Attacks to DES Nicolas T. Courtois, Matteo Abbondati, Hamy Ratoanina, Marek Grajek
2021/335 (PDF ) Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3 Ohad Amon, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir
2021/334 (PDF ) Post-Quantum Succinct Arguments: Breaking the Quantum Rewinding Barrier Alessandro Chiesa, Fermi Ma, Nicholas Spooner, Mark Zhandry
2021/333 (PDF ) Sumcheck Arguments and their Applications Jonathan Bootle, Alessandro Chiesa, Katerina Sotiraki
2021/332 (PDF ) An $O(\log^2 p)$ Approach to Point-Counting on Elliptic Curves From a Prominent Family Over the Prime Field $\mathbb{F}_p$ Yuri Borissov, Miroslav Markov
2021/331 (PDF ) A Probabilistic Public Key Encryption Switching Protocol for Secure Cloud Storage Applications Radhakrishna Bhat, N R Sunitha, S S Iyengar
2021/330 (PDF ) The Key-Dependent Message Security of Key-Alternating Feistel Ciphers Pooya Farshim, Louiza Khati, Yannick Seurin, Damien Vergnaud
2021/329 (PDF ) Two Efficient and Regulatory Confidential Transaction Schemes Min Yang, Changtong Xu, Zhe Xia, Li Wang, Qingshu Meng
2021/328 (PDF ) Mixup Data Augmentation for Deep Learning Side-Channel Attacks Karim M. Abdellatif
2021/327 (PDF ) Veksel: Simple, Efficient, Anonymous Payments with Large Anonymity Sets from Well-Studied Assumptions Matteo Campanelli, Mathias Hall-Andersen
2021/326 (PDF ) Bringing State-Separating Proofs to EasyCrypt - A Security Proof for Cryptobox François Dupressoir, Konrad Kohbrok, Sabine Oechsner
2021/325 (PDF ) Spectrum: High-Bandwidth Anonymous Broadcast Zachary Newman, Sacha Servan-Schreiber, Srinivas Devadas
2021/324 (PDF ) Private AI: Machine Learning on Encrypted Data Kristin E. Lauter
2021/323 (PDF ) 0 Nguyen Thoi Minh Quan
2021/322 (PDF ) Rinocchio: SNARKs for Ring Arithmetic Chaya Ganesh, Anca Nitulescu, Eduardo Soria-Vazquez
2021/321 (PDF ) Abuse Resistant Law Enforcement Access Systems Matthew Green, Gabriel Kaptchuk, Gijs Van Laer
2021/320 (PDF ) Binding BIKE errors to a key pair Nir Drucker, Shay Gueron, Dusan Kostic
2021/319 (PDF ) Tradeoff attacks on symmetric ciphers Orhun Kara
2021/318 (PDF ) Oblivious TLS via Multi-Party Computation Damiano Abram, Ivan Damgård, Peter Scholl, Sven Trieflinger
2021/317 (PDF ) MPCCache: Privacy-Preserving Multi-Party Cooperative Cache Sharing at the Edge Duong Tung Nguyen, Ni Trieu
2021/316 (PDF ) Reusable Two-Round MPC from LPN James Bartusek, Sanjam Garg, Akshayaram Srinivasan, Yinuo Zhang
2021/315 (PDF ) Faster homomorphic comparison operations for BGV and BFV Ilia Iliashenko, Vincent Zucca
2021/314 (PDF ) On Security Properties of All-or-nothing Transforms Navid Nasr Esfahani, Douglas R. Stinson
2021/313 (PDF ) Rank Estimation with Bounded Error via Exponential Sampling Liron David, Avishai Wool
2021/312 (PDF ) Towards Strengthening Deep Learning-based Side Channel Attacks with Mixup Zhimin Luo, Mengce Zheng, Ping Wang, Minhui Jin, Jiajia Zhang, Honggang Hu
2021/311 (PDF ) Improved Neural Aided Statistical Attack for Cryptanalysis Yi Chen, Hongbo Yu
2021/310 (PDF ) A New Neural Distinguisher Considering Features Derived from Multiple Ciphertext Pairs Yi Chen, Yantian Shen, Hongbo Yu, Sitong Yuan
2021/309 (PDF ) SoCCAR: Detecting System-on-Chip Security Violations Under Asynchronous Resets Xingyu Meng, Kshitij Raj, Atul Prasad Deb Nath, Kanad Basu, Sandip Ray
2021/308 (PDF ) Threshold Garbled Circuits and Ad Hoc Secure Computation Michele Ciampi, Vipul Goyal, Rafail Ostrovsky
2021/307 (PDF ) A Compressed $\Sigma$-Protocol Theory for Lattices Thomas Attema, Ronald Cramer, Lisa Kohl
2021/306 (PDF ) Round-Optimal Blind Signatures in the Plain Model from Classical and Quantum Standard Assumptions Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
2021/305 (PDF ) SoK: Game-based Security Models for Group Key Exchange Bertram Poettering, Paul Rösler, Jörg Schwenk, Douglas Stebila
2021/304 (PDF ) Epoque: Practical End-to-End Verifiable Post-Quantum-Secure E-Voting Xavier Boyen, Thomas Haines, Johannes Mueller
2021/303 (PDF ) The More The Merrier: Reducing the Cost of Large Scale MPC S. Dov Gordon, Daniel Starin, Arkady Yerukhimovich
2021/302 (PDF ) Post-Quantum Verifiable Random Function from Symmetric Primitives in PoS Blockchain Maxime Buser, Rafael Dowsley, Muhammed F. Esgin, Shabnam Kasra Kermanshahi, Veronika Kuchta, Joseph K. Liu, Raphael Phan, Zhenfei Zhang
2021/301 (PDF ) Indifferentiable hashing to ordinary elliptic $\mathbb{F}_{\!q}$-curves of $j=0$ with the cost of one exponentiation in $\mathbb{F}_{\!q}$ Dmitrii Koshelev
2021/300 (PDF ) Invariants for EA- and CCZ-equivalence of APN and AB functions Nikolay Kaleyski
2021/299 (PDF ) HashSplit: Exploiting Bitcoin Asynchrony to Violate Common Prefix and Chain Quality Muhammad Saad, Afsah Anwar, Srivatsan Ravi, David Mohaisen
2021/298 (PDF ) On extensions of the one-time-pad Bhupendra Singh, G. Athithan, Rajesh Pillai
2021/297 (PDF ) HashWires: Hyperefficient Credential-Based Range Proofs Konstantinos Chalkias, Shir Cohen, Kevin Lewi, Fredric Moezinia, Yolan Romailler
2021/296 (PDF ) Revisiting Fault Adversary Models - Hardware Faults in Theory and Practice Jan Richter-Brockmann, Pascal Sasdrich, Tim Güneysu
2021/295 (PDF ) Enhancing Processor Design Obfuscation Through Security-Aware On-Chip Memory and Data Path Design Michael Zuzak, Ankur Srivastava
2021/294 (PDF ) Code-based signatures without trapdoors through restricted vectors Marco Baldi, Franco Chiaraluce, Paolo Santini
2021/293 (PDF ) Thinking Outside the Superbox Nicolas Bordes, Joan Daemen, Daniël Kuijsters, Gilles Van Assche
2021/292 (PDF ) Quantum Collision Attacks on Reduced SHA-256 and SHA-512 Akinori Hosoyamada, Yu Sasaki
2021/291 (PDF ) Bandwidth-efficient threshold EC-DSA revisited: Online/Offline Extensions, Identifiable Aborts, Proactivity and Adaptive Security Guilhem Castagnos, Dario Catalano, Fabien Laguillaumie, Federico Savasta, Ida Tucker
2021/290 (PDF ) Dummy Shuffling against Algebraic Attacks in White-box Implementations Alex Biryukov, Aleksei Udovenko
2021/289 (PDF ) Reactive Key-Loss Protection in Blockchains Sam Blackshear, Konstantinos Chalkias, Panagiotis Chatzigiannis, Riyaz Faizullabhoy, Irakliy Khaburzaniya, Eleftherios Kokoris Kogias, Joshua Lind, David Wong, Tim Zakian
2021/288 (PDF ) Redeeming Reset Indifferentiability and Post-Quantum Groups Mark Zhandry
2021/287 (PDF ) A Deeper Look at Machine Learning-Based Cryptanalysis Adrien Benamira, David Gerault, Thomas Peyrin, Quan Quan Tan
2021/286 (PDF ) Fiat-Shamir via List-Recoverable Codes (or: Parallel Repetition of GMW is not Zero-Knowledge) Justin Holmgren, Alex Lombardi, Ron D. Rothblum
2021/285 (PDF ) Quadratic Secret Sharing and Conditional Disclosure of Secrets Amos Beimel, Hussien Othman, Naty Peter
2021/284 (PDF ) The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts Christof Ferreira Torres, Antonio Ken Iannillo, Arthur Gervais, Radu State
2021/283 (PDF ) P2DEX: Privacy-Preserving Decentralized Cryptocurrency Exchange Carsten Baum, Bernardo David, Tore Frederiksen
2021/282 (PDF ) One-way functions and malleability oracles: Hidden shift attacks on isogeny-based protocols Péter Kutas, Simon-Philipp Merz, Christophe Petit, Charlotte Weitkämper
2021/281 (PDF ) Subquadratic SNARGs in the Random Oracle Model Alessandro Chiesa, Eylon Yogev
2021/280 (PDF ) Online-Extractability in the Quantum Random-Oracle Model Jelle Don, Serge Fehr, Christian Majenz, Christian Schaffner
2021/279 (PDF ) Information-Set Decoding with Hints Anna-Lena Horlemann, Sven Puchinger, Julian Renner, Thomas Schamberger, Antonia Wachter-Zeh
2021/278 (PDF ) More Communication Lower Bounds for Information-Theoretic MPC Ivan Damgård, Boyang Li, Nikolaj I. Schwartzbach
2021/277 (PDF ) On the Integer Polynomial Learning with Errors Problem Julien Devevey, Amin Sakzad, Damien Stehlé, Ron Steinfeld
2021/276 (PDF ) Improved Proxy Re-encryption Scheme for Symmetric Key Cryptography Amril Syalim, Takashi Nishide, Kouichi Sakurai
2021/275 (PDF ) Design Space Exploration of Galois and Fibonacci Configuration based on Espresso Stream Cipher Zhengyuan Shi, Gangqiang Yang, Hailiang Xiong, Fudong Li, Honggang Hu
2021/274 (PDF ) Large Message Homomorphic Secret Sharing from DCR and Applications Lawrence Roy, Jaspal Singh
2021/273 (PDF ) On the (In)Security of the Diffie-Hellman Oblivious PRF with Multiplicative Blinding Stanislaw Jarecki, Hugo Krawczyk, Jiayu Xu
2021/272 (PDF ) Isogeny-based key compression without pairings Geovandro C. C. F. Pereira, Paulo S. L. M. Barreto
2021/271 (PDF ) On the CCA Compatibility of Public-Key Infrastructure Dakshita Khurana, Brent Waters
2021/270 (PDF ) PQC: R-Propping of a New Group-Based Digital Signature Pedro Hecht
2021/269 (PDF ) Steel: Composable Hardware-based Stateful and Randomised Functional Encryption Pramod Bhatotia, Markulf Kohlweiss, Lorenzo Martinico, Yiannis Tselekounis
2021/268 (PDF ) Revisiting Updatable Encryption: True Forward Security, Constructions and a Puncturable Perspective Daniel Slamanig, Christoph Striecks
2021/267 (PDF ) Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields Christoph Dobraunig, Lorenzo Grassi, Anna Guinet, Daniël Kuijsters
2021/266 (PDF ) VOLE-PSI: Fast OPRF and Circuit-PSI from Vector-OLE Peter Rindal, Phillipp Schoppmann
2021/265 (PDF ) On the Hardness of Module-LWE with Binary Secret Katharina Boudgoust, Corentin Jeudy, Adeline Roux-Langlois, Weiqiang Wen
2021/264 (PDF ) FAST: Fair Auctions via Secret Transactions Bernardo David, Lorenzo Gentile, Mohsen Pourpouneh
2021/263 (PDF ) Non-Interactive Half-Aggregate Signatures Based on Module Lattices - A First Attempt Katharina Boudgoust, Adeline Roux-Langlois
2021/262 (PDF ) The Rise of Paillier: Homomorphic Secret Sharing and Public-Key Silent OT Claudio Orlandi, Peter Scholl, Sophia Yakoubov
2021/261 (PDF ) MIRACLE: MIcRo-ArChitectural Leakage Evaluation Ben Marshall, Dan Page, James Webb
2021/260 (PDF ) A Geometric Approach to Homomorphic Secret Sharing Yuval Ishai, Russell W. F. Lai, Giulio Malavolta
2021/259 (PDF ) Fully projective radical isogenies in constant-time Jesús-Javier Chi-Domínguez, Krijn Reijnders
2021/258 (PDF ) Secure Wire Shuffling in the Probing Model Jean-Sebastien Coron, Lorenzo Spignoli
2021/257 (PDF ) Cryptanalysis of the quantum public-key cryptosystem OTU under heuristics from combinatorial statements Shoichi Kamada
2021/256 (PDF ) Gage MPC: Bypassing Residual Function Leakage for Non-Interactive MPC Ghada Almashaqbeh, Fabrice Benhamouda, Seungwook Han, Daniel Jaroslawicz, Tal Malkin, Alex Nicita, Tal Rabin, Abhishek Shah, Eran Tromer
2021/255 (PDF ) Low-Memory Algebraic Attacks on Round-Reduced LowMC Fukang Liu, Takanori Isobe, Willi Meier
2021/254 (PDF ) Multivariate Public Key Cryptosystem from Sidon Spaces Netanel Raviv, Ben Langton, Itzhak Tamo
2021/253 (PDF ) Improved single-round secure multiplication using regenerating codes Mark Abspoel, Ronald Cramer, Daniel Escudero, Ivan Damgård, Chaoping Xing
2021/252 (PDF ) A Resource Binding Approach to Logic Obfuscation Michael Zuzak, Yuntao Liu, Ankur Srivastava
2021/251 (PDF ) Generic Compiler for Publicly Verifiable Covert Multi-Party Computation Sebastian Faust, Carmit Hazay, David Kretzler, Benjamin Schlosser
2021/250 (PDF ) Key Agreement with Physical Unclonable Functions and Biometric Identifiers Onur Gunlu
2021/249 (PDF ) NeuroSCA: Evolving Activation Functions for Side-channel Analysis Karlo Knezevic, Juraj Fulir, Domagoj Jakobovic, Stjepan Picek
2021/248 (PDF ) Everlasting UC Commitments from Fully Malicious PUFs Bernardo Magri, Giulio Malavolta, Dominique Schröder, Dominique Unruh
2021/247 (PDF ) Generic Hardware Private Circuits - Towards Automated Generation of Composable Secure Gadgets David Knichel, Pascal Sasdrich, Amir Moradi
2021/246 (PDF ) Master-Key KDM-Secure ABE via Predicate Encoding Shengyuan Feng, Junqing Gong, Jie Chen
2021/245 (PDF ) On the Ideal Shortest Vector Problem over Random Rational Primes Yanbin Pan, Jun Xu, Nick Wadleigh, Qi Cheng
2021/244 (PDF ) Forward Secret Encrypted RAM: Lower Bounds and Applications Alexander Bienstock, Yevgeniy Dodis, Kevin Yeo
2021/243 (PDF ) Private Set Operations from Oblivious Switching Gayathri Garimella, Payman Mohassel, Mike Rosulek, Saeed Sadeghian, Jaspal Singh
2021/242 (PDF ) GAP: Born to Break Hiding Ju-Hwan Kim, Ji-Eun Woo, Soo-Jin Kim, So-Yeon Park, Dong-Guk Han
2021/241 (PDF ) On the Round Complexity of Fully Secure Solitary MPC with Honest Majority Saikrishna Badrinarayanan, Peihan Miao, Pratyay Mukherjee, Divya Ravi
2021/240 (PDF ) The Relationship Between Idealized Models Under Computationally Bounded Adversaries Mark Zhandry, Cong Zhang
2021/239 (PDF ) SoK: Auditability and Accountability in Distributed Payment Systems Panagiotis Chatzigiannis, Foteini Baldimtsi, Konstantinos Chalkias
2021/238 (PDF ) Weak Tweak-Keys for the CRAFT Block Cipher Gregor Leander, Shahram Rasoolzadeh
2021/237 (PDF ) Post-quantum Security of OAEP Transform Ehsan Ebrahimi
2021/236 (PDF ) SNOW-Vi: an extreme performance variant of SNOW-V for lower grade CPUs Patrik Ekdahl, Thomas Johansson, Alexander Maximov, Jing Yang
2021/235 (PDF ) More Efficient Digital Signatures with Tight Multi-User Security Denis Diemert, Kai Gellert, Tibor Jager, Lin Lyu
2021/234 (PDF ) New Public-Key Crypto-System EHT Alessandro Budroni, Igor Semaev
2021/233 (PDF ) Public-Coin Statistical Zero-Knowledge Batch Verification against Malicious Verifiers Inbar Kaslasi, Ron D. Rothblum, Prashant Nalini Vasudevan
2021/230 (PDF ) Subversion-Resilient Public Key Encryption with Practical Watchdogs Pascal Bemmann, Rongmao Chen, Tibor Jager
2021/229 (PDF ) Fast Boolean Queries with Minimized Leakage for Encrypted Databases in Cloud Computing Zhiqiang Wu, Kenli Li, Keqin Li, Jin Wang
2021/228 (PDF ) On Publicly-Accountable Zero-Knowledge and Small Shuffle Arguments Nils Fleischhacker, Mark Simkin
2021/227 (PDF ) Rate-1 Key-Dependent Message Security via Reusable Homomorphic Extractor against Correlated-Source Attacks Qiqi Lai, Feng-Hao Liu, Zhedong Wang
2021/226 (PDF ) Group Encryption: Full Dynamicity, Message Filtering and Code-Based Instantiation Khoa Nguyen, Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang, Yanhong Xu, Neng Zeng
2021/225 (PDF ) Recovering or Testing Extended-Affine Equivalence Anne Canteaut, Alain Couvreur, Léo Perrin
2021/224 (PDF ) Improved Linear Approximations to ARX Ciphers and Attacks Against ChaCha Murilo Coutinho, T. C. Souza Neto
2021/223 (PDF ) Escaping from Consensus: Instantly Redactable Blockchain Protocols in Permissionless Setting Xinyu Li, Jing Xu, Lingyuan Yin, Yuan Lu, Qiang Tang, Zhenfeng Zhang
2021/222 (PDF ) Quantum-safe HIBE: does it cost a Latte? Raymond K. Zhao, Sarah McCarthy, Ron Steinfeld, Amin Sakzad, Máire O’Neill
2021/221 (PDF ) The Direction of Updatable Encryption Does Matter Ryo Nishimaki
2021/220 (PDF ) A New Twofold Cornacchia-Type Algorithm Bei Wang, Yi Ouyang, Songsong Li, Honggang Hu
2021/219 (PDF ) Snarky Ceremonies Markulf Kohlweiss, Mary Maller, Janno Siim, Mikhail Volkhov
2021/218 (PDF ) SimS: a Simplification of SiGamal Tako Boris Fouotsa, Christophe Petit
2021/217 (PDF ) Verifiable Random Functions with Optimal Tightness David Niehues
2021/216 (PDF ) How to Meet Ternary LWE Keys Alexander May
2021/215 (PDF ) Limbo: Efficient Zero-knowledge MPCitH-based Arguments Cyprien Delpech de Saint Guilhem, Emmanuela Orsini, Titouan Tanguy
2021/214 (PDF ) Mesh Messaging in Large-scale Protests: Breaking Bridgefy Martin R. Albrecht, Jorge Blasco, Rikke Bjerg Jensen, Lenka Mareková
2021/213 (PDF ) Accelerating the Search of Differential and Linear Characteristics with the SAT Method Ling Sun, Wei Wang, Meiqin Wang
2021/212 (PDF ) Bit-wise Cryptanalysis on AND-RX Permutation Friet-PC Ryoma Ito, Rentaro Shiba, Kosei Sakamoto, Fukang Liu, Takanori Isobe
2021/211 (PDF ) GearBox: Optimal-size Shard Committees by Leveraging the Safety-Liveness Dichotomy Bernardo David, Bernardo Magri, Christian Matt, Jesper Buus Nielsen, Daniel Tschudi
2021/210 (PDF ) YOSO: You Only Speak Once / Secure MPC with Stateless Ephemeral Roles Craig Gentry, Shai Halevi, Hugo Krawczyk, Bernardo Magri, Jesper Buus Nielsen, Tal Rabin, Sophia Yakoubov
2021/209 (PDF ) Sampling methods for cryptographic tests George Marinakis
2021/208 (PDF ) Secure Poisson Regression Mahimna Kelkar, Phi Hung Le, Mariana Raykova, Karn Seth
2021/207 (PDF ) Secure Fast Evaluation of Iterative Methods: With an Application to Secure PageRank Daniele Cozzo, Nigel P. Smart, Younes Talibi Alaoui
2021/206 (PDF ) WabiSabi: Centrally Coordinated CoinJoins with Variable Amounts Ádám Ficsór, Yuval Kogman, Lucas Ontivero, István András Seres
2021/205 (PDF ) Compact Zero-Knowledge Proofs for Threshold ECDSA with Trustless Setup Tsz Hon Yuen, Handong Cui, Xiang Xie
2021/204 (PDF ) Revisiting Homomorphic Encryption Schemes for Finite Fields Andrey Kim, Yuriy Polyakov, Vincent Zucca
2021/203 (PDF ) Anonymous Tokens with Public Metadata and Applications to Private Contact Tracing Tjerand Silde, Martin Strand
2021/202 (PDF ) Subtractive Sets over Cyclotomic Rings: Limits of Schnorr-like Arguments over Lattices Martin R. Albrecht, Russell W. F. Lai
2021/201 (PDF ) DAUnTLeSS: Data Augmentation and Uniform Transformation for Learning with Scalability and Security Hanshen Xiao, Srinivas Devadas
2021/200 (PDF ) Manticore: Efficient Framework for Scalable Secure Multiparty Computation Protocols Sergiu Carpov, Kevin Deforth, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev, Jonathan Katz, Iraklis Leontiadis, M. Mohammadi, Abson Sae-Tang, Marius Vuille
2021/199 (PDF ) Generic, Efficient and Isochronous Gaussian Sampling over the Integers Shuo Sun, Yongbin Zhou, Yunfeng Ji, Rui Zhang, Yang Tao
2021/198 (PDF ) Automatic Parallelism Tuning for Module Learning with Errors Based Post-Quantum Key Exchanges on GPUs Tatsuki Ono, Song Bian, Takashi Sato
2021/197 (PDF ) Gambling for Success: The Lottery Ticket Hypothesis in Deep Learning-based SCA Guilherme Perin, Lichao Wu, Stjepan Picek
2021/196 (PDF ) QCCA-Secure Generic Key Encapsulation Mechanism with Tighter Security in the Quantum Random Oracle Model Xu Liu, Mingqiang Wang
2021/195 (PDF ) Compilation of Function Representations for Secure Computing Paradigms Karim Baghery, Cyprien Delpech de Saint Guilhem, Emmanuela Orsini, Nigel P. Smart, Titouan Tanguy
2021/194 (PDF ) Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon Raghvendra Rohit, Kai Hu, Sumanta Sarkar, Siwei Sun
2021/193 (PDF ) Multitarget decryption failure attacks and their application to Saber and Kyber Jan-Pieter D'Anvers, Senne Batsleer
2021/192 (PDF ) Quantum Indifferentiability of SHA-3 Jan Czajkowski
2021/191 (PDF ) PT-Symmetric Quantum State Discrimination for Attack on BB84 Quantum Key Distribution Yaroslav Balytskyi, Manohar Raavi, Anatoliy Pinchuk, Sang-Yoon Chang
2021/190 (PDF ) Decidability of Secure Non-interactive Simulation of Doubly Symmetric Binary Source Hamidreza Amini Khorasgani, Hemanta K. Maji, Hai H. Nguyen
2021/189 (PDF ) Rotational Cryptanalysis From a Differential-linear Perspective: Practical Distinguishers for Round-reduced FRIET, Xoodoo, and Alzette Yunwen Liu, Siwei Sun, Chao Li
2021/188 (PDF ) Tight Security Bounds for Micali’s SNARGs Alessandro Chiesa, Eylon Yogev
2021/187 (PDF ) Weak Keys in Reduced AEGIS and Tiaoxin Fukang Liu, Takanori Isobe, Willi Meier, Kosei Sakamoto
2021/186 (PDF ) Leakage-resilience of the Shamir Secret-sharing Scheme against Physical-bit Leakages Hemanta K. Maji, Hai H. Nguyen, Anat Paskin-Cherniavsky, Tom Suad, Mingyuan Wang
2021/185 (PDF ) No Silver Bullet: Optimized Montgomery Multiplication on Various 64-bit ARM Platforms Hwajeong Seo, Pakize Sanal, Wai-Kong Lee, Reza Azarderakhsh
2021/184 (PDF ) Communication-Efficient BFT Protocols Using Small Trusted Hardware to Tolerate Minority Corruption Sravya Yandamuri, Ittai Abraham, Kartik Nayak, Michael K. Reiter
2021/183 (PDF ) Efficient State Management in Distributed Ledgers Dimitris Karakostas, Nikos Karayannidis, Aggelos Kiayias
2021/182 (PDF ) The Legendre Pseudorandom Function as a Multivariate Quadratic Cryptosystem: Security and Applications István András Seres, Máté Horváth, Péter Burcsi
2021/181 (PDF ) Group Signatures with User-Controlled and Sequential Linkability Jesus Diaz, Anja Lehmann
2021/180 (PDF ) Apollo -- Optimistically Linear and Responsive SMR Adithya Bhat, Akhil Bandarupalli, Saurabh Bagchi, Aniket Kate, Michael Reiter
2021/179 (PDF ) Efficient Framework for Genetic-Algorithm-Based Correlation Power Analysis An Wang, Yuan Li, Yaoling Ding, Liehuang Zhu, Yongjuan Wang
2021/178 (PDF ) Attribute-Based Access Control for Inner Product Functional Encryption from LWE Tapas Pal, Ratna Dutta
2021/177 (PDF ) Generic Negation of Pair Encodings Miguel Ambrona
2021/176 (PDF ) Blitz: Secure Multi-Hop Payments Without Two-Phase Commits Lukas Aumayr, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei
2021/175 (PDF ) On the Relationships between Different Methods for Degree Evaluation (Full Version) Siwei Chen, Zejun Xiang, Xiangyong Zeng, Shasha Zhang
2021/174 (PDF ) Smart Contracts for Incentivized Outsourcing of Computation Alptekin Küpçü, Reihaneh Safavi-Naini
2021/173 (PDF ) TensorCrypto Wai-Kong Lee, Hwajeong Seo, Zhenfei Zhang, Seongoun Hwang
2021/172 (PDF ) Efficient Linear Multiparty PSI and Extensions to Circuit/Quorum PSI Nishanth Chandran, Nishka Dasgupta, Divya Gupta, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar, Akash Shah
2021/171 (PDF ) Pre-Computation Scheme of Window $\tau$NAF for Koblitz Curves Revisited Wei Yu, Guangwu Xu
2021/170 (PDF ) Fully Anonymous Group Signature with Verifier-Local Revocation Ai Kitagawa, Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Keisuke Tanaka
2021/169 (PDF ) Security Analysis on an El-Gamal-like Multivariate Encryption Scheme Based on Isomorphism of Polynomials Yasuhiko Ikematsu, Shuhei Nakamura, Bagus Santoso, Takanori Yasuda
2021/168 (PDF ) Small Leaks Sink a Great Ship: An Evaluation of Key Reuse Resilience of PQC Third Round Finalist NTRU-HRSS Xiaohan Zhang, Chi Cheng, Ruoyu Ding
2021/167 (PDF ) Stealing Neural Network Models through the Scan Chain: A New Threat for ML Hardware Seetal Potluri, Aydin Aysu
2021/166 (PDF ) Cost Fairness for Blockchain-Based Two-Party Exchange Protocols Matthias Lohr, Benjamin Schlosser, Jan Jürjens, Steffen Staab
2021/165 (PDF ) Composition with Knowledge Assumptions Thomas Kerber, Aggelos Kiayias, Markulf Kohlweiss
2021/164 (PDF ) Graph-Based Construction for Non-Malleable Codes Shohei Satake, Yujie Gu, Kouichi Sakurai
2021/163 (PDF ) CNF-FSS and its Applications Paul Bunn, Eyal Kushilevitz, Rafail Ostrovsky
2021/162 (PDF ) Verifiable Capacity-bound Functions: A New Primitive from Kolmogorov Complexity (Revisiting space-based security in the adaptive setting) Giuseppe Ateniese, Long Chen, Danilo Francati, Dimitrios Papadopoulos, Qiang Tang
2021/160 (PDF ) Efficient Adaptively-Secure IB-KEMs and VRFs via Near-Collision Resistance Tibor Jager, Rafael Kurek, David Niehues
2021/159 (PDF ) hbACSS: How to Robustly Share Many Secrets Thomas Yurek, Licheng Luo, Jaiden Fairoze, Aniket Kate, Andrew Miller
2021/158 (PDF ) Two-Round Perfectly Secure Message Transmission with Optimal Transmission Rate Nicolas Resch, Chen Yuan
2021/157 (PDF ) Sycon: A New Milestone in Designing ASCON-like Permutations Kalikinkar Mandal, Dhiman Saha, Sumanta Sarkar, Yosuke Todo
2021/156 (PDF ) Mechanized Proofs of Adversarial Complexity and Application to Universal Composability Manuel Barbosa, Gilles Barthe, Benjamin Grégoire, Adrien Koutsos, Pierre-Yves Strub
2021/155 (PDF ) Exploring Parallelism to Improve the Performance of FrodoKEM in Hardware James Howe, Marco Martinoli, Elisabeth Oswald, Francesco Regazzoni
2021/154 (PDF ) Generating cryptographically-strong random lattice bases and recognizing rotations of $\mathbb{Z}^n$ Tamar Lichter Blanks, Stephen D. Miller
2021/153 (PDF ) On the Isogeny Problem with Torsion Point Information Tako Boris Fouotsa, Péter Kutas, Simon-Philipp Merz, Yan Bo Ti
2021/152 (PDF ) Hybrid Dual Attack on LWE with Arbitrary Secrets Lei Bi, Xianhui Lu, Junjie Luo, Kunpeng Wang, Zhenfei Zhang
2021/151 (PDF ) On Sufficient Oracles for Secure Computation with Identifiable Abort Mark Simkin, Luisa Siniscalchi, Sophia Yakoubov
2021/150 (PDF ) Two-Party Adaptor Signatures From Identification Schemes Andreas Erwig, Sebastian Faust, Kristina Hostáková, Monosij Maitra, Siavash Riahi
2021/149 (PDF ) Quantum Security of the Legendre PRF Paul Frixons, André Schrottenloher
2021/148 (PDF ) On methods of shortening ElGamal-type signatures Liliya Akhmetzyanova, Evgeny Alekseev, Alexandra Babueva, Stanislav Smyshlyaev
2021/147 (PDF ) IPDL: A Simple Framework for Formally Verifying Distributed Cryptographic Protocols Greg Morrisett, Elaine Shi, Kristina Sojakova, Xiong Fan, Joshua Gancher
2021/146 (PDF ) Securely Computing Piecewise Constant Codes Benjamin E. Diamond
2021/145 (PDF ) A Security Framework for Distributed Ledgers Mike Graf, Daniel Rausch, Viktoria Ronge, Christoph Egger, Ralf Kuesters, Dominique Schröder
2021/144 (PDF ) \(\chi\)perbp: a Cloud-based Lightweight Mutual Authentication Protocol Morteza Adeli, Nasour Bagheri, Sadegh Sadeghi, Saru Kumari
2021/143 (PDF ) On Bitcoin Cash’s Target Recalculation Functions Juan Garay, Yu Shen
2021/142 (PDF ) Federated Learning with Local Differential Privacy: Trade-offs between Privacy, Utility, and Communication Muah Kim, Onur Gunlu, Rafael F. Schaefer
2021/141 (PDF ) Advanced Lattice Sieving on GPUs, with Tensor Cores Léo Ducas, Marc Stevens, Wessel van Woerden
2021/140 (PDF ) Practical and Scalable Access Control Mechanism for the Internet of Things Clémentine Gritti, Emanuel Regnath, Sebastian Steinhorst
2021/139 (PDF ) Order-Fair Consensus in the Permissionless Setting Mahimna Kelkar, Soubhik Deb, Sreeram Kannan
2021/138 (PDF ) Classic McEliece Implementation with Low Memory Footprint Johannes Roth, Evangelos Karatsiolis, Juliane Krämer
2021/137 (PDF ) Cryptographic Security of the MLS RFC, Draft 11 Chris Brzuska, Eric Cornelissen, Konrad Kohbrok
2021/136 (PDF ) An approach for designing fast public key encryption systems using white-box cryptography techniques Dmitry Schelkunov
2021/135 (PDF ) Acyclicity Programming for Sigma-Protocols Masayuki Abe, Miguel Ambrona, Andrej Bogdanov, Miyako Ohkubo, Alon Rosen
2021/134 (PDF ) Cryptanalysis of a code-based signature scheme without trapdoors Marco Baldi, Jean-Christophe Deneuville, Edoardo Persichetti, Paolo Santini
2021/133 (PDF ) smartFHE: Privacy-Preserving Smart Contracts from Fully Homomorphic Encryption Ravital Solomon, Ghada Almashaqbeh
2021/132 (PDF ) Privacy-Preserving Feature Selection with Secure Multiparty Computation Xiling Li, Rafael Dowsley, Martine De Cock
2021/131 (PDF ) Privacy-Preserving Video Classification with Convolutional Neural Networks Sikha Pentyala, Rafael Dowsley, Martine De Cock
2021/130 (PDF ) Ready-Made Short Basis for GLV+GLS on High Degree Twisted Curves Bei Wang, Songsong Li, Yi Ouyang, Honggang Hu
2021/129 (PDF ) Lattice-based weak curve fault attack on ECDSA Weiqiong Cao, Hongsong Shi, Hua Chen, Wei Wei
2021/128 (PDF ) Designing Tweakable Enciphering Schemes Using Public Permutations Debrup Chakraborty, Avijit Dutta, Samir Kundu
2021/127 (PDF ) Cuproof: A Novel Range Proof with Constant Size Cong Deng, Xianghong Tang, Lin You, Gengran Hu, Shuhong Gao
2021/126 (PDF ) Observer Attack on Stream Ciphers Ramachandran Anantharaman, Virendra Sule
2021/125 (PDF ) Privacy Preserving and Resilient RPKI Kris Shrishak, Haya Shulman
2021/124 (PDF ) Efficient Number Theoretic Transform Implementation on GPU for Homomorphic Encryption Ozgun Ozerk, Can Elgezen, Ahmet Can Mert, Erdinc Ozturk, Erkay Savas
2021/123 (PDF ) A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs Yue Qin, Chi Cheng, Xiaohan Zhang, Yanbin Pan, Lei Hu, Jintai Ding
2021/122 (PDF ) PSImple: Practical Multiparty Maliciously-Secure Private Set Intersection Aner Ben Efraim, Olga Nissenbaum, Eran Omri, Anat Paskin-Cherniavsky
2021/121 (PDF ) BooLigero: Improved Sublinear Zero Knowledge Proofs for Boolean Circuits Yaron Gvili, Sarah Scheffler, Mayank Varia
2021/120 (PDF ) Large Scale, Actively Secure Computation from LPN and Free-XOR Garbled Circuits Aner Ben-Efraim, Kelong Cong, Eran Omri, Emmanuela Orsini, Nigel P. Smart, Eduardo Soria-Vazquez
2021/119 (PDF ) Rabbit: Efficient Comparison for Secure Multi-Party Computation Eleftheria Makri, Dragos Rotaru, Frederik Vercauteren, Sameer Wagh
2021/118 (PDF ) High-Threshold AVSS with Optimal Communication Complexity Nicolas Alhaddad, Mayank Varia, Haibin Zhang
2021/117 (PDF ) FPPW: A Fair and Privacy Preserving Watchtower For Bitcoin Arash Mirzaei, Amin Sakzad, Jiangshan Yu, Ron Steinfeld
2021/116 (PDF ) MAKE: a Matrix Action Key Exchange Nael Rahman, Vladimir Shpilrain
2021/115 (PDF ) Fast Strategies for the Implementation of SIKE Round 3 on ARM Cortex-M4 Mila Anastasova, Reza Azarderakhsh, Mehran Mozaffari Kermani
2021/114 (PDF ) Security Analysis of CPace Michel Abdalla, Björn Haase, Julia Hesse
2021/113 (PDF ) Improvement of Secure Multi-Party Multiplication of (k,n) Threshold Secret Sharing Using Only N=k Servers (Revised Version) Ahmad Akmal Aminuddin Mohd Kamal, Keiichi Iwamura
2021/111 (PDF ) A note on Post Quantum Onion Routing Kelesidis Evgnosia-Alexandra
2021/110 (PDF ) Replacing Probability Distributions in Security Games via Hellinger Distance Kenji Yasunaga
2021/109 (PDF ) Sequential Logic Encryption Against Model Checking Attack Amin Rezaei, Hai Zhou
2021/108 (PDF ) Implementing CRYSTALS-Dilithium Signature Scheme on FPGAs Sara Ricci, Lukas Malina, Petr Jedlicka, David Smekal, Jan Hajny, Petr Cibik, Patrik Dobias
2021/107 (PDF ) A Decentralized and Encrypted National Gun Registry Seny Kamara, Tarik Moataz, Andrew Park, Lucy Qin
2021/106 (PDF ) MERCAT: Mediated, Encrypted, Reversible, SeCure Asset Transfers Aram Jivanyan, Jesse Lancaster, Arash Afshar, Parnian Alimi
2021/105 (PDF ) A New Efficient Identity-Based Encryption Without Pairing Majid Salimi
2021/104 (PDF ) Attacking and Defending Masked Polynomial Comparison for Lattice-Based Cryptography Shivam Bhasin, Jan-Pieter D'Anvers, Daniel Heinz, Thomas Pöppelmann, Michiel Van Beirendonck
2021/103 (PDF ) RUP Security of the SAEF Authenticated Encryption mode Elena Andreeva, Amit Singh Bhati, Damian Vizar
2021/102 (PDF ) A Note on Advanced Encryption Standard with Galois/Counter Mode Algorithm Improvements and S-Box Customization Madalina Chirita, Alexandru-Mihai Stroie, Andrei-Daniel Safta, Emil Simion
2021/101 (PDF ) Combined Fault and DPA Protection for Lattice-Based Cryptography Daniel Heinz, Thomas Pöppelmann
2021/100 (PDF ) SPURT: Scalable Distributed Randomness Beacon with Transparent Setup Sourav Das, Vinith Krishnan, Irene Miriam Isaac, Ling Ren
2021/099 (PDF ) Property Inference from Poisoning Melissa Chase, Esha Ghosh, Saeed Mahloujifar
2021/098 (PDF ) Image sets of perfectly nonlinear maps Lukas Kölsch, Björn Kriepke, Gohar Kyureghyan
2021/097 (PDF ) A New and Improved Reduction Proof of Cascade PRF Mridul Nandi
2021/096 (PDF ) Gladius: LWR based efficient hybrid public key encryption with distributed decryption Kelong Cong, Daniele Cozzo, Varun Maram, Nigel P. Smart
2021/095 (PDF ) Collusion-Deterrent Threshold Information Escrow Easwar Vivek Mangipudi, Donghang Lu, Alexandros Psomas, Aniket Kate
2021/094 (PDF ) Reducing HSM Reliance in Payments through Proxy Re-Encryption Sivanarayana Gaddam, Atul Luykx, Rohit Sinha, Gaven Watson
2021/093 (PDF ) Response-Hiding Encrypted Ranges: Revisiting Security via Parametrized Leakage-Abuse Attacks Evgenios M. Kornaropoulos, Charalampos Papamanthou, Roberto Tamassia
2021/092 (PDF ) New Public Key Cryptosystem (First Version) Dieaa I. Nassr, M. Anwar, Hatem M. Bahig
2021/091 (PDF ) Programmable Bootstrapping Enables Efficient Homomorphic Inference of Deep Neural Networks Ilaria Chillotti, Marc Joye, Pascal Paillier
2021/090 (PDF ) A New Twofold Cornacchia-Type Algorithm and Its Applications Bei Wang, Yi Ouyang, Honggang Hu, Songsong Li
2021/089 (PDF ) Fuzzy Message Detection Gabrielle Beck, Julia Len, Ian Miers, Matthew Green
2021/088 (PDF ) An Overview of the Hybrid Argument Marc Fischlin, Arno Mittelbach
2021/087 (PDF ) ZEN: An Optimizing Compiler for Verifiable, Zero-Knowledge Neural Network Inferences Boyuan Feng, Lianke Qin, Zhenfei Zhang, Yufei Ding, Shumo Chu
2021/086 (PDF ) On Elapsed Time Consensus Protocols Mic Bowman, Debajyoti Das, Avradip Mandal, Hart Montgomery
2021/085 (PDF ) Complete Analysis of Implementing Isogeny-based Cryptography using Huff Form of Elliptic Curves Suhri Kim
2021/084 (PDF ) Ariadne Thread and Pepper: New Multivariate Cryptographic Schemes with Public Keys in Degree 3 Gilles Macario-Rat, Jacques Patarin
2021/083 (PDF ) The Bluetooth CYBORG: Analysis of the Full Human-Machine Passkey Entry AKE Protocol Michael Troncoso, Britta Hale
2021/082 (PDF ) Grades of Trust in Multiparty Computation Jaskaran V. Singh, Nicholas Hopper
2021/081 (PDF ) Private Stream Aggregation from Labeled Secret Sharing Schemes Hendrik Waldner, Tilen Marc, Miha Stopar, Michel Abdalla
2021/080 (PDF ) Error Term Checking: Towards Chosen Ciphertext Security without Re-encryption Jan-Pieter D'Anvers, Emmanuela Orsini, Frederik Vercauteren
2021/079 (PDF ) A Side-Channel Attack on a Masked IND-CCA Secure Saber KEM Kalle Ngo, Elena Dubrova, Qian Guo, Thomas Johansson
2021/078 (PDF ) An Incentive-Compatible Smart Contract for Decentralized Commerce Nikolaj I. Schwartzbach
2021/077 (PDF ) Magnetic RSA Rémi Géraud-Stewart, David Naccache
2021/076 (PDF ) QuickSilver: Efficient and Affordable Zero-Knowledge Proofs for Circuits and Polynomials over Any Field Kang Yang, Pratik Sarkar, Chenkai Weng, Xiao Wang
2021/075 (PDF ) A Generalization of the Subfield Construction Kamil Otal
2021/074 (PDF ) Cross-Domain Attribute-Based Access Control Encryption Mahdi Sedaghat, Bart Preneel
2021/073 (PDF ) Application of Velusqrt algorithm to Huff's and general Huff's curves Michał Wroński
2021/072 (PDF ) Toward Practical Autoencoder-based Side-Channel Analysis Evaluations Servio Paguada, Lejla Batina, Igor Armendariz
2021/071 (PDF ) Reinforcement Learning for Hyperparameter Tuning in Deep Learning-based Side-channel Analysis Jorai Rijsdijk, Lichao Wu, Guilherme Perin, Stjepan Picek
2021/070 (PDF ) Secure, Accurate, and Practical Narrow-Band Ranging System Aysajan Abidin, Mohieddine El Soussi, Jac Romme, Pepijn Boer, Dave Singelée, Christian Bachmann
2021/069 (PDF ) Fast Privacy-Preserving Text Classification based on Secure Multiparty Computation Amanda Resende, Davis Railsback, Rafael Dowsley, Anderson C. A. Nascimento, Diego F. Aranha
2021/068 (PDF ) Banquet: Short and Fast Signatures from AES Carsten Baum, Cyprien Delpech de Saint Guilhem, Daniel Kales, Emmanuela Orsini, Peter Scholl, Greg Zaverucha
2021/067 (PDF ) Analysis and Comparison of Table-based Arithmetic to Boolean Masking Michiel Van Beirendonck, Jan-Pieter D’Anvers, Ingrid Verbauwhede
2021/066 (PDF ) A Deep Learning Approach for Active S-box Prediction of Lightweight Generalized Feistel Block Ciphers Mohamed Fadl Idris, Je Sen Teh, Jasy Liew Suet Yan, Wei-Zhu Yeoh
2021/065 (PDF ) FPGA Offloading for Diffie-Hellman Key Exchangeusing Elliptic Curves Dorin-Marian Ionita, Emil Simion
2021/064 (PDF ) Fault Attacks on CCA-secure Lattice KEMs Peter Pessl, Lukas Prokop
2021/063 (PDF ) CYBERCRYPT: Learn Basic Cryptographic Concepts while Playing Monir Azraoui, Solenn Brunet, Sébastien Canard, Aïda Diop, Lélia Eveillard, Alicia Filipiak, Adel Hamdi, Flavie Misarsky, Donald Nokam Kuate, Marie Paindavoine, Quentin Santos, Bastien Vialla
2021/062 (PDF ) Compressed Permutation Oracles (And the Collision-Resistance of Sponge/SHA3) Dominique Unruh
2021/061 (PDF ) A Note on IBE Performance of a Practical Application Ştefan Maftei, Marius Supuran, Emil Simion
2021/060 (PDF ) UC Non-Interactive, Proactive, Threshold ECDSA with Identifiable Aborts Ran Canetti, Rosario Gennaro, Steven Goldfeder, Nikolaos Makriyannis, Udi Peled
2021/059 (PDF ) The Cost of Adaptivity in Security Games on Graphs Chethan Kamath, Karen Klein, Krzysztof Pietrzak, Michael Walter
2021/058 (PDF ) A Performance Study of Crypto-Hardware in the Low-end IoT Peter Kietzmann, Lena Boeckmann, Leandro Lanzieri, Thomas C. Schmidt, Matthias Wählisch
2021/057 (PDF ) Correlation Intractability vs. One-wayness Tamer Mour
2021/056 (PDF ) The Study of Modulo $2^n$ Zhongfeng Niu
2021/055 (PDF ) Tech Report: Inerial HSMs Thwart Advanced Physical Attacks Jan Sebastian Götte, Björn Scheuermann
2021/054 (PDF ) The Cost of IEEE Arithmetic in Secure Computation David W. Archer, Shahla Atapoor, Nigel P. Smart
2021/053 (PDF ) On Algebraic Embedding for Unstructured Lattices Madalina Bolboceanu, Zvika Brakerski, Devika Sharma
2021/052 (PDF ) Elementary Attestation of Cryptographically Useful Composite Moduli Rémi Géraud-Stewart, David Naccache
2021/051 (PDF ) How Much can F5 Really Do Jintai Ding, Zheng Zhang, Joshua Deaton
2021/050 (PDF ) The Distinguishing Attack on HFE Joshua Deaton, Jintai Ding
2021/049 (PDF ) ASIC Benchmarking of Round 2 Candidates in the NIST Lightweight Cryptography Standardization Process Mark D. Aagaard, Nusa Zidaric
2021/048 (PDF ) Efficient Lattice Gadget Decomposition Algorithm with Bounded Uniform Distribution Sohyun Jeon, Hyang-Sook Lee, Jeongeun Park
2021/047 (PDF ) Evolution of Bulletin Board & its application to E-Voting – A Survey Misni Harjo Suwito, Yoshifumi Ueshige, Kouichi Sakurai
2021/046 (PDF ) Efficient Lattice-Based Inner-Product Functional Encryption Jose Maria Bermudo Mera, Angshuman Karmakar, Tilen Marc, Azam Soleimanian
2021/045 (PDF ) Banners: Binarized Neural Networks with Replicated Secret Sharing Alberto Ibarrondo, Hervé Chabanne, Melek Önen
2021/044 (PDF ) Addra: Metadata-private voice communication over fully untrusted infrastructure Ishtiyaque Ahmad, Yuntian Yang, Divyakant Agrawal, Amr El Abbadi, Trinabh Gupta
2021/043 (PDF ) Combining Montgomery Multiplication with Tag Tracing for the Pollard's Rho Algorithm in Prime Order Fields Madhurima Mukhopadhyay, Palash Sarkar
2021/042 (PDF ) Correcting Subverted Random Oracles Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou, Jiadong Zhu
2021/041 (PDF ) Post-Quantum LMS and SPHINCS+ Hash-Based Signatures for UEFI Secure Boot Panos Kampanakis, Peter Panburana, Michael Curcio, Chirag Shroff, Md Mahbub Alam
2021/040 (PDF ) On the tropical discrete logarithm problem and security of a protocol based on tropical semidirect product Any Muanalifah, Serge˘ı Sergeev
2021/039 (PDF ) Practical FHE parameters against lattice attacks Jung Hee Cheon, Yongha Son, Donggeon Yhee
2021/038 (PDF ) Streaming Merkle Proofs within Binary Numeral Trees Luke Champine
2021/037 (PDF ) New First-Order Secure AES Performance Records Aein Rezaei Shahmirzadi, Dušan Božilov, Amir Moradi
2021/036 (PDF ) The Cryptographic Complexity of Anonymous Coins: A Systematic Exploration Niluka Amarasinghe, Xavier Boyen, Matthew McKague
2021/035 (PDF ) Sketches for Blockchains Ori Rottenstreich
2021/034 (PDF ) Circuit-PSI with Linear Complexity via Relaxed Batch OPPRF Nishanth Chandran, Divya Gupta, Akash Shah
2021/033 (PDF ) Quantum-resistant Anonymous IBE with Traceable Identities Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen
2021/032 (PDF ) Experimental relativistic zero-knowledge proofs Pouriya Alikhani, Nicolas Brunner, Claude Crépeau, Sébastien Designolle, Raphaël Houlmann, Weixu Shi, Hugo Zbinden
2021/031 (PDF ) A Comparative Study of Cryptographic Key Distribution Protocols Alexandru-Ștefan Gheorghieș, Darius-Marian Lăzăroi, Emil Simion
2021/030 (PDF ) Linear-time and post-quantum zero-knowledge SNARKs for R1CS Jonathan Lee, Srinath Setty, Justin Thaler, Riad Wahby
2021/029 (PDF ) EPISODE: Efficient Privacy-PreservIng Similar Sequence Queries on Outsourced Genomic DatabasEs Thomas Schneider, Oleksandr Tkachenko
2021/028 (PDF ) A Side Journey to Titan Victor LOMNE, Thomas ROCHE
2021/027 (PDF ) E-voting protocols in context of COVID19 Sfirnaciuc Emilia, Vasilescu Miruna-Elena, Simion Emil
2021/026 (PDF ) A Gapless Code-Based Hash Proof System based on RQC and its Applications Slim Bettaieb, Loïc Bidoux, Olivier Blazy, Yann Connan, Philippe Gaborit
2021/025 (PDF ) FLAME: Taming Backdoors in Federated Learning Thien Duc Nguyen, Phillip Rieger, Huili Chen, Hossein Yalame, Helen Möllering, Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Shaza Zeitouni, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider
2021/024 (PDF ) PQC: R-Propping of Burmester-Desmedt Conference Key Distribution System Pedro Hecht
2021/023 (PDF ) What is Meant by Permissionless Blockchains? Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Andreas Kern, Walid Fdhila
2021/022 (PDF ) Increasing Precision of Division Property Patrick Derbez, Pierre-Alain Fouque
2021/021 (PDF ) Fake Near Collisions Attacks Patrick Derbez, Pierre-Alain Fouque, Victor Mollimard
2021/020 (PDF ) Catching the Fastest Boomerangs - Application to SKINNY Stéphanie Delaune, Patrick Derbez, Mathieu Vavrille
2021/019 (PDF ) Kummer versus Montgomery Face-off over Prime Order Fields Kaushik Nath, Palash Sarkar
2021/018 (PDF ) Comments on ``On the Design of Conditional Privacy Preserving Batch Verification-Based Authentication Scheme for Internet of Vehicles Deployment'' Yuhao Yang, Xiujie Huang
2021/017 (PDF ) Lightweight Techniques for Private Heavy Hitters Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, Yuval Ishai
2021/016 (PDF ) Black-Box Uselessness: Composing Separations in Cryptography Geoffroy Couteau, Pooya Farshim, Mohammad Mahmoody
2021/015 (PDF ) SoK: Remote Power Analysis Macarena C. Martínez-Rodríguez, Ignacio M. Delgado-Lozano, Billy Bob Brumley
2021/013 (PDF ) An atlas of the Richelot isogeny graph Enric Florit, Benjamin Smith
2021/012 (PDF ) Automorphisms and isogeny graphs of abelian varieties, with applications to the superspecial Richelot isogeny graph Enric Florit, Benjamin Smith
2021/011 (PDF ) Complete solution over $\GF{p^n}$ of the equation $X^{p^k+1}+X+a=0$ Kwang Ho Kim, Jong Hyok Choe, Sihem Mesnager
2021/010 (PDF ) Compcrypt -- Lightweight ANS-based Compression and Encryption Seyit Camtepe, Jarek Duda, Arash Mahboubi, Pawel Morawiecki, Surya Nepal, Marcin Pawlowski, Josef Pieprzyk
2021/009 (PDF ) Demand-aware Channel Topologies for Off-chain Blockchain Payments Julia Khamis, Ori Rottenstreich
2021/008 (PDF ) A Family of Nonlinear MDS Diffusion Layers over $\mathbb{F}_{2^{4n}}$ M. R. Mirzaee Shamsabad, S. M. Dehnavi
2021/007 (PDF ) Notes on a lattice-based proxy-oriented identity-based encryption with keyword search Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Cheng-Yi Lee
2021/006 (PDF ) Privacy-Preserving Privacy Profile Proposal Protocol Wyatt Howe, Andrei Lapets
2021/005 (PDF ) Aggregatable Distributed Key Generation Kobi Gurkan, Philipp Jovanovic, Mary Maller, Sarah Meiklejohn, Gilad Stern, Alin Tomescu
2021/004 (PDF ) LLMonPro: Low-Latency Montgomery Modular Multiplication Suitable for Verifiable Delay Functions Ismail San
2021/003 (PDF ) Ciphertext Policy Attribute Based Encryption for Arithmetic circuits Mahdi Mahdavi Oliaee, Zahra Ahmadian
2021/002 (PDF ) Can Lattice Signature be as Efficient as Lattice Encryption? Dingfeng Ye
2021/001 (PDF ) 2-Step Multi-Client Quadratic Functional Encryption from Decentralized Function-Hiding Inner-Product Michel Abdalla, David Pointcheval, Azam Soleimanian
2020/1620 (PDF ) Neural Aided Statistical Attack for Cryptanalysis Yi Chen, Yantian Shen, Hongbo Yu, Sitong Yuan
2020/1619 (PDF ) Getting Rid of Linear Algebra in Number Theory Problems Paul Kirchner, Pierre-Alain Fouque
2020/1618 (PDF ) Proof-Carrying Data without Succinct Arguments Benedikt Bünz, Alessandro Chiesa, William Lin, Pratyush Mishra, Nicholas Spooner
2020/1617 (PDF ) Arguments of Knowledge via hidden order groups Steve Thakur
2020/1616 (PDF ) Algebraic Geometric Secret Sharing Schemes over Large Fields Are Asymptotically Threshold Fan Peng, Hao Chen, Chang-An Zhao
2020/1615 (PDF ) An Ideal Compartmented Secret Sharing Scheme Based on Linear Homogeneous Recurrence Relations Jiangtao Yuan, Guoai Xu, Guosheng Xu
2020/1614 (PDF ) SoK: Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies Aljosha Judmayer, Nicholas Stifter, Alexei Zamyatin, Itay Tsabary, Ittay Eyal, Peter Gaži, Sarah Meiklejohn, Edgar Weippl
2020/1613 (PDF ) Lockable Signatures for Blockchains: Scriptless Scripts for All Signatures Sri Aravinda Krishnan Thyagarajan, Giulio Malavolta
2020/1612 (PDF ) A New Efficient Hierarchical Multi-secret Sharing Scheme Based on Linear Homogeneous Recurrence Relations Jiangtao Yuan, Jing Yang, Guoai Xu, Xingxing Jia, Fang-wei Fu, Chenyu Wang
2020/1611 (PDF ) SLAP: Simple Lattice-Based Private Stream Aggregation Protocol Jonathan Takeshita, Ryan Karl, Ting Gong, Taeho Jung
2020/1610 (PDF ) New directions in the ransomware phenomenon Mihai-Andrei Costandache, Marian-Stefan Mihalache, Emil Simion
2020/1609 (PDF ) A new method for secondary constructions of vectorial bent functions Amar Bapić, Enes Pasalic
2020/1608 (PDF ) Cryptographic competitions Daniel J. Bernstein
2020/1607 (PDF ) Manta: Privacy Preserving Decentralized Exchange Shumo Chu, Qiudong Xia, Zhenfei Zhang
2020/1606 (PDF ) PEGASUS: Bridging Polynomial and Non-polynomial Evaluations in Homomorphic Encryption Wen-jie Lu, Zhicong Huang, Cheng Hong, Yiping Ma, Hunter Qu
2020/1605 (PDF ) $P_4$-free Partition and Cover Numbers and Application Alexander R. Block, Simina Branzei, Hemanta K. Maji, Himanshi Mehta, Tamalika Mukherjee, Hai H. Nguyen
2020/1604 (PDF ) An Embedded Domain-Specific Language for Logical Circuit Descriptions with Applications to Garbled Circuits Andrei Lapets, Wyatt Howe, Ben Getchell, Frederick Jansen
2020/1603 (PDF ) One-Time Delegation of Unlinkable Signing Rights and Its Application Takashi Nishide
2020/1602 (PDF ) Speeding-up Ideal Lattice-Based Key Exchange Using a RSA/ECC Coprocessor Aurélien Greuet, Simon Montoya, Guénaël Renault
2020/1601 (PDF ) Adaptive layer-two dispute periods in blockchains Rami Khalil, Naranker Dulay
2020/1600 (PDF ) Auto-tune POIs: Estimation of distribution algorithms for efficient side-channel analysis Unai Rioja, Lejla Batina, Jose Luis Flores, Igor Armendariz
2020/1599 (PDF ) Function Secret Sharing for PSI-CA: With Applications to Private Contact Tracing Samuel Dittmer, Yuval Ishai, Steve Lu, Rafail Ostrovsky, Mohamed Elsabagh, Nikolaos Kiourtis, Brian Schulte, Angelos Stavrou
2020/1598 (PDF ) MILP Based Differential Attack on Round Reduced WARP Manoj Kumar, Tarun Yadav
2020/1597 (PDF ) A New Improved AES S-box With Enhanced Properties Abderrahmane Nitaj, Willy Susilo, Joseph Tonien
2020/1596 (PDF ) Batched Differentially Private Information Retrieval Kinan Dak Albab, Rawane Issa, Mayank Varia, Kalman Graffi
2020/1595 (PDF ) Attacks on Beyond-Birthday-Bound MACs in the Quantum Setting Tingting Guo, Peng Wang, Lei Hu, Dingfeng Ye
2020/1594 (PDF ) Bootstrapping on SEAL HyungChul Kang, Joon-Woo Lee, Yongwoo Lee, Young-Sik Kim, Jong-Seon No
2020/1593 (PDF ) Towards Post-Quantum Updatable Public-Key Encryption via Supersingular Isogenies Edward Eaton, David Jao, Chelsea Komlo, Youcef Mokrani
2020/1592 (PDF ) Puncturable Pseudorandom Sets and Private Information Retrieval with Near-Optimal Online Bandwidth and Time Elaine Shi, Waqar Aqeel, Balakrishnan Chandrasekaran, Bruce Maggs
2020/1591 (PDF ) Game-Theoretic Fairness Meets Multi-Party Protocols: The Case of Leader Election Kai-Min Chung, T-H. Hubert Chan, Ting Wen, Elaine Shi
2020/1590 (PDF ) RandPiper -- Reconfiguration-Friendly Random Beacons with Quadratic Communication Adithya Bhat, Nibesh Shrestha, Aniket Kate, Kartik Nayak
2020/1589 (PDF ) Unifying Presampling via Concentration Bounds Siyao Guo, Qian Li, Qipeng Liu, Jiapeng Zhang
2020/1588 (PDF ) Deniable Fully Homomorphic Encryption from LWE Shweta Agrawal, Shafi Goldwasser, Saleet Mossel
2020/1587 (PDF ) On the properties of the Boolean functions associated to the differential spectrum of general APN functions and their consequences Claude Carlet
2020/1586 (PDF ) CirC: Compiler infrastructure for proof systems, software verification, and more Alex Ozdemir, Fraser Brown, Riad S. Wahby
2020/1585 (PDF ) Semi-Regularity of Pairs of Boolean Polynomials Timothy J. Hodges, Hari R. Iyer
2020/1584 (PDF ) Post-Quantum Hash-Based Signatures for Secure Boot Panos Kampanakis, Peter Panburana, Michael Curcio, Chirag Shroff
2020/1583 (PDF ) HERMES: Scalable, Secure, and Privacy-Enhancing Vehicle Access System Iraklis Symeonidis, Dragos Rotaru, Mustafa A. Mustafa, Bart Mennink, Bart Preneel, Panos Papadimitratos
2020/1582 (PDF ) A New Method for Designing Lightweight S-boxes with High Differential and Linear Branch Numbers, and Its Application Hangi Kim, Yongjin Jeon, Giyoon Kim, Jongsung Kim, Bo-Yeon Sim, Dong-Guk Han, Hwajeong Seo, Seonggyeom Kim, Seokhie Hong, Jaechul Sung, Deukjo Hong
2020/1581 (PDF ) Remark on the Security of CKKS Scheme in Practice Jung Hee Cheon, Seungwan Hong, Duhyeong Kim
2020/1580 (PDF ) Achieving State Machine Replication without Honest Players Conor McMenamin, Vanesa Daza, Matteo Pontecorvi
2020/1579 (PDF ) Efficient Verifiable Image Redacting based on zk-SNARKs Hankyung Ko, Ingeun Lee, Seunghwa Lee, Jihye Kim, Hyunok Oh
2020/1578 (PDF ) An IND-CCA2 Attack Against the 1st- and 2nd-round Versions of NTS-KEM Tung Chou
2020/1577 (PDF ) Multi-Party Replicated Secret Sharing over a Ring with Applications to Privacy-Preserving Machine Learning Alessandro Baccarini, Marina Blanton, Chen Yuan
2020/1576 (PDF ) How to Make Private Distributed Cardinality Estimation Practical, and Get Differential Privacy for Free Changhui Hu, Jin Li, Zheli Liu, Xiaojie Guo, Yu Wei, Xuan Guang, Grigorios Loukides, Changyu Dong
2020/1575 (PDF ) (In)security of the Radio Interface in Sigfox Loïc Ferreira
2020/1574 (PDF ) Analysing Mining Machine Shutdown Price Shange Fu, Jiangshan Yu, Rafael Dowsley, Joseph Liu
2020/1573 (PDF ) Halo 0.9: A Halo Protocol with Fully-Succinctness Lira Wang
2020/1571 (PDF ) Hardware Security without Secure Hardware: How to Decrypt with a Password and a Server Olivier Blazy, Laura Brouilhet, Celine Chevalier, Patrick Towa, Ida Tucker, Damien Vergnaud
2020/1570 (PDF ) Secret Key Agreement with Physical Unclonable Functions: An Optimality Summary Onur Gunlu, Rafael F. Schaefer
2020/1569 (PDF ) Optimal Communication Complexity of Authenticated Byzantine Agreement Atsuki Momose, Ling Ren
2020/1568 (PDF ) Compact Certificates of Collective Knowledge Silvio Micali, Leonid Reyzin, Georgios Vlachos, Riad S. Wahby, Nickolai Zeldovich
2020/1567 (PDF ) Secure Decentralized Access Control Policy for Data Sharing in Smart Grid Yadi Ye, Leyou Zhang, Yi Mu, Wenting You
2020/1566 (PDF ) An efficient and provably secure authenticated key agreement scheme for mobile edge computing Mohammad Amin Rakeei, Farokhlagha Moazami
2020/1565 (PDF ) Achieving privacy and accountability in traceable digital currency Amira Barki, Aline Gouget
2020/1564 (PDF ) Prime Proof Protocol Anna M. Johnston, Rathna Ramesh
2020/1563 (PDF ) Verifiable Timed Signatures Made Practical Sri Aravinda KrishnanThyagarajan, Adithya Bhat, Giulio Malavolta, Nico Döttling, Aniket Kate, Dominique Schröder
2020/1562 (PDF ) A complete study of two classes of Boolean functions for homomorphic-friendly stream ciphers Claude Carlet, Pierrick Méaux
2020/1561 (PDF ) Cryptonite: A Framework for Flexible Time-Series Secure Aggregation with Online Fault Tolerance Ryan Karl, Jonathan Takeshita, Nirajan Koirla, Taeho Jung
2020/1560 (PDF ) Modified Cache Template Attack on AES Mahdi Esfahani, Hadi Soleimany, Mohammad Reza Aref
2020/1559 (PDF ) On Exploiting Message Leakage in (few) NIST PQC Candidates for Practical Message Recovery and Key Recovery Attacks Prasanna Ravi, Shivam Bhasin, Sujoy Sinha Roy, Anupam Chattopadhyay
2020/1558 (PDF ) Double-Odd Elliptic Curves Thomas Pornin
2020/1557 (PDF ) Efficient Quantum Public-Key Encryption From Learning With Errors Javad Doliskani
2020/1556 (PDF ) Honest Majority MPC with Abort with Minimal Online Communication Daniel Escudero, Anders Dalskov
2020/1555 (PDF ) Limits on the Efficiency of (Ring) LWE based Non-Interactive Key Exchange Siyao Guo, Pritish Kamath, Alon Rosen, Katerina Sotiraki
2020/1554 (PDF ) DNFA: Differential No-Fault Analysis of Bit Permutation Based Ciphers Assisted by Side-Channel Xiaolu Hou, Jakub Breier, Shivam Bhasin
2020/1553 (PDF ) A Novel Asymmetric Searchable Encryption Scheme with Granting search capability Arian Arabnouri, Reza Ebrahimi Atani, Shiva Azizzadeh
2020/1552 (PDF ) Threshold Password-Hardened Encryption Services Julian Brost, Christoph Egger, Russell W. F. Lai, Fritz Schmid, Dominique Schröder, Markus Zoppelt
2020/1551 (PDF ) Multi-Client Oblivious RAM with Poly-Logarithmic Communication Sherman S. M. Chow, Katharina Fech, Russell W. F. Lai, Giulio Malavolta
2020/1550 (PDF ) Foundations of Ring Sampling Viktoria Ronge, Christoph Egger, Russell W. F. Lai, Dominique Schröder, Hoover H. F. Yin
2020/1549 (PDF ) High-Precision Bootstrapping for Approximate Homomorphic Encryption by Error Variance Minimization Yongwoo Lee, Joon-Woo Lee, Young-Sik Kim, Yongjune Kim, Jong-Seon No, HyungChul Kang
2020/1548 (PDF ) CCA-Secure (Puncturable) KEMs from Encryption With Non-Negligible Decryption Errors Valerio Cini, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks
2020/1547 (PDF ) Two-server Distributed ORAM with Sublinear Computation and Constant Rounds Ariel Hamlin, Mayank Varia
2020/1546 (PDF ) Privacy-Preserving Epidemiological Modeling on Mobile Graphs Daniel Günther, Marco Holz, Benjamin Judkewitz, Helen Möllering, Benny Pinkas, Thomas Schneider, Ajith Suresh
2020/1545 (PDF ) A Tutorial on the Implementation of Block Ciphers: Software and Hardware Applications Howard M. Heys
2020/1544 (PDF ) PAS-TA-U: PASsword-based Threshold Authentication with PASsword Update Rachit Rawat, Mahabir Prasad Jhanwar
2020/1543 (PDF ) CovidBloc: A Blockchain Powered Exposure Database for Contact Tracing Deepraj Pandey, Nandini Agrawal, Mahabir Prasad Jhanwar
2020/1542 (PDF ) Feeding Three Birds With One Scone: A Generic Duplication Based Countermeasure To Fault Attacks (Extended Version) Anubhab Baksi, Shivam Bhasin, Jakub Breier, Anupam Chattopadhyay, Vinay B. Y. Kumar
2020/1541 (PDF ) A Framework of Private Set Intersection Protocols. Ziyuan Liang, Weiran Liu, Fan Zhang, Bingsheng Zhang, Jian Liu, Lei Zhang, Kui Ren
2020/1540 (PDF ) On Bounded Distance Decoding with Predicate: Breaking the "Lattice Barrier" for the Hidden Number Problem Martin R. Albrecht, Nadia Heninger
2020/1539 (PDF ) Information-Theoretic Security of Cryptographic Channels Marc Fischlin, Felix Günther, Philipp Muth
2020/1538 (PDF ) Homological Characterization of bounded $F_2$-regularity Timothy J. Hodges, Sergio Molina
2020/1536 (PDF ) Halo Infinite: Recursive zk-SNARKs from any Additive Polynomial Commitment Scheme Dan Boneh, Justin Drake, Ben Fisch, Ariel Gabizon
2020/1535 (PDF ) Designer Primes Anna M. Johnston
2020/1534 (PDF ) Improved Differential Fault Attack on LEA by Algebraic Representation of Modular Addition SeongHyuck Lim, JongHyeok Lee, Dong-Guk Han
2020/1533 (PDF ) On the Security of Homomorphic Encryption on Approximate Numbers Baiyu Li, Daniele Micciancio
2020/1532 (PDF ) Oblivious Pseudorandom Functions from Isogenies Dan Boneh, Dmitry Kogan, Katharine Woo
2020/1531 (PDF ) Reconstructing with Less: Leakage Abuse Attacks in Two-Dimensions Evangelia Anna Markatou, Francesca Falzon, William Schor, Roberto Tamassia
2020/1530 (PDF ) Security Analysis of Public Key Searchable Encryption Schemes against Injection Attacks Arian Arabnouri, Reza Ebrahimi Atani, Shiva Azizzadeh
2020/1529 (PDF ) Bounds on the nonlinearity of differentially uniform functions by means of their image set size, and on their distance to affine functions Claude Carlet
2020/1528 (PDF ) On the Concurrent Composition of Quantum Zero-Knowledge Prabhanjan Ananth, Kai-Min Chung, Rolando L. La Placa
2020/1527 (PDF ) Zero-Knowledge IOPs with Linear-Time Prover and Polylogarithmic-Time Verifier Jonathan Bootle, Alessandro Chiesa, Siqi Liu
2020/1526 (PDF ) Flexible and Efficient Verifiable Computation on Encrypted Data Alexandre Bois, Ignacio Cascudo, Dario Fiore, Dongwoo Kim
2020/1525 (PDF ) BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures Cas Cremers, Samed Düzlü, Rune Fiedler, Marc Fischlin, Christian Janson
2020/1524 (PDF ) Nonce-Misuse Security of the SAEF Authenticated Encryption mode Elena Andreeva, Amit Singh Bhati, Damian Vizar
2020/1523 (PDF ) Revisiting the Security of DbHtS MACs: Beyond-Birthday-Bound in the Multi-User Setting Yaobin Shen, Lei Wang, Dawu Gu, Jian Weng
2020/1522 (PDF ) Reducing Participation Costs via Incremental Verification for Ledger Systems Weikeng Chen, Alessandro Chiesa, Emma Dauterman, Nicholas P. Ward
2020/1521 (PDF ) Delegated RingCT: faster anonymous transactions Rui Morais, Paul Crocker, Simao Melo de Sousa
2020/1520 (PDF ) The SQALE of CSIDH: Sublinear Vélu Quantum-resistant isogeny Action with Low Exponents Jorge Chávez-Saab, Jesús-Javier Chi-Domínguez, Samuel Jaques, Francisco Rodríguez-Henríquez
2020/1519 (PDF ) Privacy-Preserving Authenticated Key Exchange and the Case of IKEv2 Sven Schäge, Jörg Schwenk, Sebastian Lauer
2020/1518 (PDF ) Botnet IND: About Botnets of Botless IoT Devices Ben Nassi, Yair Meidan, Dudi Nassi, Asaf Shabtai, Yuval Elovici
2020/1517 (PDF ) Constructing Locally Leakage-resilient Linear Secret-sharing Schemes Hemanta Maji, Anat Paskin-Cherniavsky, Tom Suad, Mingyuan Wang
2020/1516 (PDF ) How to compute all Pointproofs Alin Tomescu
2020/1515 (PDF ) The classification of quadratic APN functions in 7 variables Konstantin Kalgin, Valeriya Idrisova
2020/1514 (PDF ) Improved privacy-preserving training using fixed-Hessian minimisation Tabitha Ogilvie, Rachel Player, Joe Rowell
2020/1513 (PDF ) Indifferentiable hashing from Elligator 2 Mike Hamburg
2020/1512 (PDF ) Revisiting the Privacy Needs of Real-World Applicable Company Benchmarking Jan Pennekamp, Patrick Sapel, Ina Berenice Fink, Simon Wagner, Sebastian Reuter, Christian Hopmann, Klaus Wehrle, Martin Henze
2020/1511 (PDF ) Balancing Privacy and Accountability in Blockchain Identity Management Ivan Damgård, Chaya Ganesh, Hamidreza Khoshakhlagh, Claudio Orlandi, Luisa Siniscalchi
2020/1510 (PDF ) Quantum Computationally Predicate-Binding Commitments with Application in Quantum Zero-Knowledge Arguments for NP Jun Yan
2020/1509 (PDF ) Single-Message Credential-Hiding Login Kevin Lewi, Payman Mohassel, Arnab Roy
2020/1508 (PDF ) A Combinatorial Approach to Quantum Random Functions Nico Döttling, Giulio Malavolta, Sihang Pu
2020/1507 (PDF ) Improvements to RSA key generation and CRT on embedded devices Mike Hamburg, Mike Tunstall, Qinglai Xiao
2020/1506 (PDF ) Recovering cryptographic keys from partial information, by example Gabrielle De Micheli, Nadia Heninger
2020/1505 (PDF ) Binary Tree Based Forward Secure Signature Scheme in the Random Oracle Model Mariusz Jurkiewicz
2020/1504 (PDF ) The Age of Testifying Wearable Devices: The Case of Intoxication Detection Ben Nassi, Lior Rokach, Yuval Elovici
2020/1503 (PDF ) Recovery Attack on Bob's Secrets in CRYSTALS-KYBER and SABER Satoshi Okada, Yuntao Wang
2020/1502 (PDF ) Witness Encryption from Garbled Circuit and Multikey Fully Homomorphic Encryption Techniques Kamil Kluczniak
2020/1501 (PDF ) PANCAKE: Frequency Smoothing for Encrypted Data Stores Paul Grubbs, Anurag Khandelwal, Marie-Sarah Lacharité, Lloyd Brown, Lucy Li, Rachit Agarwal, Thomas Ristenpart
2020/1500 (PDF ) Oblivious Transfer is in MiniQCrypt Alex B. Grilo, Huijia Lin, Fang Song, Vinod Vaikuntanathan
2020/1499 (PDF ) Analysing the HPKE Standard Joël Alwen, Bruno Blanchet, Eduard Hauck, Eike Kiltz, Benjamin Lipp, Doreen Riepel
2020/1498 (PDF ) EPID with Malicious Revocation Olivier Sanders, Jacques Traoré
2020/1497 (PDF ) A note on the calculation of some functions in finite fields: Tricks of the Trade Michael Scott
2020/1496 (PDF ) Pseudo-Free Families and Cryptographic Primitives Mikhail Anokhin
2020/1495 (PDF ) CloudMoles: Surveillance of Power-Wasting Activities by Infiltrating Undercover Sensors Seyedeh Sharareh Mirzargar, Andrea Guerrieri, Mirjana Stojilović
2020/1494 (PDF ) Nonintrusive and Adaptive Monitoring for Locating Voltage Attacks in Virtualized FPGAs Seyedeh Sharareh Mirzargar, Gaiëtan Renault, Andrea Guerrieri, Mirjana Stojilović
2020/1493 (PDF ) Verified fast formulas for control bits for permutation networks Daniel J. Bernstein
2020/1492 (PDF ) Automated ciphertext-only attack on the Wheatstone Cryptograph and related devices Thomas Kaeding
2020/1491 (PDF ) Partitioning Oracle Attacks Julia Len, Paul Grubbs, Thomas Ristenpart
2020/1490 (PDF ) Unlinkable and Invisible γ-Sanitizable Signatures Angèle Bossuat, Xavier Bultel
2020/1489 (PDF ) On the (Ir)Replaceability of Global Setups, or How (Not) to Use a Global Ledger Christian Badertscher, Julia Hesse, Vassilis Zikas
2020/1488 (PDF ) General Properties of Quantum Bit Commitments Jun Yan
2020/1487 (PDF ) One-Way Functions Imply Secure Computation in a Quantum World James Bartusek, Andrea Coladangelo, Dakshita Khurana, Fermi Ma
2020/1486 (PDF ) CommiTEE: An Efficient and Secure Commit-Chain Protocol using TEEs Andreas Erwig, Sebastian Faust, Siavash Riahi, Tobias Stöckert
2020/1485 (PDF ) Quantum Search for Lightweight Block Ciphers: GIFT, SKINNY, SATURNIN Subodh Bijwe, Amit Kumar Chauhan, Somitra Kumar Sanadhya
2020/1484 (PDF ) Cryptanalysis of Aggregate $\Gamma$-Signature and Practical Countermeasures in Application to Bitcoin Goichiro Hanaoka, Kazuo Ohta, Yusuke Sakai, Bagus Santoso, Kaoru Takemure, Yunlei Zhao
2020/1483 (PDF ) A Low-Depth Homomorphic Circuit for Logistic Regression Model Training Eric Crockett
2020/1482 (PDF ) Optimized Polynomial Multiplier Architectures for Post-Quantum KEM Saber Andrea Basso, Sujoy Sinha Roy
2020/1481 (PDF ) Design and implementation of HElib: a homomorphic encryption library Shai Halevi, Victor Shoup
2020/1480 (PDF ) Malicious Security Comes for Free in Consensus with Leaders Mark Abspoel, Thomas Attema, Matthieu Rambaud
2020/1479 (PDF ) Automatic Privacy-Preserving Contact Tracing of Novel Coronavirus Infection by Cloud-Enabled WBAN using Blockchain Anupam Pattanayak, Subhasish Dhal, Sourav Kanti Addya
2020/1478 (PDF ) Robust Subgroup Multi-Signatures for Consensus David Galindo, Jia Liu
2020/1477 (PDF ) Machine-checking the universal verifiability of ElectionGuard Thomas Haines, Rajeev Gore, Jack Stodart
2020/1476 (PDF ) Carbon Trading with Blockchain Andreas Richardson, Jiahua Xu
2020/1475 (PDF ) Delegate and Verify the Update Keys of Revocable Identity-Based Encryption Kwangsu Lee
2020/1474 (PDF ) New method of verifying cryptographic protocols based on the process model A. M. Mironov
2020/1473 (PDF ) Lighthouses: A Warning System for Super-Spreader Events Leonie Reichert, Samuel Brack, Björn Scheuermann
2020/1472 (PDF ) Enhancing Code Based Zero-knowledge Proofs using Rank Metric Emanuele Bellini, Philippe Gaborit, Alexandros Hasikos, Victor Mateu
2020/1471 (PDF ) On The Round Complexity of Secure Quantum Computation James Bartusek, Andrea Coladangelo, Dakshita Khurana, Fermi Ma
2020/1470 (PDF ) TaiJi: Longest Chain Availability with BFT Fast Confirmation Songze Li, David Tse
2020/1469 (PDF ) Succinct Blind Quantum Computation Using a Random Oracle Jiayu Zhang
2020/1468 (PDF ) Secure Cloud Auditing with Efficient Ownership Transfer (Full Version) Jun Shen, Fuchun Guo, Xiaofeng Chen, Willy Susilo
2020/1467 (PDF ) Making the BKW Algorithm Practical for LWE Alessandro Budroni, Qian Guo, Thomas Johansson, Erik Mårtensson, Paul Stankovski Wagner
2020/1466 (PDF ) Load Balancing for Sharded Blockchains Naoya Okanami, Ryuya Nakamura, Takashi Nishide
2020/1465 (PDF ) Cryptanalysis of an Anonymous Authentication and Key Agreement Protocol for Secure Wireless Body Area Network Mohammad Amin Rakeei, Farokhlagha Moazami
2020/1464 (PDF ) Round Efficient Secure Multiparty Quantum Computation with Identifiable Abort Bar Alon, Hao Chung, Kai-Min Chung, Mi-Ying Huang, Yi Lee, Yu-Ching Shen
2020/1463 (PDF ) Observations on the Tightness of the Security Bounds of GIFT-COFB and HyENA Mustafa Khairallah
2020/1462 (PDF ) Ovid: Message-based Automatic Contact Tracing Leonie Reichert, Samuel Brack, Björn Scheuermann
2020/1461 (PDF ) Lower bounds for the depth of modular squaring Benjamin Wesolowski, Ryan Williams
2020/1460 (PDF ) The MAGIC Mode for Simultaneously Supporting Encryption, Message Authentication and Error Correction Michael Kounavis, David Durham, Sergej Deutsch, Krystian Matusiewicz, David Wheeler
2020/1459 (PDF ) Preliminary Hardware Benchmarking of a Group of Round 2 NIST Lightweight AEAD Candidates Mustafa Khairallah, Thomas Peyrin, Anupam Chattopadhyay
2020/1458 (PDF ) Analysis of Ascon, DryGASCON, and Shamash Permutations Cihangir Tezcan
2020/1457 (PDF ) The Cost to Break SIKE: A Comparative Hardware-Based Analysis with AES and SHA-3 Patrick Longa, Wen Wang, Jakub Szefer
2020/1456 (PDF ) How to Abuse and Fix Authenticated Encryption Without Key Commitment Ange Albertini, Thai Duong, Shay Gueron, Stefan Kölbl, Atul Luykx, Sophie Schmieg
2020/1455 (PDF ) An Analytic Attack Against ARX Addition Exploiting Standard Side-Channel Leakage Yan Yan, Elisabeth Oswald, Srinivas Vivek
2020/1454 (PDF ) Rate-1 Quantum Fully Homomorphic Encryption Orestis Chardouvelis, Nico Doettling, Giulio Malavolta
2020/1453 (PDF ) New (k,l,m)-verifiable multi-secret sharing schemes based on XTR public key system Jing Yang, Fang-Wei Fu
2020/1452 (PDF ) ASAP: Algorithm Substitution Attacks on Cryptographic Protocols Sebastian Berndt, Jan Wichelmann, Claudius Pott, Tim-Henrik Traving, Thomas Eisenbarth
2020/1451 (PDF ) Efficient Fully Secure Computation via Distributed Zero-Knowledge Proofs Elette Boyle, Niv Gilboa, Yuval Ishai, Ariel Nof
2020/1450 (PDF ) Subversion-Resilient Enhanced Privacy ID Antonio Faonio, Dario Fiore, Luca Nizzardo, Claudio Soriente
2020/1449 (PDF ) More Efficient Amortization of Exact Zero-Knowledge Proofs for LWE Jonathan Bootle, Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler
2020/1448 (PDF ) Shorter Lattice-Based Zero-Knowledge Proofs via One-Time Commitments Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler
2020/1447 (PDF ) Compressed $\Sigma$-Protocols for Bilinear Group Arithmetic Circuits and Application to Logarithmic Transparent Threshold Signatures Thomas Attema, Ronald Cramer, Matthieu Rambaud
2020/1446 (PDF ) Line-Point Zero Knowledge and Its Applications Samuel Dittmer, Yuval Ishai, Rafail Ostrovsky
2020/1445 (PDF ) Observations on COMET Daniel J. Bernstein, Henri Gilbert, Meltem Sonmez Turan
2020/1444 (PDF ) On known constructions of APN and AB functions and their relation to each other Marco Calderini, Lilya Budaghyan, Claude Carlet
2020/1443 (PDF ) DPaSE: Distributed Password-Authenticated Symmetric Encryption Poulami Das, Julia Hesse, Anja Lehmann
2020/1442 (PDF ) Analysis of Multivariate Encryption Schemes: Application to Dob Morten Øygarden, Patrick Felke, Håvard Raddum
2020/1441 (PDF ) PayMo: Payment Channels For Monero Sri AravindaKrishnan Thyagarajan, Giulio Malavolta, Fritz Schmidt, Dominique Schröder
2020/1440 (PDF ) SoK: Cyber-Attack Taxonomy of Distributed Ledger- and Legacy Systems-based Financial Infrastructures Ralph Ankele, Kai Nahrgang, Branka Stojanovic, Atta Badii
2020/1439 (PDF ) Cryptographic Vulnerabilities and Other Shortcomings of the Nextcloud Server Side Encryption as implemented by the Default Encryption Module Kevin "Kenny" Niehage
2020/1438 (PDF ) Resource Estimation of Grovers-kind Quantum Cryptanalysis against FSR based Symmetric Ciphers Ravi Anand, Subhamoy Maitra, Arpita Maitra, Chandra Sekhar Mukherjee, Sourav Mukhopadhyay
2020/1437 (PDF ) Round-Optimal and Communication-Efficient Multiparty Computation Michele Ciampi, Rafail Ostrovsky, Hendrik Waldner, Vassilis Zikas
2020/1436 (PDF ) Removable Weak Keys for Discrete Logarithm Based Cryptography Michael John Jacobson Jr., Prabhat Kushwaha
2020/1435 (PDF ) Publicly Verifiable Zero Knowledge from (Collapsing) Blockchains Alessandra Scafuro, Luisa Siniscalchi, Ivan Visconti
2020/1434 (PDF ) Towards Multiparty Computation Withstanding Coercion of All Parties Ran Canetti, Oxana Poburinnaya
2020/1433 (PDF ) Interactive Proofs for Social Graphs Liran Katzir, Clara Shikhelman, Eylon Yogev
2020/1432 (PDF ) CP-ABE for Circuits (and more) in the Symmetric Key Setting Shweta Agrawal, Shota Yamada
2020/1431 (PDF ) Information-Theoretic 2-Round MPC without Round Collapsing: Adaptive Security, and More Huijia Lin, Tianren Liu, Hoeteck Wee
2020/1430 (PDF ) Revisiting Fairness in MPC: Polynomial Number of Parties and General Adversarial Structures Dana Dachman-Soled
2020/1429 (PDF ) On Computational Shortcuts for Information-Theoretic PIR Matthew M. Hong, Yuval Ishai, Victor I. Kolobov, Russell W. F. Lai
2020/1428 (PDF ) On Statistical Security in Two-Party Computation Dakshita Khurana, Muhammad Haris Mughees
2020/1427 (PDF ) Barriers for Succinct Arguments in the Random Oracle Model Alessandro Chiesa, Eylon Yogev
2020/1426 (PDF ) Linear-Time Arguments with Sublinear Verification from Tensor Codes Jonathan Bootle, Alessandro Chiesa, Jens Groth
2020/1425 (PDF ) Public-Coin Zero-Knowledge Arguments with (almost) Minimal Time and Space Overheads Alexander R. Block, Justin Holmgren, Alon Rosen, Ron D. Rothblum, Pratik Soni
2020/1424 (PDF ) Improved Key Recovery of the HFEv- Signature Scheme Chengdong Tao, Albrecht Petzoldt, Jintai Ding
2020/1423 (PDF ) Quantum encryption with certified deletion Anne Broadbent, Rabib Islam
2020/1422 (PDF ) Non-interactive classical verification of quantum computation Gorjan Alagic, Andrew M. Childs, Alex B. Grilo, Shih-Han Hung
2020/1421 (PDF ) Weakly Extractable One-Way Functions Nir Bitansky, Noa Eizenstadt, Omer Paneth
2020/1420 (PDF ) Functional Encryption for Quadratic Functions from k-Lin, Revisited Hoeteck Wee
2020/1419 (PDF ) The Resiliency of MPC with Low Interaction: The Benefit of Making Errors Benny Applebaum, Eliran Kachlon, Arpita Patra
2020/1418 (PDF ) Quantum Period Finding against Symmetric Primitives in Practice Xavier Bonnetain, Samuel Jaques
2020/1417 (PDF ) Correlated Pseudorandom Functions from Variable-Density LPN Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Scholl
2020/1416 (PDF ) Further on the Construction of Feedback Shift Registers with Maximum Strong Linear Complexity Congwei Zhou, Bin Hu, Jie Guan
2020/1415 (PDF ) Secure Graph Database Search with Oblivious Filter Jamie Cui, Chaochao Chen, Alex X. Liu, Li Wang
2020/1414 (PDF ) New Insights On Differential And Linear Bounds Using Mixed Integer Linear Programming (Full Version) Anubhab Baksi
2020/1413 (PDF ) Simpler Statistically Sender Private Oblivious Transfer from Ideals of Cyclotomic Integers Daniele Micciancio, Jessica Sorrell
2020/1412 (PDF ) Constant-Overhead Unconditionally Secure Multiparty Computation over Binary Fields Antigoni Polychroniadou, Yifan Song
2020/1411 (PDF ) Transparent Error Correcting in a Computationally Bounded World Ofer Grossman, Justin Holmgren, Eylon Yogev
2020/1410 (PDF ) Mac'n'Cheese: Zero-Knowledge Proofs for Boolean and Arithmetic Circuits with Nested Disjunctions Carsten Baum, Alex J. Malozemoff, Marc B. Rosen, Peter Scholl
2020/1409 (PDF ) The Convergence of Slide-type Reductions Michael Walter
2020/1408 (PDF ) On Broadcast in Generalized Network and Adversarial Models Chen-Da Liu-Zhang, Varun Maram, Ueli Maurer
2020/1407 (PDF ) Computing Square Roots Faster than the Tonelli-Shanks/Bernstein Algorithm Palash Sarkar
2020/1406 (PDF ) How not to VoteAgain: Pitfalls of Scalable Coercion-Resistant E-Voting Thomas Haines, Johannes Mueller
2020/1405 (PDF ) Grover on GIFT Kyoungbae Jang, Hyunjun Kim, Siwoo Eum, Hwajeong Seo
2020/1404 (PDF ) A Practical Key-Recovery Attack on 805-Round Trivium Chen-Dong Ye, Tian Tian
2020/1403 (PDF ) A q-SDH-based Graph Signature Scheme on Full-Domain Messages with Efficient Protocols Syh-Yuan Tan, Ioannis Sfyrakis, Thomas Gross
2020/1402 (PDF ) SKINNY with Scalpel - Comparing Tools for Differential Analysis Stéphanie Delaune, Patrick Derbez, Paul Huynh, Marine Minier, Victor Mollimard, Charles Prud'homme
2020/1401 (PDF ) Quantum Garbled Circuits Zvika Brakerski, Henry Yuen
2020/1400 (PDF ) Transferable E-cash: A Cleaner Model and the First Practical Instantiation Balthazar Bauer, Georg Fuchsbauer, Chen Qian
2020/1399 (PDF ) A New Generalisation of the Goldwasser-Micali Cryptosystem Based on the Gap $2^k$-Residuosity Assumption Diana Maimut, George Teseleanu
2020/1398 (PDF ) Minimal binary linear codes - a general framework based on bent concatenation Fengrong Zhang, Enes Pasalic, René Rodríguez, Yongzhuang Wei
2020/1397 (PDF ) NTT Multiplication for NTT-unfriendly Rings Chi-Ming Marvin Chung, Vincent Hwang, Matthias J. Kannwischer, Gregor Seiler, Cheng-Jhih Shih, Bo-Yin Yang
2020/1396 (PDF ) Efficient Privacy Preserving Logistic Regression Inference and Training Kyoohyung Han, Jinhyuck Jeong, Jung Hoon Sohn, Yongha Son
2020/1395 (PDF ) Post-Quantum Multi-Party Computation Amit Agarwal, James Bartusek, Vipul Goyal, Dakshita Khurana, Giulio Malavolta
2020/1394 (PDF ) Practical and Secure Circular Range Search on Private Spatial Data Zhihao Zheng, Jiachen Shen, Zhenfu Cao
2020/1393 (PDF ) On the Effectiveness of Time Travel to Inject COVID-19 Alerts Vincenzo Iovino, Serge Vaudenay, Martin Vuagnoux
2020/1392 (PDF ) Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation Elette Boyle, Nishanth Chandran, Niv Gilboa, Divya Gupta, Yuval Ishai, Nishant Kumar, Mayank Rathee
2020/1391 (PDF ) Interactive Proofs for Quantum Black-Box Computations Jiang Zhang, Yu Yu, Dengguo Feng, Shuqin Fan, Zhenfeng Zhang, Kang Yang
2020/1390 (PDF ) A Survey of ECDSA Threshold Signing Jean-Philippe Aumasson, Adrian Hamelink, Omer Shlomovits
2020/1389 (PDF ) Key Mismatch Attack on NewHope Revisited Jan Vacek, Jan Václavek
2020/1388 (PDF ) Signcryption in a Quantum World Sanjit Chatterjee, Tapas Pandit, Shravan Kumar Parshuram Puria, Akash Shah
2020/1386 (PDF ) Decentralized Multi-Authority ABE for DNFs from LWE Pratish Datta, Ilan Komargodski, Brent Waters
2020/1385 (PDF ) An Alternative Approach for SIDH Arithmetic Cyril Bouvier, Laurent Imbert
2020/1384 (PDF ) A Black-Box Approach to Post-Quantum Zero-Knowledge in Constant Rounds Nai-Hui Chia, Kai-Min Chung, Takashi Yamakawa
2020/1383 (PDF ) Novel Single-Trace ML Profiling Attacks on NIST 3 Round candidate Dilithium Il-Ju Kim, Tae-Ho Lee, Jaeseung Han, Bo-Yeon Sim, Dong-Guk Han
2020/1382 (PDF ) Chosen-Ciphertext Secure Multi-Identity and Multi-Attribute Pure FHE Tapas Pal, Ratna Dutta
2020/1381 (PDF ) PBio: Enabling Cross-organizational Biometric Authentication Service through Secure Sharing of Biometric Templates Jia-Chng Loh, Geong-Sen Poh, Jason H. M. Ying, Jia Xu, Hoon Wei Lim, Jonathan Pan, Weiyang Wong
2020/1380 (PDF ) Fast Computing of Quadratic Forms of HFE Polynomials over fields of characteristic two Borja Gómez
2020/1378 (PDF ) Correlation-Intractable Hash Functions via Shift-Hiding Alex Lombardi, Vinod Vaikuntanathan
2020/1377 (PDF ) When to Barrett reduce in the inverse NTT Bas Westerbaan
2020/1376 (PDF ) Stronger bounds on the cost of computing Groebner bases for HFE systems Elisa Gorla, Daniela Mueller, Christophe Petit
2020/1375 (PDF ) Semi-regular sequences and other random systems of equations M. Bigdeli, E. De Negri, M. M. Dizdarevic, E. Gorla, R. Minko, S. Tsakou
2020/1374 (PDF ) ELM : A Low-Latency and Scalable Memory Encryption Scheme Akiko Inoue, Kazuhiko Minematsu, Maya Oda, Rei Ueno, Naofumi Homma
2020/1373 (PDF ) Transciphering, using FiLIP and TFHE for an efficient delegation of computation Clément Hoffmann, Pierrick Méaux, Thomas Ricosset
2020/1372 (PDF ) VCKSCF: Efficient Verifiable Conjunctive Keyword Search Based on Cuckoo Filter for Cloud Storage Chan Fan, Xiaolei Dong, Zhenfu Cao, Jiachen Shen
2020/1371 (PDF ) Privacy Amplification with Tamperable Memory via Non-malleable Two-source Extractors Divesh Aggarwal, Maciej Obremski, João Ribeiro, Mark Simkin, Luisa Siniscalchi
2020/1370 (PDF ) A discretization attack Daniel J. Bernstein
2020/1369 (PDF ) Multiplication over Extension Fields for Pairing-based Cryptography: an Hardware Point of View Arthur Lavice, Nadia El Mrabet, Alexandre Berzati, Jean-Baptiste Rigaud
2020/1368 (PDF ) On the Worst-Case Side-Channel Security of ECC Point Randomization in Embedded Devices Melissa Azouaoui, François Durvaux, Romain Poussier, François-Xavier Standaert, Kostas Papagiannopoulos, Vincent Verneuil
2020/1367 (PDF ) Costs of an Attack Against Proof-of-Work Loïc Etienne
2020/1366 (PDF ) LURK: Server-Controlled TLS Delegation Ioana Boureanu, Daniel Migault, Stere Preda, Hyame Assem Alamedine, Sanjay Mishra, Frederic Fieau, Mohammad Mannan
2020/1365 (PDF ) Evaluation Methods for Chebyshev Polynomials Zhengjun Cao, Lihua Liu, Leming Hong
2020/1364 (PDF ) Security of Hybrid Key Encapsulation Matthew Campagna, Adam Petcher
2020/1363 (PDF ) Game-Set-MATCH: Using Mobile Devices for Seamless External-Facing Biometric Matching Shashank Agrawal, Saikrishna Badrinarayanan, Pratyay Mukherjee, Peter Rindal
2020/1362 (PDF ) Lattice-Based Proof-of-Work for Post-Quantum Blockchains Rouzbeh Behnia, Eamonn W. Postlethwaite, Muslum Ozgur Ozmen, Attila Altay Yavuz
2020/1361 (PDF ) Tight adaptive reprogramming in the QROM Alex B. Grilo, Kathrin Hövelmanns, Andreas Hülsing, Christian Majenz
2020/1360 (PDF ) Incremental Cryptography Revisited: PRFs, Nonces and Modular Design Vivek Arte, Mihir Bellare, Louiza Khati
2020/1359 (PDF ) On two fundamental problems on APN power functions Lilya Budaghyan, Marco Calderini, Claude Carlet, Diana Davidova, Nikolay Kaleyski
2020/1358 (PDF ) Toward Provable One Way Functions Hagar Dolev, Shlomi Dolev
2020/1357 (PDF ) Forward and Backward Private Dynamic Searchable Symmetric Encryption for Conjunctive Queries Cong Zuo, Shi-Feng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk, Guiyi Wei
2020/1356 (PDF ) Computing Expected Differential Probability of (Truncated) Differentials and Expected Linear Potential of (Multidimensional) Linear Hulls in SPN Block Ciphers Maria Eichlseder, Gregor Leander, Shahram Rasoolzadeh
2020/1355 (PDF ) Modular Lagrange Interpolation of the Mod Function for Bootstrapping of Approximate HE Charanjit S. Jutla, Nathan Manohar
2020/1354 (PDF ) Gadget-Based iNTRU Lattice Trapdoors Nicholas Genise, Baiyu Li
2020/1353 (PDF ) Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience Linru Zhang, Xiangning Wang, Yuechen Chen, Siu-Ming Yiu
2020/1352 (PDF ) Reducing Round Complexity of Byzantine Broadcast Linda Chen, Jun Wan
2020/1351 (PDF ) Tight State-Restoration Soundness in the Algebraic Group Model Ashrujit Ghoshal, Stefano Tessaro
2020/1350 (PDF ) Senate: A Maliciously-Secure MPC Platform for Collaborative Analytics Rishabh Poddar, Sukrit Kalra, Avishay Yanai, Ryan Deng, Raluca Ada Popa, Joseph M. Hellerstein
2020/1349 (PDF ) Key Dependency of Differentials: Experiments in the Differential Cryptanalysis of Block Ciphers Using Small S-boxes Howard M. Heys
2020/1348 (PDF ) Vetted Encryption Martha Norberg Hovd, Martijn Stam
2020/1347 (PDF ) A Systematic Appraisal of Side Channel Evaluation Strategies Melissa Azouaoui, Davide Bellizia, Ileana Buhan, Nicolas Debande, Sebastien Duval, Christophe Giraud, Eliane Jaulmes, Francois Koeune, Elisabeth Oswald, Francois-Xavier Standaert, Carolyn Whitnall
2020/1346 (PDF ) SodsMPC: FSM based Anonymous and Private Quantum-safe Smart Contracts Shlomi Dolev, Ziyu Wang
2020/1345 (PDF ) Post-Quantum Adaptor Signature for Privacy-Preserving Off-Chain Payments Erkan Tairi, Pedro Moreno-Sanchez, Matteo Maffei
2020/1344 (PDF ) Indifferentiability of SKINNY-HASH Internal Functions Akinori Hosoyamada, Tetsu Iwata
2020/1343 (PDF ) Improved Cryptanalysis of UOV and Rainbow Ward Beullens
2020/1342 (PDF ) Forward and Backward Private Conjunctive Searchable Symmetric Encryption Sikhar Patranabis, Debdeep Mukhopadhyay
2020/1341 (PDF ) Zero-Communication Reductions Varun Narayanan, Manoj Prabhakaran, Vinod M. Prabhakaran
2020/1340 (PDF ) Homomorphic Evaluation of the SM4 Yu Xue
2020/1339 (PDF ) New Approaches for Quantum Copy-Protection Scott Aaronson, Jiahui Liu, Qipeng Liu, Mark Zhandry, Ruizhe Zhang
2020/1338 (PDF ) Optimized Architectures for Elliptic Curve Cryptography over Curve448 Mojtaba Bisheh Niasar, Reza Azarderakhsh, Mehran Mozaffari Kermani
2020/1337 (PDF ) Multiplicative Depth Independent & Efficient MPC in the Presence of Mixed Adversary Achintya Desai, Shubham Raj, Kannan Srinathan
2020/1336 (PDF ) Faster Characteristic Three Polynomial Multiplication and Its Application to NTRU Prime Decapsulation Esra Yeniaras, Murat Cenk
2020/1335 (PDF ) Transciphering Framework for Approximate Homomorphic Encryption (Full Version) Jihoon Cho, Jincheol Ha, Seongkwang Kim, Byeonghak Lee, Joohee Lee, Jooyoung Lee, Dukjae Moon, Hyojin Yoon
2020/1334 (PDF ) One-Shot Fiat-Shamir-based NIZK Arguments of Composite Residuosity and Logarithmic-Size Ring Signatures in the Standard Model Benoît Libert, Khoa Nguyen, Thomas Peters, Moti Yung
2020/1333 (PDF ) Updateable Inner Product Argument with Logarithmic Verifier and Applications Vanesa Daza, Carla Ràfols, Alexandros Zacharakis
2020/1332 (PDF ) Protecting the Privacy of Voters: New Definitions of Ballot Secrecy for E-Voting Ashley Fraser, Elizabeth A. Quaglia
2020/1331 (PDF ) Efficient mixing of arbitrary ballots with everlasting privacy: How to verifiably mix the PPATC scheme Kristian Gjøsteen, Thomas Haines, Morten Rotvold Solberg
2020/1330 (PDF ) Fantastic Four: Honest-Majority Four-Party Secure Computation With Malicious Security Anders Dalskov, Daniel Escudero, Marcel Keller
2020/1329 (PDF ) Adaptively secure Threshold Symmetric-key Encryption Pratyay Mukherjee
2020/1328 (PDF ) SWiSSSE: System-Wide Security for Searchable Symmetric Encryption Zichen Gui, Kenneth G. Paterson, Sikhar Patranabis, Bogdan Warinschi
2020/1327 (PDF ) On The Insider Security of MLS Joël Alwen, Daniel Jost, Marta Mularczyk
2020/1326 (PDF ) Towards Fine-Grained One-Way Functions from Strong Average-Case Hardness Chris Brzuska, Geoffroy Couteau
2020/1325 (PDF ) On Self-Equivalence Encodings in White-Box Implementations Adrián Ranea, Bart Preneel
2020/1324 (PDF ) Separation Results for Boolean Function Classes Aniruddha Biswas, Palash Sarkar
2020/1323 (PDF ) CSI-RAShi: Distributed key generation for CSIDH Ward Beullens, Lucas Disson, Robi Pedersen, Frederik Vercauteren
2020/1322 (PDF ) Towards Post-Quantum Security for Cyber-Physical Systems: Integrating PQC into Industrial M2M Communication Sebastian Paul, Patrik Scheible
2020/1321 (PDF ) Provably Quantum-Secure Tweakable Block Ciphers Akinori Hosoyamada, Tetsu Iwata
2020/1320 (PDF ) WARP : Revisiting GFN for Lightweight 128-bit Block Cipher Subhadeep Banik, Zhenzhen Bao, Takanori Isobe, Hiroyasu Kubo, Fukang Liu, Kazuhiko Minematsu, Kosei Sakamoto, Nao Shibata, Maki Shigeri
2020/1319 (PDF ) On Succinct Arguments and Witness Encryption from Groups Ohad Barta, Yuval Ishai, Rafail Ostrovsky, David J. Wu
2020/1318 (PDF ) Poppins: A Direct Construction for Asymptotically Optimal zkSNARKs Abhiram Kothapalli, Elisaweta Masserova, Bryan Parno
2020/1317 (PDF ) Improved Rectangle Attacks on SKINNY and CRAFT Hosein Hadipour, Nasour Bagheri, Ling Song
2020/1316 (PDF ) Security of Public Key Encryption against Resetting Attacks Juliane Krämer, Patrick Struck
2020/1315 (PDF ) On Index Calculus Algorithms for Subfield Curves Steven D. Galbraith, Robert Granger, Simon-Philipp Merz, Christophe Petit
2020/1314 (PDF ) Secure Software Leasing from Standard Assumptions Fuyuki Kitagawa, Ryo Nishimaki, Takashi Yamakawa
2020/1313 (PDF ) Payment Trees: Low Collateral Payments for Payment Channel Networks Maxim Jourenko, Mario Larangeira, Keisuke Tanaka
2020/1312 (PDF ) Individual Simulations Yi Deng
2020/1311 (PDF ) Cryptanalysis of Feistel-Based Format-Preserving Encryption Orr Dunkelman, Abhishek Kumar, Eran Lambooij, Somitra Kumar Sanadhya
2020/1310 (PDF ) A note on the low order assumption in class group of an imaginary quadratic number fields Karim Belabas, Thorsten Kleinjung, Antonio Sanso, Benjamin Wesolowski
2020/1309 (PDF ) Provable Security Analysis of Decentralized Cryptographic Contact Tracing Noel Danz, Oliver Derwisch, Anja Lehmann, Wenzel Puenter, Marvin Stolle, Joshua Ziemann
2020/1308 (PDF ) On the Success Probability of Solving Unique SVP via BKZ Eamonn W. Postlethwaite, Fernando Virdia
2020/1307 (PDF ) Multiparty Cardinality Testing for Threshold Private Set Intersection Pedro Branco, Nico Döttling, Sihang Pu
2020/1306 (PDF ) Simulation Extractable Versions of Groth’s zk-SNARK Revisited Oussama Amine, Karim Baghery, Zaira Pindado, Carla Ràfols
2020/1305 (PDF ) On the Compressed-Oracle Technique, and Post-Quantum Security of Proofs of Sequential Work Kai-Min Chung, Serge Fehr, Yu-Hsuan Huang, Tai-Ning Liao
2020/1304 (PDF ) QCB: Efficient Quantum-secure Authenticated Encryption Ritam Bhaumik, Xavier Bonnetain, André Chailloux, Gaëtan Leurent, María Naya-Plasencia, André Schrottenloher, Yannick Seurin
2020/1303 (PDF ) Post-Quantum Cryptography with Contemporary Co-Processors: Beyond Kronecker, Schönhage-Strassen & Nussbaumer Joppe W. Bos, Joost Renes, Christine van Vredendaal
2020/1302 (PDF ) TMVP-based Multiplication for Polynomial Quotient Rings and Application to Saber on ARM Cortex-M4 İrem Keskinkurt Paksoy, Murat Cenk
2020/1301 (PDF ) Robust Property-Preserving Hash Functions for Hamming Distance and More Nils Fleischhacker, Mark Simkin
2020/1300 (PDF ) Byzantine Ordered Consensus without Byzantine Oligarchy Yunhao Zhang, Srinath Setty, Qi Chen, Lidong Zhou, Lorenzo Alvisi
2020/1298 (PDF ) Is Real-time Phishing Eliminated with FIDO? Social Engineering Downgrade Attacks against FIDO Protocols Enis Ulqinaku, Hala Assal, AbdelRahman Abdou, Sonia Chiasson, Srdjan Čapkun
2020/1297 (PDF ) On the Effect of the (Micro)Architecture on the Development of Side-Channel Resistant Software Lauren De Meyer, Elke De Mulder, Michael Tunstall
2020/1296 (PDF ) Concrete quantum cryptanalysis of binary elliptic curves Gustavo Banegas, Daniel J. Bernstein, Iggy van Hoof, Tanja Lange
2020/1295 (PDF ) Optimized Software Implementations for theLightweight Encryption Scheme ForkAE Arne Deprez, Elena Andreeva, Jose Maria Bermudo Mera, Angshuman Karmakar, Antoon Purnal
2020/1294 (PDF ) Coco: Co-Design and Co-Verification of Masked Software Implementations on CPUs Barbara Gigerl, Vedad Hadzic, Robert Primas, Stefan Mangard, Roderick Bloem
2020/1293 (PDF ) I Choose You: Automated Hyperparameter Tuning for Deep Learning-based Side-channel Analysis Lichao Wu, Guilherme Perin, Stjepan Picek
2020/1292 (PDF ) Optimal Oblivious Parallel RAM Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Enoch Peserico, Elaine Shi
2020/1291 (PDF ) Efficient Composable Oblivious Transfer from CDH in the Global Random Oracle Model Bernardo David, Rafael Dowsley
2020/1290 (PDF ) FORTIS: Selfish Mining Mitigation by (FOR)geable (TI)me(S)tamps Osman Biçer, Alptekin Küpçü
2020/1289 (PDF ) Sword: An Opaque Blockchain Protocol Farid Elwailly
2020/1288 (PDF ) Improved attacks against key reuse in learning with errors key exchange Nina Bindel, Douglas Stebila, Shannon Veitch
2020/1287 (PDF ) Multivariate Cryptographic Primitive based on the product of the roots of a polynomial over a field Borja Gómez
2020/1286 (PDF ) Secure Two-Party Quantum Computation Over Classical Channels Michele Ciampi, Alexandru Cojocaru, Elham Kashefi, Atul Mantri
2020/1285 (PDF ) Multi-Input Quadratic Functional Encryption from Pairings Shweta Agrawal, Rishab Goyal, Junichi Tomida
2020/1284 (PDF ) Entropy Estimation of Physically Unclonable Functions with Offset Error Mitsuru Shiozaki, Yohei Hori, Takeshi Fujino
2020/1283 (PDF ) Sieving for twin smooth integers with solutions to the Prouhet-Tarry-Escott problem Craig Costello, Michael Meyer, Michael Naehrig
2020/1282 (PDF ) Compact Authenticated Key Exchange in the Quantum Random Oracle Model Haiyang Xue, Man Ho Au, Rupeng Yang, Bei Liang, Haodong Jiang
2020/1281 (PDF ) Key Agreement for Decentralized Secure Group Messaging with Strong Security Guarantees Matthew Weidner, Martin Kleppmann, Daniel Hugenroth, Alastair R. Beresford
2020/1280 (PDF ) DORY: An Encrypted Search System with Distributed Trust Emma Dauterman, Eric Feng, Ellen Luo, Raluca Ada Popa, Ion Stoica
2020/1279 (PDF ) Tightly-Secure Authenticated Key Exchange, Revisited Tibor Jager, Eike Kiltz, Doreen Riepel, Sven Schäge
2020/1278 (PDF ) Compact Dilithium Implementations on Cortex-M3 and Cortex-M4 Denisa O. C. Greconici, Matthias J. Kannwischer, Amber Sprenkels
2020/1277 (PDF ) A Simple Protocol to Compare EMFI Platforms J. Toulemont, N. Ouldei-Tebina, J. M. Galliere, P. Nouet, E. Bourbao, P. Maurine
2020/1276 (PDF ) Lattice-based Key Sharing Schemes - A Survey Prasanna Ravi, James Howe, Anupam Chattopadhyay, Shivam Bhasin
2020/1275 (PDF ) Quarks: Quadruple-efficient transparent zkSNARKs Srinath Setty, Jonathan Lee
2020/1274 (PDF ) Dory: Efficient, Transparent arguments for Generalised Inner Products and Polynomial Commitments Jonathan Lee
2020/1273 (PDF ) Classical Verification of Quantum Computations with Efficient Verifier Nai-Hui Chia, Kai-Min Chung, Takashi Yamakawa
2020/1272 (PDF ) Bent Functions from Cellular Automata Maximilien Gadouleau, Luca Mariot, Stjepan Picek
2020/1271 (PDF ) (F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption (extended version) Alexandros Bakas, Antonis Michalas
2020/1270 (PDF ) Classical vs Quantum Random Oracles Takashi Yamakawa, Mark Zhandry
2020/1269 (PDF ) PRINCEv2 - More Security for (Almost) No Overhead Dušan Božilov, Maria Eichlseder, Miroslav Kneževic, Baptiste Lambin, Gregor Leander, Thorben Moos, Ventzislav Nikov, Shahram Rasoolzadeh, Yosuke Todo, Friedrich Wiemer
2020/1268 (PDF ) A Novel Duplication Based Countermeasure To Statistical Ineffective Fault Analysis Anubhab Baksi, Vinay B. Y. Kumar, Banashri Karmakar, Shivam Bhasin, Dhiman Saha, Anupam Chattopadhyay
2020/1267 (PDF ) Fault Attacks In Symmetric Key Cryptosystems Anubhab Baksi, Shivam Bhasin, Jakub Breier, Dirmanto Jap, Dhiman Saha
2020/1266 (PDF ) Multi-Party Functional Encryption Shweta Agrawal, Rishab Goyal, Junichi Tomida
2020/1265 (PDF ) Revisiting ECM on GPUs Jonas Wloka, Jan Richter-Brockmann, Colin Stahlke, Thorsten Kleinjung, Christine Priplata, Tim Güneysu
2020/1263 (PDF ) Improved Fault Analysis on SIMECK Ciphers Duc-Phong Le, Rongxing Lu, Ali A. Ghorbani
2020/1262 (PDF ) Multi-stage Proof-of-Works: Properties and Vulnerabilities Paolo D'Arco, Zahra Ebadi Ansaroudi, Francesco Mogavero
2020/1261 (PDF ) MuSig2: Simple Two-Round Schnorr Multi-Signatures Jonas Nick, Tim Ruffing, Yannick Seurin
2020/1260 (PDF ) Lattice Reduction with Approximate Enumeration Oracles: Practical Algorithms and Concrete Performance Martin R. Albrecht, Shi Bai, Jianwei Li, Joe Rowell
2020/1259 (PDF ) Correlated Randomness Teleportation via Semi-trusted Hardware - Enabling Silent Multi-party Computation Yibiao Lu, Bingsheng Zhang, Hong-Sheng Zhou, Weiran Liu, Lei Zhang, Kui Ren
2020/1258 (PDF ) TranSCA: Cross-Family Profiled Side-Channel Attacks using Transfer Learning on Deep Neural Networks Dhruv Thapar, Manaar Alam, Debdeep Mukhopadhyay
2020/1257 (PDF ) Improved Reduction Between SIS Problems over Structured Lattices ZaHyun Koo, Yongwoo Lee, Joon-Woo Lee, Jong-Seon No, Young-Sik Kim
2020/1256 (PDF ) Asymptotically Good Multiplicative LSSS over Galois Rings and Applications to MPC over Z/p^k Z Mark Abspoel, Ronald Cramer, Ivan Damgård, Daniel Escudero, Matthieu Rambaud, Chaoping Xing, Chen Yuan
2020/1255 (PDF ) Boolean Ring Cryptographic Equation Solving Sean Murphy, Maura Paterson, Christine Swart
2020/1254 (PDF ) Broadcast-Optimal Two Round MPC with an Honest Majority Ivan Damgård, Bernardo Magri, Divya Ravi, Luisa Siniscalchi, Sophia Yakoubov
2020/1253 (PDF ) New Representations of the AES Key Schedule Gaëtan Leurent, Clara Pernot
2020/1252 (PDF ) Adaptive Extractors and their Application to Leakage Resilient Secret Sharing Nishanth Chandran, Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar
2020/1251 (PDF ) Bit Security Estimation Using Various Information-Theoretic Measures Dong-Hoon Lee, Young-Sik Kim, Jong-Seon No
2020/1250 (PDF ) A New Code Based Signature Scheme without Trapdoors Zhe Li, Chaoping Xing, Sze Ling Yeo
2020/1249 (PDF ) Adversarial Level Agreements for Two-Party Protocols Marilyn George, Seny Kamara
2020/1248 (PDF ) Random-index PIR and Applications Craig Gentry, Shai Halevi, Bernardo Magri, Jesper Buus Nielsen, Sophia Yakoubov
2020/1247 (PDF ) Doubly Efficient Interactive Proofs for General Arithmetic Circuits with Linear Prover Time Jiaheng Zhang, Tianyi Liu, Weijie Wang, Yinuo Zhang, Dawn Song, Xiang Xie, Yupeng Zhang
2020/1246 (PDF ) The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free Gianluca Brian, Antonio Faonio, Maciej Obremski, João Ribeiro, Mark Simkin, Maciej Skórski, Daniele Venturi
2020/1245 (PDF ) Two-round trip Schnorr multi-signatures via delinearized witnesses Handan Kilinc Alper, Jeffrey Burdges
2020/1244 (PDF ) Taming the many EdDSAs Konstantinos Chalkias, François Garillot, Valeria Nikolaenko
2020/1243 (PDF ) A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring: QR-UOV Hiroki Furue, Yasuhiko Ikematsu, Yutaro Kiyomura, Tsuyoshi Takagi
2020/1242 (PDF ) Improved (Related-key) Differential Cryptanalysis on GIFT Fulei Ji, Wentao Zhang, Chunning Zhou, Tianyou Ding
2020/1241 (PDF ) DAPA: Differential Analysis aided Power Attack on (Non-)Linear Feedback Shift Registers (Extended version) Siang Meng Sim, Dirmanto Jap, Shivam Bhasin
2020/1240 (PDF ) SQISign: compact post-quantum signatures from quaternions and isogenies Luca De Feo, David Kohel, Antonin Leroux, Christophe Petit, Benjamin Wesolowski
2020/1239 (PDF ) Authenticated Dictionaries with Cross-Incremental Proof (Dis)aggregation Alin Tomescu, Yu Xia, Zachary Newman
2020/1238 (PDF ) Hardness of Entropic Module-LWE Hao Lin, Mingqiang Wang, Jincheng Zhuang, Yang Wang
2020/1237 (PDF ) A Complete Analysis of the BKZ Lattice Reduction Algorithm Jianwei Li, Phong Q. Nguyen
2020/1236 (PDF ) Round-Efficient Byzantine Broadcast under Strongly Adaptive and Majority Corruptions Jun Wan, Hanshen Xiao, Srinivas Devadas, Elaine Shi
2020/1235 (PDF ) Assessing Lightweight Block Cipher Security using Linear and Nonlinear Machine Learning Classifiers Ting Rong Lee, Je Sen Teh, Norziana Jamil, Jasy Liew Suet Yan, Jiageng Chen
2020/1234 (PDF ) Impossibility on the Schnorr Signature from the One-more DL Assumption in the Non-programmable Random Oracle Model Masayuki Fukumitsu, Shingo Hasegawa
2020/1233 (PDF ) BVOT: Self-Tallying Boardroom Voting with Oblivious Transfer Farid Javani, Alan T. Sherman
2020/1232 (PDF ) On the Existence of Weak Keys for QC-MDPC Decoding Nicolas Sendrier, Valentin Vasseur
2020/1231 (PDF ) vault1317/signal-dakez: An authenticated key exchange protocol with a public key concealing and a participation deniability designed for secure messaging Richard B. Riddick
2020/1229 (PDF ) Decentralized Asset Custody Scheme with Security against Rational Adversary Zhaohua Chen, Guang Yang
2020/1228 (PDF ) Low-Cost Body Biasing Injection (BBI) Attacks on WLCSP Devices Colin O'Flynn
2020/1227 (PDF ) Integral Cryptanalysis of Reduced-Round Tweakable TWINE Muhammad ElSheikh, Amr M. Youssef
2020/1226 (PDF ) Synchronous Constructive Cryptography Chen-Da Liu-Zhang, Ueli Maurer
2020/1225 (PDF ) ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation Arpita Patra, Thomas Schneider, Ajith Suresh, Hossein Yalame
2020/1224 (PDF ) Multi-Input Functional Encryption: Efficient Applications From Symmetric Primitives (extended version) Alexandros Bakas, Antonis Michalas
2020/1223 (PDF ) Algorithmic Acceleration of B/FV-like Somewhat Homomorphic Encryption for Compute-Enabled RAM Jonathan Takeshita, Dayane Reis, Ting Gong, Michael Niemier, X. Sharon Hu, Taeho Jung
2020/1222 (PDF ) Practical Post-Quantum Few-Time Verifiable Random Function with Applications to Algorand Muhammed F. Esgin, Veronika Kuchta, Amin Sakzad, Ron Steinfeld, Zhenfei Zhang, Shifeng Sun, Shumo Chu
2020/1221 (PDF ) Verifiable Functional Encryption using Intel SGX Tatsuya Suzuki, Keita Emura, Toshihiro Ohigashi, Kazumasa Omote
2020/1220 (PDF ) The Topographic Signature (TopoSign) Protocol Hassan Jameel Asghar, Slawomir Matelski, Josef Pieprzyk
2020/1219 (PDF ) Aggregate Signature with Detecting Functionality from Group Testing Shingo Sato, Junji Shikata, Tsutomu Matsumoto
2020/1218 (PDF ) Interactive Aggregate Message Authentication Equipped with Detecting Functionality from Adaptive Group Testing Shingo Sato, Junji Shikata
2020/1217 (PDF ) R-Propping of HK17: Upgrade for a Detached Proposal of NIST PQC First Round Survey Pedro Hecht
2020/1216 (PDF ) Polynomial Multiplication in NTRU Prime: Comparison of Optimization Strategies on Cortex-M4 Erdem Alkim, Dean Yun-Li Cheng, Chi-Ming Marvin Chung, Hülya Evkan, Leo Wei-Lun Huang, Vincent Hwang, Ching-Lin Trista Li, Ruben Niederhagen, Cheng-Jhih Shih, Julian Wälde, Bo-Yin Yang
2020/1215 (PDF ) Differential analysis of the ZUC-256 initialisation Steve Babbage, Alexander Maximov
2020/1214 (PDF ) Cryptanalysis of RSA: A Special Case of Boneh-Durfee’s Attack Majid Mumtaz, Ping Luo
2020/1213 (PDF ) Expected-Time Cryptography: Generic Techniques and Applications to Concrete Soundness Joseph Jaeger, Stefano Tessaro
2020/1212 (PDF ) Triply Adaptive UC NIZK Ran Canetti, Pratik Sarkar, Xiao Wang
2020/1210 (PDF ) Non-Committing Encryption with Constant Ciphertext Expansion from Standard Assumptions Yusuke Yoshida, Fuyuki Kitagawa, Keita Xagawa, Keisuke Tanaka
2020/1209 (PDF ) Universal Composition with Global Subroutines: Capturing Global Setup within plain UC Christian Badertscher, Ran Canetti, Julia Hesse, Björn Tackmann, Vassilis Zikas
2020/1208 (PDF ) An algorithm for bounding non-minimum weight differentials in 2-round LSX-ciphers Vitaly Kiryukhin
2020/1207 (PDF ) FPGA Benchmarking of Round 2 Candidates in the NIST Lightweight Cryptography Standardization Process: Methodology, Metrics, Tools, and Results Kamyar Mohajerani, Richard Haeussler, Rishub Nagpal, Farnoud Farahmand, Abubakr Abdulgadir, Jens-Peter Kaps, Kris Gaj
2020/1206 (PDF ) Frontrunning on Automated Decentralized Exchange in Proof Of Stake Environment Andrey Sobol
2020/1205 (PDF ) Towards Non-Interactive Witness Hiding Benjamin Kuykendall, Mark Zhandry
2020/1204 (PDF ) Single-to-Multi-Theorem Transformations for Non-Interactive Statistical Zero-Knowledge Marc Fischlin, Felix Rohrbach
2020/1203 (PDF ) Efficient Bootstrapping for Approximate Homomorphic Encryption with Non-Sparse Keys Jean-Philippe Bossuat, Christian Mouchet, Juan Troncoso-Pastoriza, Jean-Pierre Hubaux
2020/1202 (PDF ) Correlation Power Analysis and Higher-order Masking Implementation of WAGE Yunsi Fei, Guang Gong, Cheng Gongye, Kalikinkar Mandal, Raghvendra Rohit, Tianhong Xu, Yunjie Yi, Nusa Zidaric
2020/1201 (PDF ) Algebraic Key-Recovery Attacks on Reduced-Round Xoofff Tingting Cui, Lorenzo Grassi
2020/1199 (PDF ) Towards Defeating Backdoored Random Oracles: Indifferentiability with Bounded Adaptivity Yevgeniy Dodis, Pooya Farshim, Sogol Mazaheri, Stefano Tessaro
2020/1198 (PDF ) Finding EM leakages at design stage: a simulation methodology Davide Poggi, Philippe Maurine, Thomas Ordas, Alexandre Sarafianos, Jérémy Raoult
2020/1197 (PDF ) Black-Box Non-Interactive Non-Malleable Commitments Rachit Garg, Dakshita Khurana, George Lu, Brent Waters
2020/1196 (PDF ) TR-31 and AS 2805 (Non)equivalence report Arthur Van Der Merwe, David Paul, Jelena Schmalz, Timothy M. Schaerf
2020/1195 (PDF ) A Lower Bound for One-Round Oblivious RAM David Cash, Andrew Drucker, Alexander Hoover
2020/1194 (PDF ) Quantum copy-protection of compute-and-compare programs in the quantum random oracle model Andrea Coladangelo, Christian Majenz, Alexander Poremba
2020/1193 (PDF ) Bypassing Isolated Execution on RISC-V with Fault Injection Shoei Nashimoto, Daisuke Suzuki, Rei Ueno, Naofumi Homma
2020/1192 (PDF ) Architecture Correlation Analysis (ACA): Identifying the Source of Side-channel Leakage at Gate-level Yuan Yao, Tarun Kathuria, Baris Ege, Patrick Schaumont
2020/1191 (PDF ) Schrödinger's Pirate: How To Trace a Quantum Decoder Mark Zhandry
2020/1190 (PDF ) Efficient Post-Quantum SNARKs for RSIS and RLWE and their Applications to Privacy Cecilia Boschini, Jan Camenisch, Max Ovsiankin, Nicholas Spooner
2020/1189 (PDF ) Signatures of Knowledge for Boolean Circuits under Standard Assumptions (Full version) Karim Baghery, Alonso González, Zaira Pindado, Carla Ràfols
2020/1188 (PDF ) Cryptographic Group Actions and Applications Navid Alamati, Luca De Feo, Hart Montgomery, Sikhar Patranabis
2020/1187 (PDF ) Coupling of Random Systems David Lanzenberger, Ueli Maurer
2020/1186 (PDF ) Constant Ciphertext-Rate Non-Committing Encryption from Standard Assumptions Zvika Brakerski, Pedro Branco, Nico Döttling, Sanjam Garg, Giulio Malavolta
2020/1185 (PDF ) Lossiness and Entropic Hardness for Ring-LWE Zvika Brakerski, Nico Döttling
2020/1184 (PDF ) Constant-time verification for cut-and-choose-based signatures Robert Ransom
2020/1183 (PDF ) Practical Lattice-Based Zero-Knowledge Proofs for Integer Relations Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler
2020/1182 (PDF ) On the Round Complexity of the Shuffle Model Amos Beimel, Iftach Haitner, Kobbi Nissim, Uri Stemmer
2020/1181 (PDF ) TinyGarble2: Smart, Efficient, and Scalable Yao’s Garble Circuit Siam Hussain, Baiyu Li, Farinaz Koushanfar, Rosario Cammarota
2020/1180 (PDF ) MultiTLS: Secure communication channels with cipher suite diversity Ricardo Moura, David R. Matos, Miguel Pardal, Miguel Correia
2020/1179 (PDF ) Optimal Broadcast Encryption from LWE and Pairings in the Standard Model Shweta Agrawal, Daniel Wichs, Shota Yamada
2020/1178 (PDF ) An Efficient Authenticated Key Exchange from Random Self-Reducibility on CSIDH Tomoki Kawashima, Katsuyuki Takashima, Yusuke Aikawa, Tsuyoshi Takagi
2020/1177 (PDF ) Differential Attacks on CRAFT Exploiting the Involutory S-boxes and Tweak Additions Hao Guo, Siwei Sun, Danping Shi, Ling Sun, Yao Sun, Lei Hu, Meiqin Wang
2020/1176 (PDF ) Short Paper: PoSH Proof of Staked Hardware Consensus Rami Khalil, Naranker Dulay
2020/1175 (PDF ) MOTIF: (Almost) Free Branching in GMW via Vector-Scalar Multiplication David Heath, Vladimir Kolesnikov, Stanislav Peceny
2020/1174 (PDF ) Multi Random Projection Inner Product Encryption, Applications to Proximity Searchable Encryption for the Iris Biometric Chloe Cachet, Sohaib Ahmad, Luke Demarest, Serena Riback, Ariel Hamlin, Benjamin Fuller
2020/1173 (PDF ) Equipping Public-Key Cryptographic Primitives with Watermarking (or: A Hole Is to Watermark) Ryo Nishimaki
2020/1172 (PDF ) Cryptanalysis of a round optimal lattice-based multisignature scheme Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso
2020/1171 (PDF ) On the Price of Concurrency in Group Ratcheting Protocols Alexander Bienstock, Yevgeniy Dodis, Paul Rösler
2020/1170 (PDF ) On the Power of an Honest Majority in Three-Party Computation Without Broadcast Bar Alon, Ran Cohen, Eran Omri, Tom Suad
2020/1169 (PDF ) Privacy-preserving greater-than integer comparison without binary decomposition in the malicious model Sigurd Eskeland
2020/1168 (PDF ) FHE-Based Bootstrapping of Designated-Prover NIZK Zvika Brakerski, Sanjam Garg, Rotem Tsabary
2020/1167 (PDF ) Batch Verification for Statistical Zero Knowledge Proofs Inbar Kaslasi, Guy N. Rothblum, Ron D. Rothblum, Adam Sealfon, Prashant Nalini Vasudevan
2020/1166 (PDF ) A Differential and Linear Analysis of the Inversion Mapping in Odd-Characteristic Finite Fields Jorge Nakahara Jr
2020/1165 (PDF ) Practical Isogeny-Based Key-exchange with Optimal Tightness Bor de Kock, Kristian Gjøsteen, Mattia Veroni
2020/1164 (PDF ) Template Attacks Based on the Multivariate Joint Distribution Min Yang, Qingshu Meng, An Wang, Xin Liu
2020/1163 (PDF ) Specifying cycles of minimal length for commonly used linear layers in block ciphers Guoqiang Deng, Yongzhuang Wei, Xuefeng Duan, Enes Pasalic, Samir Hodzic
2020/1162 (PDF ) On Average-Case Hardness in TFNP from One-Way Functions Pavel Hubáček, Chethan Kamath, Karel Král, Veronika Slívová
2020/1161 (PDF ) KVaC: Key-Value Commitments for Blockchains and Beyond Shashank Agrawal, Srinivasan Raghuraman
2020/1160 (PDF ) Characterizing Deterministic-Prover Zero Knowledge Nir Bitansky, Arka Rai Choudhuri
2020/1159 (PDF ) ACE in Chains : How Risky is CBC Encryption of Binary Executable Files ? Rintaro Fujita, Takanori Isobe, Kazuhiko Minematsu
2020/1158 (PDF ) Don't throw your nonces out with the bathwater: Speeding up Dilithium by reusing the tail of y Daan Sprenkels, Bas Westerbaan
2020/1157 (PDF ) Secure Massively Parallel Computation for Dishonest Majority Rex Fernando, Ilan Komargodski, Yanyi Liu, Elaine Shi
2020/1156 (PDF ) Verifiable Hierarchical Key Assignment Schemes Anna Lisa Ferrara, Chiara Ricciardi
2020/1155 (PDF ) Zilch: A Framework for Deploying Transparent Zero-Knowledge Proofs Dimitris Mouris, Nektarios Georgios Tsoutsos
2020/1154 (PDF ) Functional Encryption for Set Intersection in the Multi-Client Setting Kwangsu Lee, Minhye Seo
2020/1153 (PDF ) Key Committing AEADs Shay Gueron
2020/1152 (PDF ) An Automatic Search Tool for Iterative Trails and its Application to estimation of differentials and linear hulls Tianyou Ding, Wentao Zhang, Chunning Zhou, Fulei Ji
2020/1151 (PDF ) Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E) Robert Merget, Marcus Brinkmann, Nimrod Aviram, Juraj Somorovsky, Johannes Mittmann, Jörg Schwenk
2020/1150 (PDF ) Terrorist Attacks for Fake Exposure Notifications in Contact Tracing Systems Gennaro Avitabile, Daniele Friolo, Ivan Visconti
2020/1149 (PDF ) Deterministic Wallets in a Quantum World Nabil Alkeilani Alkadri, Poulami Das, Andreas Erwig, Sebastian Faust, Juliane Krämer, Siavash Riahi, Patrick Struck
2020/1148 (PDF ) An Area Aware Accelerator for Elliptic Curve Point Multiplication Malik Imran, Samuel Pagliarini, Muhammad Rashid
2020/1146 (PDF ) Let's Tessellate: Tiling for Security Against Advanced Probe and Fault Adversaries Siemen Dhooghe, Svetla Nikova
2020/1145 (PDF ) Improved Security Analysis for Nonce-based Enhanced Hash-then-Mask MACs Wonseok Choi, Byeonghak Lee, Yeongmin Lee, Jooyoung Lee
2020/1144 (PDF ) Algebraic Distinguishers: From Discrete Logarithms to Decisional Uber Assumptions Lior Rotem, Gil Segev
2020/1143 (PDF ) Rescue-Prime: a Standard Specification (SoK) Alan Szepieniec, Tomer Ashur, Siemen Dhooghe
2020/1142 (PDF ) Factoring Algorithm Based on Parameterized Newton Method Zhengjun Cao, Lihua Liu
2020/1141 (PDF ) A post-quantum signature scheme from the secant variety of the Grassmannian Daniele Di Tullio, Manoj Gyawali
2020/1140 (PDF ) On the Efficient Estimation of Min-Entropy Yongjune Kim, Cyril Guyot, Young-Sik Kim
2020/1139 (PDF ) Succinct and Adaptively Secure ABE for ABP from k-Lin Huijia Lin, Ji Luo
2020/1138 (PDF ) Epochal Signatures for Deniable Group Chats Andreas Hülsing, Florian Weber
2020/1137 (PDF ) MOTION - A Framework for Mixed-Protocol Multi-Party Computation Lennart Braun, Daniel Demmler, Thomas Schneider, Oleksandr Tkachenko
2020/1136 (PDF ) A Note on Koblitz Curves over Prime Fields Han Wu, Guangwu Xu
2020/1135 (PDF ) Adaptively Secure Inner Product Encryption from LWE Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
2020/1134 (PDF ) Back To The Basics: Seamless Integration of Side-Channel Pre-processing in Deep Neural Networks Yoo-Seung Won, Xiaolu Hou, Dirmanto Jap, Jakub Breier, Shivam Bhasin
2020/1133 (PDF ) Security Analysis of Subterranean 2.0 Ling Song, Yi Tu, Danping Shi, Lei Hu
2020/1132 (PDF ) A Logarithmic Lower Bound for Oblivious RAM (for all parameters) Ilan Komargodski, Wei-Kai Lin
2020/1131 (PDF ) Several classes of minimal binary linear codes violating the Aschikhmin-Barg's bound Enes Pasalic, René Rodríguez, Fengrong Zhang, Yongzhuang Wei
2020/1130 (PDF ) Secure training of decision trees with continuous attributes Mark Abspoel, Daniel Escudero, Nikolaj Volgushev
2020/1129 (PDF ) A Secure Software Defined Networking based Framework for IoT Networks Ambili K N, Jimmy Jose
2020/1127 (PDF ) SideLine: How Delay-Lines (May) Leak Secrets from your SoC Joseph Gravellier, Jean-Max Dutertre, Yannick Teglia, Philippe Loubet Moundi
2020/1126 (PDF ) Bitcoin-Monero Cross-chain Atomic Swap Joël Gugger
2020/1125 (PDF ) High-Speed FPGA Implementation of SIKE Based on An Ultra-Low-Latency Modular Multiplier Jing Tian, Bo Wu, Zhongfeng Wang
2020/1124 (PDF ) Optimized Voronoi-based algorithms for parallel shortest vector computations Artur Mariano, Filipe Cabeleira, Gabriel Falcao, Luís Paulo Santos
2020/1123 (PDF ) Fixslicing AES-like Ciphers: New bitsliced AES speed records on ARM-Cortex M and RISC-V Alexandre Adomnicai, Thomas Peyrin
2020/1122 (PDF ) The Velvet Path to Superlight Blockchain Clients Aggelos Kiayias, Andrianna Polydouri, Dionysis Zindros
2020/1121 (PDF ) Post-Quantum Linkable Ring Signature Enabling Distributed Authorised Ring Confidential Transactions in Blockchain Wilson Alberto Torres, Ron Steinfeld, Amin Sakzad, Veronika Kuchta
2020/1120 (PDF ) On the security of Diene-Thabet-Yusuf's cubic multivariate signature scheme Yasufumi Hashimoto
2020/1119 (PDF ) All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers Christoph Hagen, Christian Weinert, Christoph Sendner, Alexandra Dmitrienko, Thomas Schneider
2020/1118 (PDF ) Approximate Homomorphic Encryption with Reduced Approximation Error Andrey Kim, Antonis Papadimitriou, Yuriy Polyakov
2020/1117 (PDF ) Economic Proof of Work Jia Kan
2020/1116 (PDF ) On Multivariate Algorithms of Digital Signatures Based on Maps of Unbounded Degree Acting on Secure El Gamal Type Mode. V. Ustimenko
2020/1115 (PDF ) SiliconToaster: A Cheap and Programmable EM Injector for Extracting Secrets Karim M. Abdellatif, Olivier Hériveaux
2020/1114 (PDF ) Did you mix me? Formally Verifying Verifiable Mix Nets in Electronic Voting Thomas Haines, Rajeev Gore, Bhavesh Sharma
2020/1113 (PDF ) On combinatorial approaches to search for quadratic APN functions Konstantin Kalgin, Valeriya Idrisova
2020/1112 (PDF ) A cautionary note on the use of Gurobi for cryptanalysis Muhammad ElSheikh, Amr M. Youssef
2020/1111 (PDF ) Extending the Signed Non-zero Bit and Sign-Aligned Columns Methods to General Bases for Use in Cryptography Abhraneel Dutta, Aaron Hutchinson, Koray Karabina
2020/1110 (PDF ) Two-round $n$-out-of-$n$ and Multi-Signatures and Trapdoor Commitment from Lattices Ivan Damgård, Claudio Orlandi, Akira Takahashi, Mehdi Tibouchi
2020/1109 (PDF ) Karatsuba-based square-root Vélu’s formulas applied to two isogeny-based protocols Gora Adj, Jesús-Javier Chi-Domínguez, Francisco Rodríguez-Henríquez
2020/1108 (PDF ) Radical isogenies Wouter Castryck, Thomas Decru, Frederik Vercauteren
2020/1107 (PDF ) Scalable Ciphertext Compression Techniques for Post-Quantum KEMs and their Applications Shuichi Katsumata, Kris Kwiatkowski, Federico Pintore, Thomas Prest
2020/1106 (PDF ) Accumulators in (and Beyond) Generic Groups: Non-Trivial Batch Verification Requires Interaction Gili Schul-Ganz, Gil Segev
2020/1105 (PDF ) Catalic: Delegated PSI Cardinality with Applications to Contact Tracing Thai Duong, Duong Hieu Phan, Ni Trieu
2020/1104 (PDF ) High-Assurance Cryptography Software in the Spectre Era Gilles Barthe, Sunjay Cauligi, Benjamin Gregoire, Adrien Koutsos, Kevin Liao, Tiago Oliveira, Swarn Priya, Tamara Rezk, Peter Schwabe
2020/1103 (PDF ) Packed Multiplication: How to Amortize the Cost of Side-channel Masking ? Weijia Wang, Chun Guo, François-Xavier Standaert, Yu Yu, Gaëtan Cassiers
2020/1102 (PDF ) PQC: R-Propping of Public-Key Cryptosystems Using Polynomials over Non-commutative Algebraic Extension Rings Pedro Hecht
2020/1101 (PDF ) NC-Max: Breaking the Security-Performance Tradeoff in Nakamoto Consensus Ren Zhang, Dingwei Zhang, Quake Wang, Shichen Wu, Jan Xie, Bart Preneel
2020/1100 (PDF ) Towards Efficiency-Preserving Round Compression in MPC: Do fewer rounds mean more computation? Prabhanjan Ananth, Arka Rai Choudhuri, Aarushi Goel, Abhishek Jain
2020/1099 (PDF ) Unbounded HIBE with Tight Security Roman Langrehr, Jiaxin Pan
2020/1098 (PDF ) Formalizing Bitcoin Crashes with Universally Composable Security Junming Ke, Pawel Szalachowski, Jianying Zhou, Qiuliang Xu
2020/1097 (PDF ) How to Build Optimally Secure PRFs Using Block Ciphers Benoît Cogliati, Ashwin Jha, Mridul Nandi
2020/1096 (PDF ) Far Field EM Side-Channel Attack on AES Using Deep Learning Ruize Wang, Huanyu Wang, Elena Dubrova
2020/1095 (PDF ) Cycle structure of generalized and closed loop invariants Yongzhuang Wei, Rene Rodriguez, Enes Pasalic
2020/1094 (PDF ) TN-IDS for Network Layer Attacks in RPL based IoT Systems Ambili K N, Jimmy Jose
2020/1093 (PDF ) Mind the Propagation of States New Automatic Search Tool for Impossible Differentials and Impossible Polytopic Transitions (Full Version) Xichao Hu, Yongqiang Li, Lin Jiao, Shizhu Tian, Mingsheng Wang
2020/1092 (PDF ) The Round Complexity of Secure Computation Against Covert Adversaries Arka Rai Choudhuri, Vipul Goyal, Abhishek Jain
2020/1091 (PDF ) Ebb-and-Flow Protocols: A Resolution of the Availability-Finality Dilemma Joachim Neu, Ertem Nusret Tas, David Tse
2020/1090 (PDF ) On the Adaptive Security of MACs and PRFs Andrew Morgan, Rafael Pass, Elaine Shi
2020/1089 (PDF ) Improved Attacks on sLiSCP Permutation and Tight Bound of Limited Birthday Distinguishers Akinori Hosoyamada, María Naya-Plasencia, Yu Sasaki
2020/1088 (PDF ) Two-Pass Authenticated Key Exchange with Explicit Authentication and Tight Security Xiangyu Liu, Shengli Liu, Dawu Gu, Jian Weng
2020/1087 (PDF ) Efficient Identity-Based Encryption with Hierarchical Key-Insulation from HIBE Keita Emura, Atsushi Takayasu, Yohei Watanabe
2020/1086 (PDF ) Combinatorial Rank Attacks Against the Rectangular Simple Matrix Encryption Scheme Daniel Apon, Dustin Moody, Ray Perlner, Daniel Smith-Tone, Javier Verbel
2020/1085 (PDF ) Chosen-Ciphertext Secure Attribute-Hiding Non-Zero Inner Product Encryptions and Its Applications Tapas Pal, Ratna Dutta
2020/1084 (PDF ) Fully Collision-Resistant Chameleon-Hashes from Simpler and Post-Quantum Assumptions David Derler, Stephan Krenn, Kai Samelin, Daniel Slamanig
2020/1083 (PDF ) A Fast and Compact RISC-V Accelerator for Ascon and Friends Stefan Steinegger, Robert Primas
2020/1082 (PDF ) Beyond Birthday Bound Secure Fresh Rekeying: Application to Authenticated Encryption Bart Mennink
2020/1081 (PDF ) Twisted-PHS: Using the Product Formula to Solve Approx-SVP in Ideal Lattices Olivier Bernard, Adeline Roux-Langlois
2020/1080 (PDF ) Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-Challenge Setting Rupeng Yang, Junzuo Lai, Zhengan Huang, Man Ho Au, Qiuliang Xu, Willy Susilo
2020/1079 (PDF ) Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption Rongmao Chen, Xinyi Huang, Moti Yung
2020/1078 (PDF ) Fair and Sound Secret Sharing from Homomorphic Time-Lock Puzzles Jodie Knapp, Elizabeth A. Quaglia
2020/1077 (PDF ) Unconditionally secure quantum bit commitment: Revised Ming-Xing Luo, Xiaojun Wang
2020/1076 (PDF ) Minimizing the Two-Round Tweakable Even-Mansour Cipher Avijit Dutta
2020/1075 (PDF ) On the Query Complexity of Constructing PRFs from Non-adaptive PRFs Pratik Soni, Stefano Tessaro
2020/1074 (PDF ) A Scalable Simulation of the BB84 Protocol Involving Eavesdropping Mihai-Zicu Mina, Emil Simion
2020/1073 (PDF ) Tight Security Analysis of 3-Round Key-Alternating Cipher with A Single Permutation Yusai Wu, Liqing Yu, Zhenfu Cao, Xiaolei Dong
2020/1072 (PDF ) Cryptanalysis of the permutation based algorithm SpoC Liliya Kraleva, Raluca Posteuca, Vincent Rijmen
2020/1071 (PDF ) On Pairing-Free Blind Signature Schemes in the Algebraic Group Model Julia Kastner, Julian Loss, Jiayu Xu
2020/1070 (PDF ) Efficient indifferentiable hashing to elliptic curves $y^2 = x^3 + b$ provided that $b$ is a quadratic residue Dmitrii Koshelev
2020/1069 (PDF ) Lunar: a Toolbox for More Efficient Universal and Updatable zkSNARKs and Commit-and-Prove Extensions Matteo Campanelli, Antonio Faonio, Dario Fiore, Anaïs Querol, Hadrián Rodríguez
2020/1068 (PDF ) An Efficient Transformation Capabilities of Single Database Private Block Retrieval Radhakrishna Bhat, N R Sunitha
2020/1067 (PDF ) A Constant Time Full Hardware Implementation of Streamlined NTRU Prime Adrian Marotzke
2020/1066 (PDF ) Constant time algorithms for ROLLO-I-128 Carlos Aguilar-Melchor, Nicolas Aragon, Emanuele Bellini, Florian Caullery, Rusydi H. Makarim, Chiara Marcolla
2020/1065 (PDF ) Machine-Learning assisted Side-Channel Attacks on RNS-based Elliptic Curve Implementations using Hybrid Feature Engineering Naila Mukhtar, Louiza Papachristodoulou, Apostolos P. Fournaris, Lejla Batina, Yinan Kong
2020/1064 (PDF ) Mimblewimble Non-Interactive Transaction Scheme Gary Yu
2020/1062 (PDF ) Quantum Search for Scaled Hash Function Preimages Sergi Ramos-Calderer, Emanuele Bellini, José I. Latorre, Marc Manzano, Victor Mateu
2020/1061 (PDF ) A new idea in response to fast correlation attacks on small-state stream ciphers Vahid Amin Ghafari, Fujiang Lin
2020/1060 (PDF ) Circular Security Is Complete for KDM Security Fuyuki Kitagawa, Takahiro Matsuda
2020/1059 (PDF ) Incorrectly Generated RSA Keys: How To Recover Lost Plaintexts Daniel Shumow
2020/1057 (PDF ) MuSig-DN: Schnorr Multi-Signatures with Verifiably Deterministic Nonces Jonas Nick, Tim Ruffing, Yannick Seurin, Pieter Wuille
2020/1056 (PDF ) Automated enumeration of block cipher differentials: An optimized branch-and-bound GPU framework Wei-Zhu Yeoh, Je Sen Teh, Jiageng Chen
2020/1055 (PDF ) Synced Hash-Based Signatures: Post-Quantum Authentication in a Blockchain Santi J. Vives
2020/1054 (PDF ) Mind the Gap: Individual- and universal-verifiability plus cast-as-intended don't yield verifiable voting systems Ben Smyth
2020/1053 (PDF ) Circuit Amortization Friendly Encodings and their Application to Statistically Secure Multiparty Computation Anders Dalskov, Eysa Lee, Eduardo Soria-Vazquez
2020/1052 (PDF ) Attacking Threshold Wallets Jean-Philippe Aumasson, Omer Shlomovits
2020/1051 (PDF ) Lower Bounds on the Degree of Block Ciphers Phil Hebborn, Baptiste Lambin, Gregor Leander, Yosuke Todo
2020/1050 (PDF ) On the Exact Round Complexity of Best-of-both-Worlds Multi-party Computation Arpita Patra, Divya Ravi, Swati Singla
2020/1049 (PDF ) Rotational analysis of ChaCha permutation Stefano Barbero, Emanuele Bellini, Rusydi Makarim
2020/1048 (PDF ) An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent Sums Kai Hu, Siwei Sun, Meiqin Wang, Qingju Wang
2020/1047 (PDF ) Side-channel Attacks with Multi-thread Mixed Leakage Yiwen Gao, Yongbin Zhou
2020/1046 (PDF ) On the Linear Distinguishing Attack against ZUC-256 Stream Cipher ZUC Design Team
2020/1045 (PDF ) On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis Dhiman Saha, Yu Sasaki, Danping Shi, Ferdinand Sibleyras, Siwei Sun, Yingjie Zhang
2020/1044 (PDF ) A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila
2020/1043 (PDF ) Minimal Symmetric PAKE and 1-out-of-N OT from Programmable-Once Public Functions Ian McQuoid, Mike Rosulek, Lawrence Roy
2020/1042 (PDF ) Candidate Obfuscation via Oblivious LWE Sampling Hoeteck Wee, Daniel Wichs
2020/1041 (PDF ) Sign in finite fields Abraham Westerbaan, Bas Westerbaan
2020/1040 (PDF ) MoSS: Modular Security Specifications Framework Amir Herzberg, Hemi Leibowitz, Ewa Syta, Sara Wrotniak
2020/1039 (PDF ) Moderated Redactable Blockchains: A Definitional Framework with an Efficient Construct Mohammad Sadeq Dousti, Alptekin Küpçü
2020/1038 (PDF ) On Configurable SCA Countermeasures Against Single Trace Attacks for the NTT - A Performance Evaluation Study over Kyber and Dilithium on the ARM Cortex-M4 Prasanna Ravi, Romain Poussier, Shivam Bhasin, Anupam Chattopadhyay
2020/1037 (PDF ) A High-performance Hardware Implementation of Saber Based on Karatsuba Algorithm Yihong Zhu, Min Zhu, Bohan Yang, Wenping Zhu, Chenchen Deng, Chen Chen, Shaojun Wei, Leibo Liu
2020/1036 (PDF ) Security in banking Arthur Van Der Merwe, David Paul, Jelena Schmalz, Timothy M. Schaerf
2020/1035 (PDF ) Evolving Secret Sharing with Essential Participants Jyotirmoy Pramanik, Avishek Adhikari
2020/1034 (PDF ) Cryptanalysis of Full LowMC and LowMC-M with Algebraic Techniques Fukang Liu, Takanori Isobe, Willi Meier
2020/1033 (PDF ) RandChain: A Scalable and Fair Decentralised Randomness Beacon Runchao Han, Haoyu Lin, Jiangshan Yu
2020/1032 (PDF ) Cryptanalysis of the MALICIOUS Framework Tim Beyne, Chaoyun Li
2020/1031 (PDF ) Profiled Deep Learning Side-Channel Attack on a Protected Arbiter PUF Combined with Bitstream Modification Yang Yu, Michail Moraitis, Elena Dubrova
2020/1030 (PDF ) Quantum Collision Attacks on AES-like Hashing with Low Quantum Random Access Memories Xiaoyang Dong, Siwei Sun, Danping Shi, Fei Gao, Xiaoyun Wang, Lei Hu
2020/1029 (PDF ) Tighter Proofs for the SIGMA and TLS 1.3 Key Exchange Protocols Hannah Davis, Felix Günther
2020/1028 (PDF ) Secure Data Hiding for Contact Tracing Craig Gotsman, Kai Hormann
2020/1027 (PDF ) Certificate-Based Parallel Key-Insulated Aggregate Signature Against Fully Chosen-Key Attacks for Industrial Internet of Things Hu Xiong, Yingzhe Hou, Xin Huang, Saru Kumari
2020/1026 (PDF ) Simple and Efficient FE for Quadratic Functions Junqing Gong, Haifeng Qian
2020/1025 (PDF ) A Bit-Vector Differential Model for the Modular Addition by a Constant Seyyed Arash Azimi, Adrián Ranea, Mahmoud Salmasizadeh, Javad Mohajeri, Mohammad Reza Aref, Vincent Rijmen
2020/1024 (PDF ) Factoring and Pairings are not Necessary for iO: Circular-Secure LWE Suffices Zvika Brakerski, Nico Döttling, Sanjam Garg, Giulio Malavolta
2020/1023 (PDF ) Post-Quantum Anonymous Veto Networks Jintai Ding, Doug Emery, Johannes Mueller, Peter Y. A. Ryan, Vonn Kee Wong
2020/1022 (PDF ) Polynomial IOPs for Linear Algebra Relations Alan Szepieniec, Yuncong Zhang
2020/1021 (PDF ) Consensus Redux: Distributed Ledgers in the Face of Adversarial Supremacy Christian Badertscher, Peter Gaži, Aggelos Kiayias, Alexander Russell, Vassilis Zikas
2020/1020 (PDF ) Towards Classical Hardness of Module-LWE: The Linear Rank Case Katharina Boudgoust, Corentin Jeudy, Adeline Roux-Langlois, Weiqiang Wen
2020/1019 (PDF ) Security of Streaming Encryption in Google's Tink Library Viet Tung Hoang, Yaobin Shen
2020/1018 (PDF ) Small Superset and Big Subset Obfuscation Steven D. Galbraith, Trey Li
2020/1017 (PDF ) Governance framework for Quipuswap - automated decentralized exchange Andrey Sobol, Anastasiia Kondaurova
2020/1016 (PDF ) Hardware-Assisted Intellectual Property Protection of Deep Learning Models Abhishek Chakraborty, Ankit Mondal, Ankur Srivastava
2020/1015 (PDF ) On Multivariate Algorithms of Digital Signatures of Linear Degree and Low Density. Vasyl Ustimenko
2020/1014 (PDF ) GANRED: GAN-based Reverse Engineering of DNNs via Cache Side-Channel Yuntao Liu, Ankur Srivastava
2020/1013 (PDF ) A Study on Privacy-Preserving GRU Inference Framework Shou-Ching Hsiao, Zi-Yuan Liu, Raylin Tso
2020/1012 (PDF ) Compact, Efficient and UC-Secure Isogeny-Based Oblivious Transfer Yi-Fu Lai, Steven D. Galbraith, Cyprien Delpech de Saint Guilhem
2020/1011 (PDF ) Private Join and Compute from PIR with Default Tancrède Lepoint, Sarvar Patel, Mariana Raykova, Karn Seth, Ni Trieu
2020/1010 (PDF ) Indistinguishability Obfuscation from Circular Security Romain Gay, Rafael Pass
2020/1009 (PDF ) Obfuscating Finite Automata Steven D. Galbraith, Lukas Zobernig
2020/1008 (PDF ) Differential Power Analysis Attacks on Different Implementations of AES with the ChipWhisperer Nano Leah Lathrop
2020/1007 (PDF ) Attacks on Integer-RLWE Alessandro Budroni, Benjamin Chetioui, Ermes Franch
2020/1006 (PDF ) An Analysis of Fault Attacks on CSIDH Jason LeGrow, Aaron Hutchinson
2020/1005 (PDF ) Trouble at the CSIDH: Protecting CSIDH with Dummy-Operations against Fault Injection Attacks Fabio Campos, Matthias J. Kannwischer, Michael Meyer, Hiroshi Onuki, Marc Stöttinger
2020/1004 (PDF ) Asynchronous Remote Key Generation: An Analysis of Yubico's Proposal for W3C WebAuthn Nick Frymann, Daniel Gardham, Franziskus Kiefer, Emil Lundberg, Mark Manulis, Dain Nilsson
2020/1003 (PDF ) Indistinguishability Obfuscation from Well-Founded Assumptions Aayush Jain, Huijia Lin, Amit Sahai
2020/1002 (PDF ) CrypTFlow2: Practical 2-Party Secure Inference Deevashwer Rathee, Mayank Rathee, Nishant Kumar, Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma
2020/1001 (PDF ) Robust distributed symmetric-key encryption Xunhua Wang, Ben Huson
2020/1000 (PDF ) Mechanised Models and Proofs for Distance-Bounding Ioana Boureanu, Constantin Catalin Dragan, François Dupressoir, David Gerault, Pascal Lafourcade
2020/999 (PDF ) Attribute-Based Symmetric Searchable Encryption Hai-Van Dang, Amjad Ullah, Alexandros Bakas, Antonis Michalas
2020/998 (PDF ) Lightweight Virtual Payment Channels Maxim Jourenko, Mario Larangeira, Keisuke Tanaka
2020/997 (PDF ) Alibi: A Flaw in Cuckoo-Hashing based Hierarchical ORAM Schemes and a Solution Brett Hemenway Falk, Daniel Noble, Rafail Ostrovsky
2020/996 (PDF ) Unifying Generic Group Models Ueli Maurer, Christopher Portmann, Jiamin Zhu
2020/995 (PDF ) Bootstrapping fully homomorphic encryption over the integers in less than one second Hilder Vitor Lima Pereira
2020/994 (PDF ) SPARKs: Succinct Parallelizable Arguments of Knowledge Naomi Ephraim, Cody Freitag, Ilan Komargodski, Rafael Pass
2020/993 (PDF ) Cryptanalysis of Masked Ciphers: A not so Random Idea Tim Beyne, Siemen Dhooghe, Zhenda Zhang
2020/992 (PDF ) Single-Trace Attacks on the Message Encoding of Lattice-Based KEMs Bo-Yeon Sim, Jihoon Kwon, Joohee Lee, Il-Ju Kim, Taeho Lee, Jaeseung Han, Hyojin Yoon, Jihoon Cho, Dong-Guk Han
2020/991 (PDF ) A Novel Hash Function Design based on Hybrid Cellular Automata and Sponge Functions Anita John, Alan Reji, Ajay P Manoj, Atul Premachandran, Basil Zachariah, Jimmy Jose
2020/990 (PDF ) Performance Comparisons and Migration Analyses of Lattice-based Cryptosystems on Hardware Security Module Junting Xiao, Tadahiko Ito
2020/989 (PDF ) Algorithm for SIS and MultiSIS problems Igor Semaev
2020/988 (PDF ) 120.147 Efficient Electromagnetic Side Channel Analysis by Probe Positioning using Multi-Layer Perceptron Anupam Golder, Baogeng Ma, Debayan Das, Josef Danial, Shreyas Sen, Arijit Raychowdhury
2020/987 (PDF ) Fuzzy Asymmetric Password-Authenticated Key Exchange Andreas Erwig, Julia Hesse, Maximilian Orlt, Siavash Riahi
2020/986 (PDF ) The MALICIOUS Framework: Embedding Backdoors into Tweakable Block Ciphers Thomas Peyrin, Haoyang Wang
2020/985 (PDF ) Orienting supersingular isogeny graphs Leonardo Colò, David Kohel
2020/984 (PDF ) On Multivariate Algorithms of Digital Signatures on Secure El Gamal Type Mode. Vasyl Ustimenko
2020/983 (PDF ) A Differential Meet-in-the-Middle Attack on the Zip cipher Michael Stay
2020/982 (PDF ) Election Verifiability Revisited: Automated Security Proofs and Attacks on Helios and Belenios Sevdenur Baloglu, Sergiu Bursuc, Sjouke Mauw, Jun Pang
2020/981 (PDF ) Deep Learning based analysis of Key Scheduling Algorithm of PRESENT cipher Manan Pareek, Dr. Girish Mishra, Varun Kohli
2020/980 (PDF ) SNARGs for Bounded Depth Computations and PPAD Hardness from Sub-Exponential LWE Ruta Jawale, Yael Tauman Kalai, Dakshita Khurana, Rachel Zhang
2020/979 (PDF ) Mercurial Signatures for Variable-Length Messages Elizabeth C. Crites, Anna Lysyanskaya
2020/978 (PDF ) Linear and Partly-Pseudo-Linear Cryptanalysis of Reduced-Round SPARX Cipher Sarah Alzakari, Poorvi Vora
2020/977 (PDF ) On the Influence of Optimizers in Deep Learning-based Side-channel Analysis Guilherme Perin, Stjepan Picek
2020/976 (PDF ) Synchronizable Exchange Ranjit Kumaresan, Srinivasan Raghuraman, Adam Sealfon
2020/975 (PDF ) Aardvark: An Asynchronous Authenticated Dictionary with Applications to Account-based Cryptocurrencies Derek Leung, Yossi Gilad, Sergey Gorbunov, Leonid Reyzin, Nickolai Zeldovich
2020/974 (PDF ) Compact-LWE-MQ^{H}: Public Key Encryption without Hardness Assumptions Dongxi Liu, Surya Nepal
2020/973 (PDF ) Stacked Garbling: Garbled Circuit Proportional to Longest Execution Path David Heath, Vladimir Kolesnikov
2020/972 (PDF ) Optimized Binary GCD for Modular Inversion Thomas Pornin
2020/971 (PDF ) QuantumHammer: A Practical Hybrid Attack on the LUOV Signature Scheme Koksal Mus, Saad Islam, Berk Sunar
2020/970 (PDF ) Efficient Protocols for Oblivious Linear Function Evaluation from Ring-LWE Carsten Baum, Daniel Escudero, Alberto Pedrouzo-Ulloa, Peter Scholl, Juan Ramón Troncoso-Pastoriza
2020/969 (PDF ) Hashing to elliptic curves of $j=0$ and quadratic imaginary orders of class number $2$ Dmitrii Koshelev
2020/968 (PDF ) Feeding Cryptographic Protocols with Rich and Reliable Supply of Quantum-Grade Randomness Gideon Samid
2020/967 (PDF ) The Nested Subset Differential Attack: A Practical Direct Attack Against LUOV which Forges a Signature within 210 Minutes Jintai Ding, Joshua Deaton, Vishakha, Bo-Yin Yang
2020/966 (PDF ) EM-Side-Channel Resistant Symmetric-Key Authentication Mechanism for Small Devices Rick Boivie, Charanjit S. Jutla, Daniel Friedman, Ghavam Shahidi
2020/965 (PDF ) Computation of a 30750-Bit Binary Field Discrete Logarithm Robert Granger, Thorsten Kleinjung, Arjen K. Lenstra, Benjamin Wesolowski, Jens Zumbragel
2020/964 (PDF ) Configurable Private Querying: Lookup and Partial Matching under Homomorphic Encryption Hamish Hunt, Jack Crawford, Oliver Masters, Enrico Steffinlongo, Flavio Bergamaschi
2020/963 (PDF ) From Partial to Global Asynchronous Reliable Broadcast Diana Ghinea, Martin Hirt, Chen-Da Liu-Zhang
2020/962 (PDF ) Post-Quantum Verification of Fujisaki-Okamoto Dominique Unruh
2020/961 (PDF ) Enable Dynamic Parameters Combination to Boost Linear Convolutional Neural Network for Sensitive Data Inference Qizheng Wang, Wenping Ma, Jie Li, Ge Liu
2020/960 (PDF ) Retrofitting Leakage Resilient Authenticated Encryption to Microcontrollers Florian Unterstein, Marc Schink, Thomas Schamberger, Lars Tebelmann, Manuel Ilg, Johann Heyszl
2020/959 (PDF ) Quantum Cryptanalysis on Contracting Feistel Structures and Observation on Related-key Settings Carlos Cid, Akinori Hosoyamada, Yunwen Liu, Siang Meng Sim
2020/958 (PDF ) Multi-Threshold Asynchronous Reliable Broadcast and Consensus Martin Hirt, Ard Kastrati, Chen-Da Liu-Zhang
2020/957 (PDF ) Combining Optimization Objectives: New Machine-Learning Attacks on Strong PUFs Johannes Tobisch, Anita Aghaie, Georg T. Becker
2020/956 (PDF ) Constant Time Montgomery Ladder Kaushik Nath, Palash Sarkar
2020/955 (PDF ) Public-key Authenticated Encryption with Keyword Search: A Generic Construction and Its Quantum-resistant Instantiation Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen
2020/954 (PDF ) New Techniques for Traitor Tracing: Size $N^{1/3}$ and More from Pairings Mark Zhandry
2020/953 (PDF ) Performance comparison between deep learning-based and conventional cryptographic distinguishers Emanuele Bellini, Matteo Rossi
2020/952 (PDF ) On What to Learn: Train or Adapt a Deeply Learned Profile? Christophe Genevey-Metat, Benoît Gérard, Annelie Heuser
2020/951 (PDF ) Amplifying the Security of Functional Encryption, Unconditionally Aayush Jain, Alexis Korb, Nathan Manohar, Amit Sahai
2020/950 (PDF ) Self-Processing Private Sensor Data via Garbled Encryption Nathan Manohar, Abhishek Jain, Amit Sahai
2020/949 (PDF ) HABIT: Hardware-Assisted Bluetooth-based Infection Tracking Nathan Manohar, Peter Manohar, Rajit Manohar
2020/948 (PDF ) STARK Friendly Hash -- Survey and Recommendation Eli Ben-Sasson, Lior Goldberg, David Levit
2020/947 (PDF ) Data Oblivious Algorithms for Multicores Vijaya Ramachandran, Elaine Shi
2020/946 (PDF ) Timing attacks and local timing attacks against Barrett’s modular multiplication algorithm Johannes Mittmann, Werner Schindler
2020/945 (PDF ) On the (in)security of ROS Fabrice Benhamouda, Tancrède Lepoint, Julian Loss, Michele Orrù, Mariana Raykova
2020/944 (PDF ) Secure Conflict-free Replicated Data Types Manuel Barbosa, Bernardo Ferreira, João Marques, Bernardo Portela, Nuno Preguiça
2020/943 (PDF ) Analysing and Improving Shard Allocation Protocols for Sharded Blockchains Runchao Han, Jiangshan Yu, Ren Zhang
2020/942 (PDF ) RandRunner: Distributed Randomness from Trapdoor VDFs with Strong Uniqueness Philipp Schindler, Aljosha Judmayer, Markus Hittmeir, Nicholas Stifter, Edgar Weippl
2020/941 (PDF ) Alternative Tower Field Construction for Quantum Implementation of the AES S-box Doyoung Chung, Seungkwang Lee, Dooho choi, Jooyoung Lee
2020/940 (PDF ) Directly revocable ciphertext-policy attribute-based encryption from lattices Fei Meng
2020/939 (PDF ) DLDDO: Deep Learning to Detect Dummy Operations JongHyeok Lee, Dong-Guk Han
2020/938 (PDF ) Performance Trade-offs in Design of MimbleWimble Proofs of Reserves Suyash Bagad, Saravanan Vijayakumaran
2020/937 (PDF ) BAM BAM!! On Reliability of EMFI for in-situ Automotive ECU Attacks Colin O'Flynn
2020/936 (PDF ) Cryptanalysis and Improvement of Anonymous Authentication for Wireless Body Area Networks with Provable Security Mahender Kumar
2020/935 (PDF ) Privacy-Preserving Multi-Operator Contact Tracing for Early Detection of Covid19 Contagions Davide Andreoletti, Omran Ayoub, Silvia Giordano, Massimo Tornatore, Giacomo Verticale
2020/934 (PDF ) CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability Deepak Maram, Harjasleen Malvai, Fan Zhang, Nerla Jean-Louis, Alexander Frolov, Tyler Kell, Tyrone Lobban, Christine Moy, Ari Juels, Andrew Miller
2020/932 (PDF ) A Note on Authenticated Group Key Agreement Protocol Based on Twist Conjugacy Problem in Near – Rings Atul Chaturvedi, Varun Shukla, Manoj K. Misra
2020/931 (PDF ) Homomorphic string search with constant multiplicative depth Charlotte Bonte, Ilia Iliashenko
2020/930 (PDF ) The design of scalar AES Instruction Set Extensions for RISC-V Ben Marshall, G. Richard Newell, Dan Page, Markku-Juhani O. Saarinen, Claire Wolf
2020/929 (PDF ) Local XOR Unification: Definitions, Algorithms and Application to Cryptography Hai Lin, Christopher Lynch
2020/928 (PDF ) Multi-theorem (Malicious) Designated-Verifier NIZK for QMA Omri Shmueli
2020/927 (PDF ) A Gas-Efficient Superlight Bitcoin Client in Solidity Stelios Daveas, Kostis Karantias, Aggelos Kiayias, Dionysis Zindros
2020/926 (PDF ) Secure Computation over Lattices and Elliptic Curves Brett Hemenway Falk, Daniel Noble
2020/925 (PDF ) Wolverine: Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and Arithmetic Circuits Chenkai Weng, Kang Yang, Jonathan Katz, Xiao Wang
2020/924 (PDF ) Ferret: Fast Extension for coRRElated oT with small communication Kang Yang, Chenkai Weng, Xiao Lan, Jiang Zhang, Xiao Wang
2020/923 (PDF ) Another code-based adaptation of Lyubashevsky’s signature cryptanalysed Nicolas Aragon, Jean-Christophe Deneuville, Philippe Gaborit
2020/921 (PDF ) Practical Dynamic Group Signature with Efficient Concurrent Joins and Batch Verifications Hyoseung Kim, Youngkyung Lee, Michel Abdalla, Jong Hwan Park
2020/920 (PDF ) Further Cryptographic Properties of the Multiplicative Inverse Function Deng Tang, Bimal Mandal, Subhamoy Maitra
2020/919 (PDF ) Tight Bounds for Simon's Algorithm Xavier Bonnetain
2020/917 (PDF ) Formalizing Nakamoto-Style Proof of Stake Søren Eller Thomsen, Bas Spitters
2020/916 (PDF ) Black-Box Transformations from Passive to Covert Security with Public Verifiability Ivan Damgård, Claudio Orlandi, Mark Simkin
2020/915 (PDF ) Does Fiat-Shamir Require a Cryptographic Hash Function? Yilei Chen, Alex Lombardi, Fermi Ma, Willy Quach
2020/914 (PDF ) Ultra-Short Multivariate Public Key Signatures Jacques Patarin, Gilles Macario-Rat, Maxime Bros, Eliane Koussa
2020/913 (PDF ) Differential-ML Distinguisher: Machine Learning based Generic Extension for Differential Cryptanalysis Tarun Yadav, Manoj Kumar
2020/912 (PDF ) Magnifying Side-Channel Leakage of Lattice-Based Cryptosystems with Chosen Ciphertexts: The Case Study of Kyber Zhuang Xu, Owen Pemberton, Sujoy Sinha Roy, David Oswald, Wang Yao, Zhiming Zheng
2020/911 (PDF ) Lossy Correlation Intractability and PPAD Hardness from Sub-exponential LWE Ruta Jawale, Dakshita Khurana
2020/910 (PDF ) A Power Side-Channel Attack on the CCA2-Secure HQC KEM Thomas Schamberger, Julian Renner, Georg Sigl, Antonia Wachter-Zeh
2020/909 (PDF ) When is a test not a proof? Eleanor McMurtry, Olivier Pereira, Vanessa Teague
2020/908 (PDF ) Analysis on the MinRank Attack using Kipnis-Shamir Method Against Rainbow Shuhei Nakamura, Yacheng Wang, Yasuhiko Ikematsu
2020/907 (PDF ) Enhanced Flush+Reload Attack on AES Milad Seddigh, Hadi Soleimany
2020/906 (PDF ) Optimally-resilient Unconditionally-secure Asynchronous Multi-party Computation Revisited Ashish Choudhury
2020/905 (PDF ) Cryptanalysis of a Code-Based Signature Scheme Based on the Lyubashevsky Framework Marco Baldi, Karan Khathuria, Edoardo Persichetti, Paolo Santini
2020/904 (PDF ) A Comparison of Weight Initializers in Deep Learning-based Side-channel Analysis Huimin Li, Marina Krček, Guilherme Perin
2020/903 (PDF ) Optimizing Implementations of Linear Layers Zejun Xiang, Xiangyong Zeng, Da Lin, Zhenzhen Bao, Shasha Zhang
2020/902 (PDF ) Federated Learning in Side-Channel Analysis Huanyu Wang, Elena Dubrova
2020/901 (PDF ) A Not-So-Trival Replay Attack Against DH-PSI Hongrui Cui, Yu Yu
2020/900 (PDF ) Message-recovery Laser Fault Injection Attack on the Classic McEliece Cryptosystem Pierre-Louis Cayrel, Brice Colombier, Vlad-Florin Dragoi, Alexandre Menu, Lilian Bossuet
2020/899 (PDF ) On the Attack Evaluation and the Generalization Ability in Profiling Side-channel Analysis Lichao Wu, Léo Weissbart, Marina Krček, Huimin Li, Guilherme Perin, Lejla Batina, Stjepan Picek
2020/898 (PDF ) Rapidly Verifiable XMSS Signatures Joppe W. Bos, Andreas Hülsing, Joost Renes, Christine van Vredendaal
2020/897 (PDF ) Folding BIKE: Scalable Hardware Implementation for Reconfigurable Devices Jan Richter-Brockmann, Johannes Mono, Tim Güneysu
2020/896 (PDF ) Fault Injection as an Oscilloscope: Fault Correlation Analysis Albert Spruyt, Alyssa Milburn, Lukasz Chmielewski
2020/895 (PDF ) Multi-Currency Ledgers Joachim Zahnentferner
2020/894 (PDF ) Gossiping For Communication-Efficient Broadcast Georgios Tsimos, Julian Loss, Charalampos Papamanthou
2020/893 (PDF ) Toward an Asymmetric White-Box Proposal Lucas Barthelemy
2020/892 (PDF ) Divided We Stand, United We Fall: Security Analysis of Some SCA+SIFA Countermeasures Against SCA-Enhanced Fault Template Attacks Sayandeep Saha, Arnab Bag, Dirmanto Jap, Debdeep Mukhopadhyay, Shivam Bhasin
2020/891 (PDF ) Keep it Unsupervised: Horizontal Attacks Meet Deep Learning Guilherme Perin, Lukasz Chmielewski, Lejla Batina, Stjepan Picek
2020/890 (PDF ) Re-Consolidating First-Order Masking Schemes - Nullifying Fresh Randomness Aein Rezaei Shahmirzadi, Amir Moradi
2020/889 (PDF ) Affine Determinant Programs: A Framework for Obfuscation and Witness Encryption James Bartusek, Yuval Ishai, Aayush Jain, Fermi Ma, Amit Sahai, Mark Zhandry
2020/888 (PDF ) Machine Learning of Physical Unclonable Functions using Helper Data - Revealing a Pitfall in the Fuzzy Commitment Scheme Emanuele Strieder, Christoph Frisch, Michael Pehl
2020/887 (PDF ) Updatable Blockchains Michele Ciampi, Nikos Karayannidis, Aggelos Kiayias, Dionysis Zindros
2020/886 (PDF ) Adaptively Secure Revocable Hierarchical IBE from $k$-linear Assumption Keita Emura, Atsushi Takayasu, Yohei Watanabe
2020/885 (PDF ) Wendy, the Good Little Fairness Widget Klaus Kursawe
2020/884 (PDF ) Leakage-Resilient Inner-Product Functional Encryption in the Bounded-Retrieval Model Linru Zhang, Xiangning Wang, Yuechen Chen, Siu-Ming Yiu
2020/883 (PDF ) On The Deployment of Tweak-in-Plaintext Protection Against Differential Fault Analysis Jeroen Delvaux
2020/882 (PDF ) Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption Willy Susilo, Dung Hoang Duong, Huy Quoc Le, Josef Pieprzyk
2020/881 (PDF ) Deep Learning Side-Channel Analysis on Large-Scale Traces - A Case Study on a Polymorphic AES Loïc Masure, Nicolas Belleville, Eleonora Cagli, Marie-Angela Cornelie, Damien Couroussé, Cécile Dumas, Laurent Maingault
2020/880 (PDF ) Classical Reduction of Gap SVP to LWE: A Concrete Security Analysis Palash Sarkar, Subhadip Singha
2020/879 (PDF ) Second-Order Masked Lookup Table Compression Scheme Annapurna Valiveti, Srinivas Vivek
2020/878 (PDF ) Bent Boolean functions A better procedure to generate non-crypto 4-bit S-boxes Sankhanil De, Ranjan Ghosh
2020/877 (PDF ) Unclonable Decryption Keys Marios Georgiou, Mark Zhandry
2020/876 (PDF ) Direct Sum Masking as a Countermeasure to Side-Channel and Fault Injection Attacks Claude Carlet, Sylvain Guilley, Sihem Mesnager
2020/875 (PDF ) Efficient Final Exponentiation via Cyclotomic Structure for Pairings over Families of Elliptic Curves Daiki Hayashida, Kenichiro Hayasaka, Tadanori Teruya
2020/874 (PDF ) New Methods and Abstractions for RSA-Based Forward Secure Signatures Susan Hohenberger, Brent Waters
2020/873 (PDF ) Post-Quantum Group Key Agreement Scheme Julia Bobrysheva, Sergey Zapechnikov
2020/872 (PDF ) Ranking Loss: Maximizing the Success Rate in Deep Learning Side-Channel Analysis Gabriel Zaid, Lilian Bossuet, François Dassance, Amaury Habrard, Alexandre Venelli
2020/871 (PDF ) Quantum Immune One-Time Memories Qipeng Liu, Amit Sahai, Mark Zhandry
2020/870 (PDF ) Smoothing Out Binary Linear Codes and Worst-case Sub-exponential Hardness for LPN Yu Yu, Jiang Zhang
2020/869 (PDF ) An Algorithmic Reduction Theory for Binary Codes: LLL and more Thomas Debris-Alazard, Léo Ducas, Wessel P. J. van Woerden
2020/868 (PDF ) SoK: A Taxonomy of Cryptocurrency Wallets Kostis Karantias
2020/867 (PDF ) Enhancing the Performance of Practical Profiling Side-Channel Attacks Using Conditional Generative Adversarial Networks Ping Wang, Ping Chen, Zhimin Luo, Gaofeng Dong, Mengce Zheng, Nenghai Yu, Honggang Hu
2020/866 (PDF ) Development of The RISC-V Entropy Source Interface Markku-Juhani O. Saarinen, G. Richard Newell, Ben Marshall
2020/865 (PDF ) Agora: A Privacy-Aware Data Marketplace Vlasis Koutsos, Dimitrios Papadopoulos, Dimitris Chatzopoulos, Sasu Tarkoma, Pan Hui
2020/864 (PDF ) Linear Complexity Private Set Intersection for Secure Two-Party Protocols Ferhat Karakoç, Alptekin Küpçü
2020/863 (PDF ) Privacy-Preserving Automated Exposure Notification Ran Canetti, Yael Tauman Kalai, Anna Lysyanskaya, Ronald L. Rivest, Adi Shamir, Emily Shen, Ari Trachtenberg, Mayank Varia, Daniel J. Weitzner
2020/862 (PDF ) Protecting Cryptography Against Compelled Self-Incrimination Sarah Scheffler, Mayank Varia
2020/861 (PDF ) Faster Homomorphic Encryption over GPGPUs via hierarchical DGT Pedro Geraldo M. R. Alves, Jheyne N. Ortiz, Diego F. Aranha
2020/860 (PDF ) SNARGs for Bounded Depth Computations from Sub-Exponential LWE Yael Tauman Kalai, Rachel Zhang
2020/859 (PDF ) A Classification of Computational Assumptions in the Algebraic Group Model Balthazar Bauer, Georg Fuchsbauer, Julian Loss
2020/858 (PDF ) Client-oblivious OPRAM Gareth T. Davies, Christian Janson, Daniel P. Martin
2020/857 (PDF ) Where are you Bob? Privacy-Preserving Proximity Testing with a Napping Party Ivan Oleynikov, Elena Pagnin, Andrei Sabelfeld
2020/856 (PDF ) Improving Revocation for Group Signature with Redactable Signature Olivier Sanders
2020/855 (PDF ) Fooling primality tests on smartcards Vladimir Sedlacek, Jan Jancar, Petr Svenda
2020/854 (PDF ) Designing Reverse Firewalls for the Real World Angèle Bossuat, Xavier Bultel, Pierre-Alain Fouque, Cristina Onete, Thyla van der Merwe
2020/853 (PDF ) Linear-Complexity Private Function Evaluation is Practical Marco Holz, Ágnes Kiss, Deevashwer Rathee, Thomas Schneider
2020/852 (PDF ) FROST: Flexible Round-Optimized Schnorr Threshold Signatures Chelsea Komlo, Ian Goldberg
2020/851 (PDF ) Asynchronous Byzantine Agreement with Subquadratic Communication Erica Blum, Jonathan Katz, Chen-Da Liu-Zhang, Julian Loss
2020/850 (PDF ) On the Guaranteed Number of Activations in XS-circuits Sergey Agievich
2020/849 (PDF ) Surveying global verifiability Ben Smyth
2020/848 (PDF ) On Composability of Game-based Password Authenticated Key Exchange Marjan Škrobot, Jean Lancrenon
2020/847 (PDF ) Encrypt-to-self: Securely Outsourcing Storage Jeroen Pijnenburg, Bertram Poettering
2020/846 (PDF ) Deep Learning based Differential Distinguisher for Lightweight Cipher PRESENT Aayush Jain, Varun Kohli, Girish Mishra
2020/845 (PDF ) Post-Quantum Adaptor Signatures and Payment Channel Networks Muhammed F. Esgin, Oguzhan Ersoy, Zekeriya Erkin
2020/844 (PDF ) Generic Superlight Client for Permissionless Blockchains Yuan Lu, Qiang Tang, Guiling Wang
2020/843 (PDF ) Dragoon: Private Decentralized HITs Made Practical Yuan Lu, Qiang Tang, Guiling Wang
2020/842 (PDF ) Dumbo-MVBA: Optimal Multi-valued Validated Asynchronous Byzantine Agreement, Revisited Yuan Lu, Zhenliang Lu, Qiang Tang, Guiling Wang
2020/841 (PDF ) Dumbo: Faster Asynchronous BFT Protocols Bingyong Guo, Zhenliang Lu, Qiang Tang, Jing Xu, Zhenfeng Zhang
2020/840 (PDF ) Proof of Storage-Time: Efficiently Checking Continuous Data Availability Giuseppe Ateniese, Long Chen, Mohammad Etemad, Qiang Tang
2020/839 (PDF ) Cryptanalysis of a ``Strengthened'' Key Exchange Protocol for IoT, or When SAKE$^+$ Turns Out to Be SAKE$^-$ Loïc Ferreira
2020/838 (PDF ) PudgyTurtle: variable-length, keystream-dependent encoding to resist time-memory tradeoff attacks David A August, Anne C Smith
2020/837 (PDF ) An Attack on Some Signature Schemes Constructed From Five-Pass Identification Schemes Daniel Kales, Greg Zaverucha
2020/836 (PDF ) Assembly or Optimized C for Lightweight Cryptography on RISC-V? Fabio Campos, Lars Jellema, Mauk Lemmen, Lars Müller, Amber Sprenkels, Benoit Viguier
2020/835 (PDF ) On the Maximum Nonlinearity of De Bruijn Sequence Feedback Function Congwei Zhou, Bin Hu, Jie Guan
2020/834 (PDF ) Minimax Approximation of Sign Function by Composite Polynomial for Homomorphic Comparison Eunsang Lee, Joon-Woo Lee, Jong-Seon No, Young-Sik Kim
2020/833 (PDF ) Secure Update of FPGA-based Secure Elements using Partial Reconfiguration Florian Unterstein, Tolga Sel, Thomas Zeschg, Nisha Jacob, Michael Tempelmeier, Michael Pehl, Fabrizio De Santis
2020/832 (PDF ) Round-optimal Black-box Commit-and-prove with Succinct Communication Susumu Kiyoshima
2020/831 (PDF ) On Adaptive Security of Delayed-Input Sigma Protocols and Fiat-Shamir NIZKs Michele Ciampi, Roberto Parisella, Daniele Venturi
2020/830 (PDF ) Terakey - An Encryption Method Whose Security Can Be Analyzed from First Principles Arnold G. Reinhold
2020/829 (PDF ) Refined Analysis of the Asymptotic Complexity of the Number Field Sieve Aude Le Gluher, Pierre-Jean Spaenlehauer, Emmanuel Thomé
2020/827 (PDF ) Encrypted Blockchain Databases Daniel Adkins, Archita Agarwal, Seny Kamara, Tarik Moataz
2020/826 (PDF ) A Concise Bounded Anonymous Broadcast Yielding Combinatorial Trace-and-Revoke Schemes Xuan Thanh Do, Duong Hieu Phan, Moti Yung
2020/824 (PDF ) Forward-Secure 0-RTT Goes Live: Implementation and Performance Analysis in QUIC Fynn Dallmeier, Jan P. Drees, Kai Gellert, Tobias Handirk, Tibor Jager, Jonas Klauke, Simon Nachtigall, Timo Renzelmann, Rudi Wolf
2020/823 (PDF ) The Provable Security of Ed25519: Theory and Practice Jacqueline Brendel, Cas Cremers, Dennis Jackson, Mang Zhao
2020/822 (PDF ) Efficient Multi-Client Functional Encryption for Conjunctive Equality and Range Queries Kwangsu Lee
2020/821 (PDF ) Interconnect-Aware Bitstream Modification Michail Moraitis, Elena Dubrova
2020/820 (PDF ) On the security of the Rescue hash function Tim Beyne, Anne Canteaut, Gregor Leander, María Naya-Plasencia, Léo Perrin, Friedrich Wiemer
2020/819 (PDF ) UC-Secure OT from LWE, Revisited Willy Quach
2020/818 (PDF ) Security Limitations of Classical-Client Delegated Quantum Computing Christian Badertscher, Alexandru Cojocaru, Léo Colisson, Elham Kashefi, Dominik Leichtle, Atul Mantri, Petros Wallden
2020/817 (PDF ) Anonymous, Attribute Based, Decentralized, Secure, and Fair e-Donation Osman Biçer, Alptekin Küpçü
2020/816 (PDF ) Dispelling Myths on Superposition Attacks: Formal Security Model and Attack Analyses Luka Music, Céline Chevalier, Elham Kashefi
2020/815 (PDF ) Cryptographic Divergences: New Techniques and New Applications Marc Abboud, Thomas Prest
2020/814 (PDF ) Incompressible Encodings Tal Moran, Daniel Wichs
2020/813 (PDF ) Strengthening Sequential Side-Channel Attacks Through Change Detection Luca Frittoli, Matteo Bocchi, Silvia Mella, Diego Carrera, Beatrice Rossi, Pasqualina Fragneto, Ruggero Susella, Giacomo Boracchi
2020/812 (PDF ) Generically Speeding-Up Repeated Squaring is Equivalent to Factoring: Sharp Thresholds for All Generic-Ring Delay Functions Lior Rotem, Gil Segev
2020/811 (PDF ) Another Look at Extraction and Randomization of Groth's zk-SNARK Karim Baghery, Markulf Kohlweiss, Janno Siim, Mikhail Volkhov
2020/809 (PDF ) On (expected polynomial) runtime in cryptography Michael Klooß
2020/808 (PDF ) Security Analysis of Olvid's SAS-based Trust Establishment Protocol Michel Abdalla
2020/807 (PDF ) Secure merge with $O(n \log \log n)$ secure operation Brett Hemenway Falk, Rafail Ostrovsky
2020/806 (PDF ) Toward Comparable Homomorphic Encryption for Crowd-sensing Network Daxin Huang, Qingqing Gan, Xiaoming Wang, Chengpeng Huang, Yijian Lin
2020/805 (PDF ) Proxy Re-Encryption for Accelerator Confidentiality in FPGA-Accelerated Cloud Furkan Turan, Ingrid Verbauwhede
2020/804 (PDF ) Lightweight Ciphers on a 65 nm ASIC - A Comparative Study on Energy Consumption Bastian Richter, Amir Moradi
2020/803 (PDF ) Lattice-based Fault Attacks on Deterministic Signature Schemes of ECDSA and EdDSA Weiqiong Cao, Hongsong Shi, Hua Chen, Jiazhe Chen, Limin Fan, Wenling Wu
2020/802 (PDF ) Quantum Attacks on HCTR and its Variants Mostafizar Rahman, Goutam Paul
2020/801 (PDF ) Not enough LESS: An improved algorithm for solving Code Equivalence Problems over $\mathbb{F}_q$ Ward Beullens
2020/800 (PDF ) Reimagining Secret Sharing: Creating a Safer and More Versatile Primitive by Adding Authenticity, Correcting Errors, and Reducing Randomness Requirements Mihir Bellare, Wei Dai, Phillip Rogaway
2020/799 (PDF ) Secure Generalized Deduplication via Multi-Key Revealing Encryption Daniel E. Lucani, Lars Nielsen, Claudio Orlandi, Elena Pagnin, Rasmus Vestergaard
2020/798 (PDF ) Superposition Attack on OT Protocols Ehsan Ebrahimi, Céline Chevalier, Marc Kaplan, Michele Minelli
2020/797 (PDF ) Fast, Small, and Area-Time Efficient Architectures for Key-Exchange on Curve25519 Mojtaba Bisheh Niasar, Rami El Khatib, Reza Azarderakhsh, Mehran Mozaffari-Kermani
2020/796 (PDF ) A Generalization of Paillier's Public-Key System With Fast Decryption Ying Guo, Zhenfu Cao, Xiaolei Dong
2020/795 (PDF ) Implementation and Benchmarking of Round 2 Candidates in the NIST Post-Quantum Cryptography Standardization Process Using Hardware and Software/Hardware Co-design Approaches Viet Ba Dang, Farnoud Farahmand, Michal Andrzejczak, Kamyar Mohajerani, Duc Tri Nguyen, Kris Gaj
2020/794 (PDF ) Symbolic and Computational Reasoning About Cryptographic Modes of Operation Catherine Meadows
2020/793 (PDF ) PHyCT : Privacy preserving Hybrid Contact Tracing Mahabir Prasad Jhanwar, Sumanta Sarkar
2020/792 (PDF ) Trace-$\Sigma$: a privacy-preserving contact tracing app Jean-François Biasse, Sriram Chellappan, Sherzod Kariev, Noyem Khan, Lynette Menezes, Efe Seyitoglu, Charurut Somboonwit, Attila Yavuz
2020/791 (PDF ) Virtual ASICs: Generalized Proof-of-Stake Mining in Cryptocurrencies Chaya Ganesh, Claudio Orlandi, Daniel Tschudi, Aviv Zohar
2020/790 (PDF ) Anonymity and Rewards in Peer Rating Systems Lydia Garms, Siaw-Lynn Ng, Elizabeth A. Quaglia, Giulia Traverso
2020/789 (PDF ) Double-Authentication-Preventing Signatures in the Standard Model Dario Catalano, Georg Fuchsbauer, Azam Soleimanian
2020/788 (PDF ) Multi-Client Inner-Product Functional Encryption in the Random-Oracle Model Michel Abdalla, Florian Bourse, Hugo Marival, David Pointcheval, Azam Soleimanian, Hendrik Waldner
2020/787 (PDF ) A Note on Separating Classical and Quantum Random Oracles Takashi Yamakawa, Mark Zhandry
2020/786 (PDF ) Random Probing Security: Verification, Composition, Expansion and New Constructions Sonia Belaïd, Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain, Abdul Rahman Taleb
2020/785 (PDF ) The Memory-Tightness of Authenticated Encryption Ashrujit Ghoshal, Joseph Jaeger, Stefano Tessaro
2020/784 (PDF ) CRAFT: Composable Randomness Beacons and Output-Independent Abort MPC From Time Carsten Baum, Bernardo David, Rafael Dowsley, Ravi Kishore, Jesper Buus Nielsen, Sabine Oechsner
2020/783 (PDF ) Adventures in Crypto Dark Matter: Attacks, Fixes for Weak Pseudorandom Functions Jung Hee Cheon, Wonhee Cho, Jeong Han Kim, Jiseung Kim
2020/782 (PDF ) A Love Affair Between Bias Amplifiers and Broken Noise Sources George Teseleanu
2020/781 (PDF ) Interpolation Attacks on Round-Reduced Elephant, Kravatte and Xoofff Haibo Zhou, Rui Zong, Xiaoyang Dong, Keting Jia, Willi Meier
2020/780 (PDF ) The Long and Winding Path to Secure Implementation of GlobalPlatform SCP10 Daniel De Almeida Braga, Pierre-Alain Fouque, Mohamed Sabt
2020/779 (PDF ) Non-Malleable Time-Lock Puzzles and Applications Cody Freitag, Ilan Komargodski, Rafael Pass, Naomi Sirkin
2020/778 (PDF ) SAKE+: Strengthened Symmetric-Key Authenticated Key Exchange with Perfect Forward Secrecy for IoT Seyed Farhad Aghili, Amirhossein Adavoudi Jolfaei, Aysajan Abidin
2020/777 (PDF ) Dynamic Universal Accumulator with Batch Update over Bilinear Groups Giuseppe Vitto, Alex Biryukov
2020/776 (PDF ) Non-Malleable Codes for Bounded Polynomial-Depth Tampering Dana Dachman-Soled, Ilan Komargodski, Rafael Pass
2020/775 (PDF ) Improved Differential-Linear Attacks with Applications to ARX Ciphers Christof Beierle, Gregor Leander, Yosuke Todo
2020/774 (PDF ) Timelocked Bribing Majid Khabbazian, Tejaswi Nadahalli, Roger Wattenhofer
2020/773 (PDF ) An Instruction Set Extension to Support Software-Based Masking Si Gao, Johann Großschädl, Ben Marshall, Dan Page, Thinh Pham, Francesco Regazzoni
2020/772 (PDF ) Fiat-Shamir for Repeated Squaring with Applications to PPAD-Hardness and VDFs Alex Lombardi, Vinod Vaikuntanathan
2020/771 (PDF ) Leakage-Resilient Key Exchange and Two-Seed Extractors Xin Li, Fermi Ma, Willy Quach, Daniel Wichs
2020/770 (PDF ) Time-Space Tradeoffs and Short Collisions in Merkle-Damgård Hash Functions Akshima, David Cash, Andrew Drucker, Hoeteck Wee
2020/769 (PDF ) Lattice-Based Blind Signatures, Revisited Eduard Hauck, Eike Kiltz, Julian Loss, Ngoc Khanh Nguyen
2020/768 (PDF ) Perfect Zero Knowledge: New Upperbounds and Relativized Separations Peter Dixon, Sutanu Gayen, A. Pavan, N. V. Vinodchandran
2020/767 (PDF ) Efficient Constant-Round MPC with Identifiable Abort and Public Verifiability Carsten Baum, Emmanuela Orsini, Peter Scholl, Eduardo Soria-Vazquez
2020/766 (PDF ) The uncertainty of Side-Channel Analysis: A way to leverage from heuristics Unai Rioja, Servio Paguada, Lejla Batina, Igor Armendariz
2020/765 (PDF ) Handling Adaptive Compromise for Practical Encryption Schemes Joseph Jaeger, Nirvan Tyagi
2020/764 (PDF ) Indistinguishability Obfuscation from Simple-to-State Hard Problems: New Assumptions, New Techniques, and Simplification Romain Gay, Aayush Jain, Huijia Lin, Amit Sahai
2020/763 (PDF ) Practical Quantum-Safe Stateful Hybrid Key Exchange Protocol Jia Xu, Yiwen Gao, Hoonwei Lim
2020/762 (PDF ) Functional Encryption for Attribute-Weighted Sums from $k$-Lin Michel Abdalla, Junqing Gong, Hoeteck Wee
2020/761 (PDF ) Decentralized reputation Tassos Dimitriou
2020/760 (PDF ) Curves with fast computations in the first pairing group Rémi Clarisse, Sylvain Duquesne, Olivier Sanders
2020/759 (PDF ) Chosen Ciphertext Security from Injective Trapdoor Functions Susan Hohenberger, Venkata Koppula, Brent Waters
2020/758 (PDF ) Verifiable state machines: Proofs that untrusted services operate correctly Srinath Setty, Sebastian Angel, Jonathan Lee
2020/757 (PDF ) Understanding Methodology for Efficient CNN Architectures in Profiling Attacks Gabriel Zaid, Lilian Bossuet, Amaury Habrard, Alexandre Venelli
2020/756 (PDF ) Provable Security Analysis of FIDO2 Manuel Barbosa, Alexandra Boldyreva, Shan Chen, Bogdan Warinschi
2020/755 (PDF ) Time-release Cryptography from Minimal Circuit Assumptions Samuel Jaques, Hart Montgomery, Arnab Roy
2020/754 (PDF ) Fluid MPC: Secure Multiparty Computation with Dynamic Participants Arka Rai Choudhuri, Aarushi Goel, Matthew Green, Abhishek Jain, Gabriel Kaptchuk
2020/753 (PDF ) Compressing Proofs of $k$-Out-Of-$n$ Partial Knowledge Thomas Attema, Ronald Cramer, Serge Fehr
2020/752 (PDF ) Continuous Group Key Agreement with Active Security Joël Alwen, Sandro Coretti, Daniel Jost, Marta Mularczyk
2020/751 (PDF ) DANA - Universal Dataflow Analysis for Gate-Level Netlist Reverse Engineering Nils Albartus, Max Hoffmann, Sebastian Temme, Leonid Azriel, Christof Paar
2020/750 (PDF ) Doppelganger Obfuscation - Exploring the Defensive and Offensive Aspects of Hardware Camouflaging Max Hoffmann, Christof Paar
2020/749 (PDF ) Insecurity of the Public Key Encryption with Filtered Equality Test Proposed by Huang et al. Hyung Tae Lee, San Ling, Jae Hong Seo, Huaxiong Wang
2020/748 (PDF ) Anonymous probabilistic payment in payment hub Tatsuo Mitani, Akira Otsuka
2020/747 (PDF ) Communication-Efficient (Proactive) Secure Computation for Dynamic General Adversary Structures and Dynamic Groups Karim Eldefrawy, Seoyeon Hwang, Rafail Ostrovsky, Moti Yung
2020/746 (PDF ) Comparison of RISC-V and transport triggered architectures for a post-quantum cryptography application Latif AKÇAY, Berna ÖRS
2020/745 (PDF ) True Random Number Generation Based on DNA molecule Genetic Information (DNA-TRNG) Siddaramappa V, Ramesh K B
2020/744 (PDF ) Internal Symmetries and Linear Properties: Full-permutation Distinguishers and Improved Collisions on Gimli Antonio Flórez Gutiérrez, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, André Schrottenloher, Ferdinand Sibleyras
2020/743 (PDF ) A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM Qian Guo, Thomas Johansson, Alexander Nilsson
2020/742 (PDF ) Improved Side-Channel Resistance by Dynamic Fault-Injection Countermeasures Jan Richter-Brockmann, Tim Güneysu
2020/741 (PDF ) Fast Privacy-Preserving Punch Cards Saba Eskandarian
2020/740 (PDF ) Always Have a Backup Plan: Fully Secure Synchronous MPC with Asynchronous Fallback Erica Blum, Chen-Da Liu-Zhang, Julian Loss
2020/739 (PDF ) Versatile and Sustainable Timed-Release Encryption and Sequential Time-Lock Puzzles Peter Chvojka, Tibor Jager, Daniel Slamanig, Christoph Striecks
2020/738 (PDF ) GIFT-COFB Subhadeep Banik, Avik Chakraborti, Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi, Thomas Peyrin, Yu Sasaki, Siang Meng Sim, Yosuke Todo
2020/737 (PDF ) A non-PCP Approach to Succinct Quantum-Safe Zero-Knowledge Jonathan Bootle, Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler
2020/736 (PDF ) Combining Forward-Security and Leakage-Resilience, Revisited Suvradip Chakraborty, Harish Karthikeyan, Adam O'Neill, C. Pandu Rangan
2020/735 (PDF ) Bulletproofs+: Shorter Proofs for Privacy-Enhanced Distributed Ledger Heewon Chung, Kyoohyung Han, Chanyang Ju, Myungsun Kim, Jae Hong Seo
2020/734 (PDF ) Mirror Theory: A simple proof of the Pi+Pj Theorem with xi_max=2 Benoît Cogliati, Jacques Patarin
2020/733 (PDF ) A Side-Channel Resistant Implementation of SABER Michiel Van Beirendonck, Jan-Pieter D'Anvers, Angshuman Karmakar, Josep Balasch, Ingrid Verbauwhede
2020/732 (PDF ) Security of Multi-Adjustable Join Schemes: Separations and Implications Mojtaba Rafiee, Shahram Khazaei
2020/731 (PDF ) The Exact Security of PMAC with Three Powering-Up Masks Yusuke Naito
2020/730 (PDF ) On the Security of Time-Lock Puzzles and Timed Commitments Jonathan Katz, Julian Loss, Jiayu Xu
2020/729 (PDF ) Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF Melissa Chase, Peihan Miao
2020/728 (PDF ) Minerva: The curse of ECDSA nonces Jan Jancar, Vladimir Sedlacek, Petr Svenda, Marek Sys
2020/727 (PDF ) An Easy-to-Use Tool for Rotational-XOR Cryptanalysis of ARX Block Ciphers Adrian Ranea, Yunwen Liu, Tomer Ashur
2020/726 (PDF ) On the Tight Security of TLS 1.3: Theoretically-Sound Cryptographic Parameters for Real-World Deployments Denis Diemert, Tibor Jager
2020/725 (PDF ) Non-Malleable Secret Sharing against Bounded Joint-Tampering Attacks in the Plain Model Gianluca Brian, Antonio Faonio, Maciej Obremski, Mark Simkin, Daniele Venturi
2020/724 (PDF ) Multi-Party Revocation in Sovrin: Performance through Distributed Trust Lukas Helminger, Daniel Kales, Sebastian Ramacher, Roman Walch
2020/723 (PDF ) On the Confidentiality of Amounts in Grin Suyash Bagad, Saravanan Vijayakumaran
2020/722 (PDF ) NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities Yehuda Afek, Anat Bremler-Barr, Lior Shafir
2020/721 (PDF ) MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference Fabian Boemer, Rosario Cammarota, Daniel Demmler, Thomas Schneider, Hossein Yalame
2020/720 (PDF ) Fast algebraic immunity of Boolean functions and LCD codes Sihem Mesnager, Chunming Tang
2020/719 (PDF ) Hypercube and Cascading-based Algorithms for Secret Sharing Schemes Shion Samadder Chaudhury, Sabyasachi Dutta, Kouichi Sakurai
2020/718 (PDF ) Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3 Marc Fischlin, Felix Günther, Christian Janson
2020/717 (PDF ) Fault Location Identification By Machine Learning Anubhab Baksi, Santanu Sarkar, Akhilesh Siddhanti, Ravi Anand, Anupam Chattopadhyay
2020/716 (PDF ) Signal Injection Attack on Time-to-Digital Converter and Its Application to Physically Unclonable Function Takeshi Sugawara, Tatsuya Onuma, Yang Li
2020/715 (PDF ) On (impracticality of) transfinite symmetric encryption with keys smaller than messages under GCH Sergij V. Goncharov
2020/714 (PDF ) One-One Constrained Pseudorandom Functions Naty Peter, Rotem Tsabary, Hoeteck Wee
2020/713 (PDF ) A Generic Construction of Predicate Proxy Key Re-encapsulation Mechanism Yi-Fan Tseng, Zi-Yuan Liu, Raylin Tso
2020/712 (PDF ) Anonymous IBE From Quadratic Residuosity With Fast Encryption Xiaopeng Zhao, Zhenfu Cao, Xiaolei Dong, Jinwen Zheng
2020/711 (PDF ) Crowd Verifiable Zero-Knowledge and End-to-end Verifiable Multiparty Computation Foteini Baldimtsi, Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang
2020/710 (PDF ) Rational Behavior in Committee-Based Blockchains Yackolley Amoussou-Guenou, Bruno Biais, Maria Potop-Butucaru, Sara Tucci-Piergiovanni
2020/709 (PDF ) Reputable List Curation from Decentralized Voting Elizabeth C. Crites, Mary Maller, Sarah Meiklejohn, Rebekah Mercer
2020/708 (PDF ) Lamphone: Real-Time Passive Sound Recovery from Light Bulb Vibrations Ben Nassi, Yaron Pirutin, Adi Shamir, Yuval Elovici, Boris Zadov
2020/707 (PDF ) Faster Enumeration-based Lattice Reduction: Root Hermite Factor k^(1/(2k)) in Time k^(k/8 + o(k)) Martin R. Albrecht, Shi Bai, Pierre-Alain Fouque, Paul Kirchner, Damien Stehlé, Weiqiang Wen
2020/706 (PDF ) A Logic Synthesis Toolbox for Reducing the Multiplicative Complexity in Logic Networks Eleonora Testa, Mathias Soeken, Heinz Riener, Luca Amaru, Giovanni De Micheli
2020/705 (PDF ) On the minimal value set size of APN functions Ingo Czerwinski
2020/704 (PDF ) Secure Single-Server Aggregation with (Poly)Logarithmic Overhead James Bell, K. A. Bonawitz, Adrià Gascón, Tancrède Lepoint, Mariana Raykova
2020/703 (PDF ) New Complexity Estimation on the Rainbow-Band-Separation Attack Shuhei Nakamura, Yasuhiko Ikematsu, Yacheng Wang, Jintai Ding, Tsuyoshi Takagi
2020/702 (PDF ) Rainbow Band Separation is Better than we Thought Ray Perlner, Daniel Smith-Tone
2020/701 (PDF ) MPC with Friends and Foes Bar Alon, Eran Omri, Anat Paskin-Cherniavsky
2020/700 (PDF ) Personal data exchange protocol: X Vladimir Belsky, Ilia Gerasimov, Kirill Tsaregorodtsev, Ivan Chizhov
2020/699 (PDF ) Looking at the NIST Lightweight Candidates from a Masking Point-of-View Lauren De Meyer
2020/697 (PDF ) Comparing the difficulty of factorization and discrete logarithm: a 240-digit experiment F. Boudot, P. Gaudry, A. Guillevic, N. Heninger, E. Thomé, P. Zimmermann
2020/696 (PDF ) An Efficient CRT-based Bit-parallel Multiplier for Special Pentanomials Yin Li, Yu Zhang
2020/695 (PDF ) Collusion Resistant Watermarkable PRFs from Standard Assumptions Rupeng Yang, Man Ho Au, Zuoxia Yu, Qiuliang Xu
2020/694 (PDF ) The nearest-colattice algorithm Thomas Espitau, Paul Kirchner
2020/693 (PDF ) Tight Quantum Time-Space Tradeoffs for Function Inversion Kai-Min Chung, Siyao Guo, Qipeng Liu, Luowen Qian
2020/692 (PDF ) Optimizing Inner Product Masking Scheme by A Coding Theory Approach Wei Cheng, Sylvain Guilley, Claude Carlet, Sihem Mesnager, Jean-Luc Danger
2020/691 (PDF ) Improved Threshold Signatures, Proactive Secret Sharing, and Input Certification from LSS Isomorphisms Diego Aranha, Anders Dalskov, Daniel Escudero, Claudio Orlandi
2020/690 (PDF ) SAFE: A Secure and Efficient Long-Term Distributed Storage System Johannes Buchmann, Ghada Dessouky, Tommaso Frassetto, Ágnes Kiss, Ahmad-Reza Sadeghi, Thomas Schneider, Giulia Traverso, Shaza Zeitouni
2020/689 (PDF ) Single Tweakey Cryptanalysis of Reduced-Round SKINNY-64 Orr Dunkelman, Senyang Huang, Eran Lambooij, Stav Perle
2020/688 (PDF ) Lin2-Xor Lemma and Log-size Linkable Threshold Ring Signature Anton A. Sokolov
2020/687 (PDF ) Lower Bounds on the Time/Memory Tradeoff of Function Inversion Dror Chawin, Iftach Haitner, Noam Mazor
2020/686 (PDF ) A Level Dependent Authentication for IoT Paradigm Chintan Patel, Nishant Doshi
2020/685 (PDF ) Fast Vector Oblivious Linear Evaluation from Ring Learning with Errors Leo de Castro, Chiraag Juvekar, Vinod Vaikuntanathan
2020/684 (PDF ) How to (legally) keep secrets from mobile operators Ghada Arfaoui, Olivier Blazy, Xavier Bultel, Pierre-Alain Fouque, Thibaut Jacques, Adina Nedelcu, Cristina Onete
2020/683 (PDF ) Logarithmic-Size (Linkable) Threshold Ring Signatures in the Plain Model Abida Haque, Stephan Krenn, Daniel Slamanig, Christoph Striecks
2020/682 (PDF ) Succinct Diophantine-Satisfiability Arguments Patrick Towa, Damien Vergnaud
2020/681 (PDF ) An F-algebra for analysing information leaks in the presence of glitches Vittorio Zaccaria
2020/680 (PDF ) On the Design of Bit Permutation Based Ciphers - The Interplay Among S-box, Bit Permutation and Key-addition Sumanta Sarkar, Yu Sasaki, Siang Meng Sim
2020/679 (PDF ) BETA: Biometric Enabled Threshold Authentication Shashank Agrawal, Saikrishna Badrinarayanan, Payman Mohassel, Pratyay Mukherjee, Sikhar Patranabis
2020/678 (PDF ) Stronger Notions and a More Efficient Construction of Threshold Ring Signatures Alexander Munch-Hansen, Claudio Orlandi, Sophia Yakoubov
2020/677 (PDF ) Blockchain with Varying Number of Players T-H. Hubert Chan, Naomi Ephraim, Antonio Marcedone, Andrew Morgan, Rafael Pass, Elaine Shi
2020/676 (PDF ) An airdrop that preserves recipient privacy Riad S. Wahby, Dan Boneh, Christopher Jeffrey, Joseph Poon
2020/675 (PDF ) Ledger Combiners for Fast Settlement Matthias Fitzi, Peter Gazi, Aggelos Kiayias, Alexander Russell
2020/674 (PDF ) Coercion-Resistant Blockchain-Based E-Voting Protocol Chiara Spadafora, Riccardo Longo, Massimiliano Sala
2020/673 (PDF ) LotMint: Blockchain Returning to Decentralization with Decentralized Clock Wenbo MAO, Wenxiang WANG
2020/672 (PDF ) A Survey of Automatic Contact Tracing Approaches Using Bluetooth Low Energy Leonie Reichert, Samuel Brack, Björn Scheuermann
2020/671 (PDF ) Persistent Fault Analysis With Few Encryptions Sebastien Carre, Sylvain Guilley, Olivier Rioul
2020/670 (PDF ) Inverse-Sybil Attacks in Automated Contact Tracing Benedikt Auerbach, Suvradip Chakraborty, Karen Klein, Guillermo Pascual-Perez, Krzysztof Pietrzak, Michael Walter, Michelle Yeo
2020/669 (PDF ) Proof of Mirror Theory for $\xi_{\max}=2$ Avijit Dutta, Mridul Nandi, Abishanka Saha
2020/668 (PDF ) On Subversion-Resistant SNARKs Behzad Abdolmaleki, Helger Lipmaa, Janno Siim, Michał Zając
2020/667 (PDF ) New Results on the SymSum Distinguisher on Round-Reduced SHA3 Sahiba Suryawanshi, Dhiman Saha, Satyam Sachan
2020/666 (PDF ) Revisiting the Hardness of Binary Error LWE Chao Sun, Mehdi Tibouchi, Masayuki Abe
2020/665 (PDF ) Montgomery-friendly primes and applications to cryptography Jean Claude Bajard, Sylvain Duquesne
2020/664 (PDF ) The Share Size of Secret-Sharing Schemes for Almost All Access Structures and Graphs Amos Beimel, Oriol Farràs
2020/663 (PDF ) Super-Linear Time-Memory Trade-Offs for Symmetric Encryption Wei Dai, Stefano Tessaro, Xihu Zhang
2020/662 (PDF ) Multi-Party Computation Mechanism for Anonymous Equity Block Trading: A Secure Implementation of Turquoise Plato Uncross John Cartlidge, Nigel P. Smart, Younes Talibi Alaoui
2020/661 (PDF ) Tight Consistency Bounds for Bitcoin Peter Gaži, Aggelos Kiayias, Alexander Russell
2020/660 (PDF ) Efficient Software Implementation of the SIKE Protocol Using a New Data Representation Jing Tian, Piaoyang Wang, Zhe Liu, Jun Lin, Zhongfeng Wang, Johann Großschädl
2020/659 (PDF ) Software Evaluation of Grain-128AEAD for Embedded Platforms Alexander Maximov, Martin Hell
2020/658 (PDF ) Time-Specific Signatures Masahito Ishizaka, Shinsaku Kiyomoto
2020/657 (PDF ) Traceable Constant-Size Multi-Authority Credentials Chloé Hébant, David Pointcheval
2020/656 (PDF ) On Length Independent Security Bounds for the PMAC Family Bishwajit Chakraborty, Soumya Chattopadhyay, Ashwin Jha, Mridul Nandi
2020/655 (PDF ) Push For More: On Comparison of Data Augmentation and SMOTE With Optimised Deep Learning Architecture For Side-Channel Yoo-Seung Won, Dirmanto Jap, Shivam Bhasin
2020/654 (PDF ) Proximity Gaps for Reed-Solomon Codes Eli Ben-Sasson, Dan Carmon, Yuval Ishai, Swastik Kopparty, Shubhangi Saraf
2020/653 (PDF ) MemPoline: Mitigating Memory-based Side-Channel Attacks through Memory Access Obfuscation Zhen Hang Jiang, Yunsi Fei, Aidong Adam Ding, Thomas Wahl
2020/652 (PDF ) Somewhere Statistically Binding Commitment Schemes with Applications Prastudy Fauzi, Helger Lipmaa, Zaira Pindado, Janno Siim
2020/651 (PDF ) Cryptanalysis of ``FS-PEKS: Lattice-based Forward Secure Public-key Encryption with Keyword Search for Cloud-assisted Industrial Internet of Things'' Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso
2020/650 (PDF ) End-to-End Verifiable E-Voting Trial for Polling Station Voting Feng Hao, Shen Wang, Samiran Bag, Rob Procter, Siamak Shahandashti, Maryam Mehrnezhad, Ehsan Toreini, Roberto Metere, Lana Liu
2020/649 (PDF ) NIZK from SNARG Fuyuki Kitagawa, Takahiro Matsuda, Takashi Yamakawa
2020/648 (PDF ) Ghostor: Toward a Secure Data-Sharing System from Decentralized Trust Yuncong Hu, Sam Kumar, Raluca Ada Popa
2020/647 (PDF ) A simple generic construction to build oblivious transfer protocols from homomorphic encryption schemes Saeid Esmaeilzade, Ziba Eslami, Nasrollah Pakniat
2020/646 (PDF ) Calamari and Falafl: Logarithmic (Linkable) Ring Signatures from Isogenies and Lattices Ward Beullens, Shuichi Katsumata, Federico Pintore
2020/645 (PDF ) Correlation distribution analysis of a two-round key-alternating block cipher Liliya Kraleva, Nikolai L. Manev, Vincent Rijmen
2020/644 (PDF ) ALBATROSS: publicly AttestabLe BATched Randomness based On Secret Sharing Ignacio Cascudo, Bernardo David
2020/643 (PDF ) About Blockchain Interoperability Pascal Lafourcade, Marius Lombard-Platet
2020/642 (PDF ) The Ritva Blockchain: Enabling Confidential Transactions at Scale Henri Aare, Peter Vitols
2020/641 (PDF ) Overview of Polkadot and its Design Considerations Jeff Burdges, Alfonso Cevallos, Peter Czaban, Rob Habermeier, Syed Hosseini, Fabio Lama, Handan Kilinc Alper, Ximin Luo, Fatemeh Shirazi, Alistair Stewart, Gavin Wood
2020/640 (PDF ) Grover on SPECK: Quantum Resource Estimates Kyungbae Jang, Seungjoo Choi, Hyeokdong Kwon, Hwajeong Seo
2020/639 (PDF ) Constructions for Quantum Indistinguishability Obfuscation Anne Broadbent, Raza Ali Kazmi
2020/638 (PDF ) Delay Encryption Jeffrey Burdges, Luca De Feo
2020/636 (PDF ) Mixed-Technique Multi-Party Computations Composed of Two-Party Computations Erik-Oliver Blass, Florian Kerschbaum
2020/635 (PDF ) Two-Round Oblivious Linear Evaluation from Learning with Errors Pedro Branco, Nico Döttling, Paulo Mateus
2020/634 (PDF ) SILVER - Statistical Independence and Leakage Verification David Knichel, Pascal Sasdrich, Amir Moradi
2020/633 (PDF ) Improved torsion-point attacks on SIDH variants Victoria de Quehen, Péter Kutas, Chris Leonardi, Chloe Martindale, Lorenz Panny, Christophe Petit, Katherine E. Stange
2020/632 (PDF ) Proposing an MILP-based Method for the Experimental Verification of Difference Trails Sadegh Sadeghi, Vincent Rijmen, Nasour Bagheri
2020/631 (PDF ) Simultaneous Diagonalization of Incomplete Matrices and Applications Jean-Sébastien Coron, Luca Notarnicola, Gabor Wiese
2020/630 (PDF ) ContactChaser: A Simple yet Effective Contact Tracing Scheme with Strong Privacy Zhiguo Wan, Xiaotong Liu
2020/629 (PDF ) Dual-Mode NIZKs: Possibility and Impossibility Results for Property Transfer Vivek Arte, Mihir Bellare
2020/628 (PDF ) A post-quantum key exchange protocol from the intersection of quadric surfaces Daniele Di Tullio, Manoj Gyawali
2020/627 (PDF ) Attacking Zcash For Fun And Profit Duke Leto, The Hush Developers
2020/626 (PDF ) Game theoretical framework for analyzing Blockchains Robustness Paolo Zappalà, Marianna Belotti, Maria Potop-Butucaru, Stefano Secci
2020/625 (PDF ) Probability theory and public-key cryptography Mariya Bessonov, Dima Grigoriev, Vladimir Shpilrain
2020/624 (PDF ) RSA for poor men: a cryptosystem based on probable primes to base 2 numbers Marek Wójtowicz
2020/623 (PDF ) PSI-Stats: Private Set Intersection Protocols Supporting Secure Statistical Functions Jason H. M. Ying, Shuwei Cao, Geong Sen Poh, Jia Xu, Hoon Wei Lim
2020/622 (PDF ) The Direction of Updatable Encryption does not Matter Much Yao Jiang
2020/621 (PDF ) How to Base Security on the Perfect/Statistical Binding Property of Quantum Bit Commitment? Junbin Fang, Dominique Unruh, Jun Yan, Dehua Zhou
2020/620 (PDF ) Private Identity Agreement for Private Set Functionalities Ben Kreuter, Sarvar Patel, Ben Terner
2020/619 (PDF ) Security Analysis of NIST CTR-DRBG Viet Tung Hoang, Yaobin Shen
2020/618 (PDF ) Broadcast Secret-Sharing, Bounds and Applications Ivan Damgård, Kasper Green Larsen, Sophia Yakoubov
2020/617 (PDF ) New Techniques in Replica Encodings with Client Setup Rachit Garg, George Lu, Brent Waters
2020/616 (PDF ) Master-Key KDM-Secure IBE from Pairings Sanjam Garg, Romain Gay, Mohammad Hajiabadi
2020/615 (PDF ) LadderLeak: Breaking ECDSA With Less Than One Bit Of Nonce Leakage Diego F. Aranha, Felipe Rodrigues Novaes, Akira Takahashi, Mehdi Tibouchi, Yuval Yarom
2020/614 (PDF ) Lattice-Based E-Cash, Revisited Amit Deo, Benoit Libert, Khoa Nguyen, Olivier Sanders
2020/613 (PDF ) SiGamal: A supersingular isogeny-based PKE and its application to a PRF Tomoki Moriya, Hiroshi Onuki, Tsuyoshi Takagi
2020/612 (PDF ) Key Assignment Schemes with Authenticated Encryption, revisited Jeroen Pijnenburg, Bertram Poettering
2020/611 (PDF ) Efficient and Fast Hardware Architectures for SIKE Round 2 on FPGA Rami Elkhatib, Reza Azarderakhsh, Mehran Mozaffari-Kermani
2020/609 (PDF ) Efficient Simultaneous Deployment of Multiple Lightweight Authenticated Ciphers Behnaz Rezvani, Thomas Conroy, Luke Beckwith, Matthew Bozzay, Trevor Laffoon, David McFeeters, Yijia Shi, Minh Vu, William Diehl
2020/608 (PDF ) The Area-Latency Symbiosis: Towards Improved Serial Encryption Circuits Fatih Balli, Andrea Caforio, Subhadeep Banik
2020/607 (PDF ) Energy Analysis of Lightweight AEAD Circuits Andrea Caforio, Fatih Balli, Subhadeep Banik
2020/606 (PDF ) Multiparty Noninteractive Key Exchange from Ring Key-Homomorphic Weak PRFs Navid Alamati, Hart Montgomery, Sikhar Patranabis
2020/605 (PDF ) LUSA: the HPC library for lattice-based cryptanalysis Artur Mariano
2020/604 (PDF ) Perfectly Oblivious (Parallel) RAM Revisited, and Improved Constructions T-H. Hubert Chan, Elaine Shi, Wei-Kai Lin, Kartik Nayak
2020/603 (PDF ) Masking in Fine-Grained Leakage Models: Construction, Implementation and Verification Gilles Barthe, Marc Gourjon, Benjamin Gregoire, Maximilian Orlt, Clara Paglialonga, Lars Porth
2020/602 (PDF ) CENCPP* - Beyond-birthday-secure Encryption from Public Permutations Arghya Bhattacharjee, Avijit Dutta, Eik List, Mridul Nandi
2020/601 (PDF ) Everything is a Race and Nakamoto Always Wins Amir Dembo, Sreeram Kannan, Ertem Nusret Tas, David Tse, Pramod Viswanath, Xuechao Wang, Ofer Zeitouni
2020/600 (PDF ) Multi-Party Threshold Private Set Intersection with Sublinear Communication Saikrishna Badrinarayanan, Peihan Miao, Srinivasan Raghuraman, Peter Rindal
2020/599 (PDF ) Private Matching for Compute Prasad Buddhavarapu, Andrew Knox, Payman Mohassel, Shubho Sengupta, Erik Taubeneck, Vlad Vlaskin
2020/598 (PDF ) Cryptanalysis of Au et al. Dynamic Universal Accumulator Alex Biryukov, Aleksei Udovenko, Giuseppe Vitto
2020/597 (PDF ) Bitstream Modification of Trivium Kalle Ngo, Elena Dubrova, Michail Moraitis
2020/596 (PDF ) Relationships between quantum IND-CPA notions Tore Vincent Carstens, Ehsan Ebrahimi, Gelo Tabia, Dominique Unruh
2020/595 (PDF ) Time-Specific Encryption with Constant-Size Secret-Keys Secure under Standard Assumption Masahito Ishizaka, Shinsaku Kiyomoto
2020/594 (PDF ) LESS is More: Code-Based Signatures without Syndromes Jean-Francois Biasse, Giacomo Micheli, Edoardo Persichetti, Paolo Santini
2020/593 (PDF ) Alt-Coin Traceability Claire Ye, Chinedu Ojukwu, Anthony Hsu, Ruiqi Hu
2020/592 (PDF ) SWIFT: Super-fast and Robust Privacy-Preserving Machine Learning Nishat Koti, Mahak Pancholi, Arpita Patra, Ajith Suresh
2020/591 (PDF ) Automatic Verification of Differential Characteristics: Application to Reduced Gimli (Full Version) Fukang Liu, Takanori Isobe, Willi Meier
2020/590 (PDF ) Expected Constant Round Byzantine Broadcast under Dishonest Majority Jun Wan, Hanshen Xiao, Elaine Shi, Srinivas Devadas
2020/589 (PDF ) Developing Symmetric Encryption Methods Based On Residue Number System And Investigating Their Cryptosecurity Mykhailo Kasianchuk, Mikolaj Karpinski, Roman Kochan, Volodymyr Karpinskyi, Grzegorz Litawa, Inna Shylinska, Igor Yakymenko
2020/588 (PDF ) Reduction from Module-SIS to Ring-SIS Under Norm Constraint of Ring-SIS ZaHyun Koo, Jong-Seon No, Young-Sik Kim
2020/587 (PDF ) MoniPoly---An Expressive $q$-SDH-Based Anonymous Attribute-Based Credential System Syh-Yuan Tan, Thomas Gross
2020/586 (PDF ) Component-Based Comparison of Privacy-First Exposure Notification Protocols Ellie Daw
2020/585 (PDF ) Improving Key Mismatch Attack on NewHope with Fewer Queries Satoshi Okada, Yuntao Wang, Tsuyoshi Takagi
2020/584 (PDF ) vCNN: Verifiable Convolutional Neural Network based on zk-SNARKs Seunghwa Lee, Hankyung Ko, Jihye Kim, Hyunok Oh
2020/583 (PDF ) A New Targeted Password Guessing Model Xie Zhijie, Zhang Min, Yin Anqi, Li Zhenhan
2020/582 (PDF ) Risk and Architecture factors in Digital Exposure Notification Archanaa S. Krishnan, Yaling Yang, Patrick Schaumont
2020/581 (PDF ) The Round Complexity of Perfect MPC with Active Security and Optimal Resiliency Benny Applebaum, Eliran Kachlon, Arpita Patra
2020/580 (PDF ) TxChain: Efficient Cryptocurrency Light Clients via Contingent Transaction Aggregation Alexei Zamyatin, Zeta Avarikioti, Daniel Perez, William J. Knottenbelt
2020/579 (PDF ) BitFund: A Benevolent Blockchain Funding Network Darrow R Hartman
2020/578 (PDF ) HyperService: Interoperability and Programmability Across Heterogeneous Blockchains Zhuotao Liu, Yangxi Xiang, Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao, Bihan Wen, Yih-Chun Hu
2020/577 (PDF ) Inner-Product Functional Encryption with Fine-Grained Access Control Michel Abdalla, Dario Catalano, Romain Gay, Bogdan Ursu
2020/576 (PDF ) How Low Can We Go? Yuval Ishai
2020/575 (PDF ) From Rerandomizability to Sequential Aggregation: Efficient Signature Schemes Based on SXDH Assumption Sanjit Chatterjee, R. Kabaleeshwaran
2020/574 (PDF ) Towards Interpreting Smart Contract against Contract Fraud: A Practical and Automatic Realization Ming Li, Jian Weng, Anjia Yang, Jiasi Weng, Yue Zhang
2020/573 (PDF ) Quantifying the Security Cost of Migrating Protocols to Practice Christopher Patton, Thomas Shrimpton
2020/572 (PDF ) HACL×N: Verified Generic SIMD Crypto (for all your favorite platforms) Marina Polubelova, Karthikeyan Bhargavan, Jonathan Protzenko, Benjamin Beurdouche, Aymeric Fromherz, Natalia Kulatova, Santiago Zanella-Béguelin
2020/571 (PDF ) Machine Learning Assisted Differential Distinguishers For Lightweight Ciphers (Extended Version) Anubhab Baksi, Jakub Breier, Yi Chen, Xiaoyang Dong
2020/570 (PDF ) On Optimality of d + 1 TI Shared Functions of 8 Bits or Less Dušan Božilov
2020/569 (PDF ) QA-NIZK Arguments of Same Opening for Bilateral Commitments Carla Ràfols, Javier Silva
2020/568 (PDF ) Prelude to Marvellous (With the Designers' Commentary, Two Bonus Tracks, and a Foretold Prophecy) Tomer Ashur, Siemen Dhooghe
2020/567 (PDF ) An Improvement of Multi-Exponentiation with Encrypted Bases Argument: Smaller and Faster Yi Liu, Qi Wang, Siu-Ming Yiu
2020/566 (PDF ) Reputation Driven Dynamic Access Control Framework for IoT atop PoA Ethereum Blockchain Auqib Hamid Lone, Roohie Naaz
2020/565 (PDF ) Homomorphic Computation in Reed-Muller Codes Jinkyu Cho, Young-Sik Kim, Jong-Seon No
2020/564 (PDF ) Hash-based Signatures Revisited: A Dynamic FORS with Adaptive Chosen Message Security Mahmoud Yehia, Riham AlTawy, T. Aaron Gulliver
2020/563 (PDF ) Secure large-scale genome-wide association studies using homomorphic encryption Marcelo Blatt, Alexander Gusev, Yuriy Polyakov, Shafi Goldwasser
2020/562 (PDF ) The System That Cried Wolf: Sensor Security Analysis of Wide-area Smoke Detectors for Critical Infrastructure Hocheol Shin, Juhwan Noh, Dohyun Kim, Yongdae Kim
2020/561 (PDF ) Exploiting Weak Diffusion of Gimli: Improved Distinguishers and Preimage Attacks Fukang Liu, Takanori Isobe, Willi Meier
2020/560 (PDF ) Zerojoin: Combining Zerocoin and CoinJoin Alexander Chepurnoy, Amitabh Saxena
2020/559 (PDF ) PIVOT: PrIVate and effective cOntact Tracing Giuseppe Garofalo, Tim Van hamme, Davy Preuveneers, Wouter Joosen, Aysajan Abidin, Mustafa A. Mustafa
2020/558 (PDF ) BSPL: Balanced Static Power Logic Bijan Fadaeinia, Thorben Moos, Amir Moradi
2020/557 (PDF ) On the sensitivity of some APN permutations to swapping points Lilya Budaghyan, Nikolay Kaleyski, Constanza Riera, Pantelimon Stanica
2020/556 (PDF ) Kerckhoffs' Legacy Jean-Claude Caraco, Rémi Géraud-Stewart, David Naccache
2020/555 (PDF ) Splitting Payments Locally While Routing Interdimensionally Lisa Eckey, Sebastian Faust, Kristina Hostáková, Stefanie Roos
2020/554 (PDF ) Bitcoin-Compatible Virtual Channels Lukas Aumayr, Oguzhan Ersoy, Andreas Erwig, Sebastian Faust, Kristina Hostáková, Matteo Maffei, Pedro Moreno-Sanchez, Siavash Riahi
2020/553 (PDF ) Revocable Attribute-based Encryption Scheme with Arithmetic Span Program for Cloud-Assisted IoT Hu Xiong, Jinhao Chen, Minghao Yang, Xin Huang
2020/552 (PDF ) High-Precision Bootstrapping of RNS-CKKS Homomorphic Encryption Using Optimal Minimax Polynomial Approximation and Inverse Sine Function Joon-Woo Lee, Eunsang Lee, Yongwoo Lee, Young-Sik Kim, Jong-Seon No
2020/551 (PDF ) Higher Order Differential Attack against Full-Round BIG Naoki Shibayama, Yasutaka Igarashi, Toshinobu Kaneko
2020/550 (PDF ) Practical MPC+FHE with Applications in Secure Multi-PartyNeural Network Evaluation Ruiyu Zhu, Changchang Ding, Yan Huang
2020/549 (PDF ) Drop by Drop you break the rock - Exploiting generic vulnerabilities in Lattice-based PKE/KEMs using EM-based Physical Attacks Prasanna Ravi, Shivam Bhasin, Sujoy Sinha Roy, Anupam Chattopadhyay
2020/548 (PDF ) Blockchain Stealth Address Schemes Gary Yu
2020/547 (PDF ) Finding Bit-Based Division Property for Ciphers with Complex Linear Layer Kai Hu, Qingju Wang, Meiqin Wang
2020/546 (PDF ) MixColumns Coefficient Property and Security of the AES with A Secret S-Box Xin An, Kai Hu, Meiqin Wang
2020/545 (PDF ) Efficient and Round-Optimal Oblivious Transfer and Commitment with Adaptive Security Ran Canetti, Pratik Sarkar, Xiao Wang
2020/544 (PDF ) SNI-in-the-head: Protecting MPC-in-the-head Protocols against Side-channel Analysis Okan Seker, Sebastian Berndt, Luca Wilke, Thomas Eisenbarth
2020/543 (PDF ) Kachina - Foundations of Private Smart Contracts Thomas Kerber, Aggelos Kiayias, Markulf Kohlweiss
2020/542 (PDF ) Lightweight Authenticated Encryption Mode Suitable for Threshold Implementation Yusuke Naito, Yu Sasaki, Takeshi Sugawara
2020/541 (PDF ) There Can Be No Compromise: The Necessity of Ratcheted Authentication in Secure Messaging Benjamin Dowling, Britta Hale
2020/540 (PDF ) One Round Threshold ECDSA with Identifiable Abort Rosario Gennaro, Steven Goldfeder
2020/539 (PDF ) On the Concrete Security of LWE with Small Secret Hao Chen, Lynn Chua, Kristin Lauter, Yongsoo Song
2020/538 (PDF ) Rotational Cryptanalysis on MAC Algorithm Chaskey Liliya Kraleva, Tomer Ashur, Vincent Rijmen
2020/537 (PDF ) TARDIS: A Foundation of Time-Lock Puzzles in UC Carsten Baum, Bernardo David, Rafael Dowsley, Jesper Buus Nielsen, Sabine Oechsner
2020/536 (PDF ) Influence of the Linear Layer on the Algebraic Degree in SP-Networks Carlos Cid, Lorenzo Grassi, Aldo Gunsing, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger
2020/535 (PDF ) Non-Interactive Zero-Knowledge in Pairing-Free Groups from Weaker Assumptions Geoffroy Couteau, Shuichi Katsumata, Bogdan Ursu
2020/534 (PDF ) Post-quantum TLS without handshake signatures Peter Schwabe, Douglas Stebila, Thom Wiggers
2020/533 (PDF ) Anonymous Lottery in the Proof-of-Stake Setting Foteini Baldimtsi, Varun Madathil, Alessandra Scafuro, Linfeng Zhou
2020/532 (PDF ) Promise: Leveraging Future Gains for Collateral Reduction Dominik Harz, Lewis Gudgeon, Rami Khalil, Alexei Zamyatin
2020/531 (PDF ) Centralized or Decentralized? The Contact Tracing Dilemma Serge Vaudenay
2020/530 (PDF ) Determining the Multiplicative Complexity of Boolean Functions using SAT Mathias Soeken
2020/529 (PDF ) CHIP and CRISP: Protecting All Parties Against Compromise through Identity-Binding PAKEs Cas Cremers, Moni Naor, Shahar Paz, Eyal Ronen
2020/528 (PDF ) Privacy-Preserving COVID-19 Contact Tracing App: A Zero-Knowledge Proof Approach Joseph K. Liu, Man Ho Au, Tsz Hon Yuen, Cong Zuo, Jiawei Wang, Amin Sakzad, Xiapu Luo, Li Li, Kim-Kwang Raymond Choo
2020/527 (PDF ) Aggregatable Subvector Commitments for Stateless Cryptocurrencies Alin Tomescu, Ittai Abraham, Vitalik Buterin, Justin Drake, Dankrad Feist, Dmitry Khovratovich
2020/526 (PDF ) Efficient Montgomery-like formulas for general Huff's and Huff's elliptic curves and their applications to the isogeny-based cryptography Robert Dryło, Tomasz Kijko, Michał Wroński
2020/525 (PDF ) Account Management in Proof of Stake Ledgers Dimitris Karakostas, Aggelos Kiayias, Mario Larangeira
2020/524 (PDF ) Efficient Signatures on Randomizable Ciphertexts Balthazar Bauer, Georg Fuchsbauer
2020/523 (PDF ) Generalized Matsui Algorithm 1 with application for the full DES Tomer Ashur, Raluca Posteuca, Danilo Šijačić, Stef D’haeseleer
2020/522 (PDF ) Privately Connecting Mobility to Infectious Diseases via Applied Cryptography Alexandros Bampoulidis, Alessandro Bruni, Lukas Helminger, Daniel Kales, Christian Rechberger, Roman Walch
2020/521 (PDF ) MP-SPDZ: A Versatile Framework for Multi-Party Computation Marcel Keller
2020/520 (PDF ) MMSAT: A Scheme for Multimessage Multiuser Signature Aggregation Yarkın Doröz, Jeffrey Hoffstein, Joseph H. Silverman, Berk Sunar
2020/519 (PDF ) Optimally-secure Coin-tossing against a Byzantine Adversary Hamidreza Amini Khorasgani, Hemanta K. Maji, Mingyuan Wang
2020/518 (PDF ) Practical Exact Proofs from Lattices: New Techniques to Exploit Fully-Splitting Rings Muhammed F. Esgin, Ngoc Khanh Nguyen, Gregor Seiler
2020/517 (PDF ) Practical Product Proofs for Lattice Commitments Thomas Attema, Vadim Lyubashevsky, Gregor Seiler
2020/516 (PDF ) POWER-SUPPLaY: Leaking Data from Air-Gapped Systems by Turning the Power-Supplies Into Speakers Mordechai Guri
2020/515 (PDF ) On a hybrid approach to solve small secret LWE Thomas Espitau, Antoine Joux, Natalia Kharchenko
2020/514 (PDF ) On the Deployment of curve based cryptography for the Internet of Things Michael Scott
2020/513 (PDF ) E-cclesia: Universally Composable Self-Tallying Elections Myrto Arapinis, Nikolaos Lamprou, Lenka Mareková, Thomas Zacharias, Léo Ackermann, Pavlos Georgiou
2020/512 (PDF ) Glimpses are Forever in RC4 amidst the Spectre of Biases Chandratop Chakraborty, Pranab Chakraborty, Subhamoy Maitra
2020/511 (PDF ) JaxNet: Scalable Blockchain Network Iurii Shyshatsky, Vinod Manoharan, Taras Emelyanenko, Lucas Leger
2020/510 (PDF ) On the Applicability of the Fujisaki-Okamoto Transformation to the BIKE KEM Nir Drucker, Shay Gueron, Dusan Kostic, Edoardo Persichetti
2020/509 (PDF ) BBB Secure Nonce Based MAC Using Public Permutations Avijit Dutta, Mridul Nandi
2020/508 (PDF ) Augmenting Leakage Detection using Bootstrapping Yuan Yao, Michael Tunstall, Elke De Mulder, Anton Kochepasov, Patrick Schaumont
2020/507 (PDF ) Characteristics of Hadamard square of Reed--Muller subcodes of special type (Extended abstract) Victoria Vysotskaya
2020/506 (PDF ) Tornado: Automatic Generation of Probing-Secure Masked Bitsliced Implementations Sonia Belaïd, Pierre-Evariste Dagand, Darius Mercadier, Matthieu Rivain, Raphaël Wintersdorff
2020/505 (PDF ) ConTra Corona: Contact Tracing against the Coronavirus by Bridging the Centralized–Decentralized Divide for Stronger Privacy Wasilij Beskorovajnov, Felix Dörre, Gunnar Hartung, Alexander Koch, Jörn Müller-Quade, Thorsten Strufe
2020/504 (PDF ) Storing and Retrieving Secrets on a Blockchain Vipul Goyal, Abhiram Kothapalli, Elisaweta Masserova, Bryan Parno, Yifan Song
2020/503 (PDF ) A New Encoding Algorithm for a Multidimensional Version of the Montgomery Ladder Aaron Hutchinson, Koray Karabina
2020/502 (PDF ) Applying Blockchain Layer2 Technology to Mass E-Commerce Sijia Zhao, Donal O’Mahony
2020/501 (PDF ) Fast Threshold ECDSA with Honest Majority Ivan Damgård, Thomas Pelle Jakobsen, Jesper Buus Nielsen, Jakob Illeborg Pagter, Michael Bæksvang Østergård
2020/500 (PDF ) Proving Resistance Against Infinitely Long Subspace Trails: How to Choose the Linear Layer Lorenzo Grassi, Christian Rechberger, Markus Schofnegger
2020/499 (PDF ) Proof-Carrying Data from Accumulation Schemes Benedikt Bünz, Alessandro Chiesa, Pratyush Mishra, Nicholas Spooner
2020/498 (PDF ) Threshold ECDSA for Decentralized Asset Custody Adam Gągol, Jędrzej Kula, Damian Straszak, Michał Świętek
2020/497 (PDF ) Collusion-Preserving Computation without a Mediator Michele Ciampi, Yun Lu, Vassilis Zikas
2020/496 (PDF ) Linear Generalized ElGamal Encryption Scheme Demba Sow, Léo Robert, Pascal Lafourcade
2020/495 (PDF ) Disperse rotation operator DRT and use in some stream ciphers Kim Yong-Jin, Yon Yong-Ho, Jong Yu-Jin, Li Ok-Chol
2020/494 (PDF ) Improved Black-Box Constructions of Composable Secure Computation Rohit Chatterjee, Xiao Liang, Omkant Pandey
2020/493 (PDF ) Towards Defeating Mass Surveillance and SARS-CoV-2: The Pronto-C2 Fully Decentralized Automatic Contact Tracing System Gennaro Avitabile, Vincenzo Botta, Vincenzo Iovino, Ivan Visconti
2020/492 (PDF ) UC Non-Interactive, Proactive, Threshold ECDSA Ran Canetti, Nikolaos Makriyannis, Udi Peled
2020/491 (PDF ) Efficient AGCD-based homomorphic encryption for matrix and vector arithmetic Hilder Vitor Lima Pereira
2020/490 (PDF ) SoK: Techniques for Verifiable Mix Nets Thomas Haines, Johannes Mueller
2020/489 (PDF ) Pandemic Contact Tracing Apps: DP-3T, PEPP-PT NTK, and ROBERT from a Privacy Perspective Fraunhofer AISEC
2020/488 (PDF ) Near-optimal Polynomial for Modulus Reduction Using L2-norm for Approximate Homomorphic Encryption Yongwoo Lee, Joonwoo Lee, Young-Sik Kim, Jong-Seon No
2020/487 (PDF ) Sieve, Enumerate, Slice, and Lift: Hybrid Lattice Algorithms for SVP via CVPP Emmanouil Doulgerakis, Thijs Laarhoven, Benne de Weger
2020/486 (PDF ) Rotational-XOR Cryptanalysis of Simon-like Block Ciphers Jinyu Lu, Yunwen Liu, Tomer Ashur, Bing Sun, Chao Li
2020/485 (PDF ) Edwards curve points counting method and supersingular Edwards and Montgomery curves Ruslan V. Skuratovskii
2020/484 (PDF ) Applicability of Mobile Contact Tracing in Fighting Pandemic (COVID-19): Issues, Challenges and Solutions Aaqib Bashir Dar, Auqib Hamid Lone, Saniya Zahoor, Afshan Amin Khan, Roohie Naaz
2020/483 (PDF ) On Ideal and Weakly-Ideal Access Structures Reza Kaboli, Shahram Khazaei, Maghsoud Parviz
2020/482 (PDF ) A Trace Based $GF(2^n)$ Inversion Algorithm Haining Fan
2020/481 (PDF ) Using z14 Fused-Multiply-Add Instructions to Accelerate Elliptic Curve Cryptography James You, Qi Zhang, Curtis D'Alves, Bill O'Farrell, Christopher K. Anand
2020/480 (PDF ) Low-Latency ASIC Algorithms of Modular Squaring of Large Integers for VDF Evaluation Ahmet Can Mert, Erdinc Ozturk, Erkay Savas
2020/479 (PDF ) Semi-Adaptively Secure Offline Witness Encryption from Puncturable Witness PRF Tapas Pal, Ratna Dutta
2020/478 (PDF ) Leakage-Resilient Extractors and Secret-Sharing against Bounded Collusion Protocols Eshan Chattopadhyay, Jesse Goodman, Vipul Goyal, Xin Li
2020/477 (PDF ) Partially Structure-Preserving Signatures: Lower Bounds, Constructions and More Essam Ghadafi
2020/476 (PDF ) Generalized Channels from Limited Blockchain Scripts and Adaptor Signatures Lukas Aumayr, Oguzhan Ersoy, Andreas Erwig, Sebastian Faust, Kristina Hostakova, Matteo Maffei, Pedro Moreno-Sanchez, Siavash Riahi
2020/475 (PDF ) Proof of Review (PoR): A New Consensus Protocol for Deriving Trustworthiness of Reputation Through Reviews Zachary Zaccagni, Ram Dantu
2020/474 (PDF ) Tiramisu: Black-Box Simulation Extractable NIZKs in the Updatable CRS Model Karim Baghery, Mahdi Sedaghat
2020/473 (PDF ) Bounded Collusion Protocols, Cylinder-Intersection Extractors and Leakage-Resilient Secret Sharing Ashutosh Kumar, Raghu Meka, David Zuckerman
2020/471 (PDF ) Interpose PUF can be PAC Learned Durba Chatterjee, Debdeep Mukhopadhyay, Aritra Hazra
2020/470 (PDF ) LMS vs XMSS: Comparison of Stateful Hash-Based Signature Schemes on ARM Cortex-M4 Fabio Campos, Tim Kohlstadt, Steffen Reith, Marc Stoettinger
2020/469 (PDF ) Dedicated Security Chips in the Age of Secure Enclaves Kari Kostiainen, Aritra Dhar, Srdjan Capkun
2020/468 (PDF ) Distributed Auditing Proofs of Liabilities Konstantinos Chalkias, Kevin Lewi, Payman Mohassel, Valeria Nikolaenko
2020/467 (PDF ) Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing Zhenzhen Bao, Xiaoyang Dong, Jian Guo, Zheng Li, Danping Shi, Siwei Sun, Xiaoyun Wang
2020/466 (PDF ) Custom Instruction Support for Modular Defense against Side-channel and Fault Attacks Pantea Kiaei, Darius Mercadier, Pierre-Evariste Dagand, Karine Heydemann, Patrick Schaumont
2020/465 (PDF ) Domain-Oriented Masked Instruction Set Architecture for RISC-V Pantea Kiaei, Patrick Schaumont
2020/464 (PDF ) Can a Public Blockchain Keep a Secret? Fabrice Benhamouda, Craig Gentry, Sergey Gorbunov, Shai Halevi, Hugo Krawczyk, Chengyu Lin, Tal Rabin, Leonid Reyzin
2020/463 (PDF ) Leia: A Lightweight Cryptographic Neural Network Inference System at the Edge Xiaoning Liu, Bang Wu, Xingliang Yuan, Xun Yi
2020/462 (PDF ) An Information-Theoretic Proof of the Streaming Switching Lemma for Symmetric Encryption Ido Shahaf, Or Ordentlich, Gil Segev
2020/461 (PDF ) A Polynomial-Time Algorithm for Solving the Hidden Subset Sum Problem Jean-Sébastien Coron, Agnese Gini
2020/460 (PDF ) A Bunch of Broken Schemes: A Simple yet Powerful Linear Approach to Analyzing Security of Attribute-Based Encryption Marloes Venema, Greg Alpár
2020/459 (PDF ) Improved Fault Templates of Boolean Circuits in Cryptosystems can Break Threshold Implementations Debdeep Mukhopadhyay
2020/458 (PDF ) On the Optimality of Optimistic Responsiveness Ittai Abraham, Kartik Nayak, Ling Ren, Nibesh Shrestha
2020/457 (PDF ) Cryptographic Scheme for analyzing protected files on Sandboxes and share them privately Ahmad Almorabea
2020/456 (PDF ) General Congestion Attack on HTLC-Based Payment Channel Networks Zhichun Lu, Runchao Han, Jiangshan Yu
2020/455 (PDF ) Cryptanalysis of LEDAcrypt Daniel Apon, Ray Perlner, Angela Robinson, Paolo Santini
2020/454 (PDF ) Optimized Lattice Basis Reduction In Dimension 2, and Fast Schnorr and EdDSA Signature Verification Thomas Pornin
2020/453 (PDF ) BioLocker: A Practical Biometric Authentication Mechanism based on 3D Fingervein F. Betül Durak, Loïs Huguenin-Dumittan, Serge Vaudenay
2020/452 (PDF ) Almost Public Quantum Coins Amit Behera, Or Sattath
2020/451 (PDF ) Maliciously Secure Matrix Multiplication with Applications to Private Deep Learning Hao Chen, Miran Kim, Ilya Razenshteyn, Dragos Rotaru, Yongsoo Song, Sameer Wagh
2020/450 (PDF ) The Landscape of Pointcheval-Sanders Signatures: Mapping to Polynomial-Based Signatures and Beyond Kristian L. McDonald
2020/449 (PDF ) Switched Threshold Signatures from K-Private PolyShamir Secret Sharing Kristian L. McDonald
2020/448 (PDF ) Partial Secret Sharing Schemes Amir Jafari, Shahram Khazaei
2020/446 (PDF ) RISQ-V: Tightly Coupled RISC-V Accelerators for Post-Quantum Cryptography Tim Fritzmann, Georg Sigl, Johanna Sepúlveda
2020/445 (PDF ) On Pseudorandom Encodings Thomas Agrikola, Geoffroy Couteau, Yuval Ishai, Stanislaw Jarecki, Amit Sahai
2020/444 (PDF ) A modern signature scheme with message recovery: Abe--Okamoto signatures with EdDSA elements Satō Shinichi
2020/443 (PDF ) A White-Box Masking Scheme Resisting Computational and Algebraic Attacks Okan Seker, Thomas Eisenbarth, Maciej Liskiewicz
2020/442 (PDF ) Fine-Grained Cryptography: A New Frontier? Alon Rosen
2020/441 (PDF ) Modeling for Three-Subset Division Property without Unknown Subset Yonglin Hao, Gregor Leander, Willi Meier, Yosuke Todo, Qingju Wang
2020/440 (PDF ) Sublattice Attack on Poly-LWE with Wide Error Distributions Hao Chen
2020/439 (PDF ) The Existence of Cycles in the Supersingular Isogeny Graphs Used in SIKE Hiroshi Onuki, Yusuke Aikawa, Tsuyoshi Takagi
2020/438 (PDF ) Fast hybrid Karatsuba multiplier for Type II pentanomials Yin Li, Yu Zhang, Wei He
2020/437 (PDF ) Faster Montgomery and double-add ladders for short Weierstrass curves Mike Hamburg
2020/436 (PDF ) Deep Learning based Side-Channel Attack: a New Profiling Methodology based on Multi-Label Classification Houssem Maghrebi
2020/435 (PDF ) WAGE: An Authenticated Encryption with a Twist Riham AlTawy, Guang Gong, Kalikinkar Mandal, Raghvendra Rohit
2020/434 (PDF ) High-speed Instruction-set Coprocessor for Lattice-based Key Encapsulation Mechanism: Saber in Hardware Sujoy Sinha Roy, Andrea Basso
2020/433 (PDF ) zkRelay: Facilitating Sidechains using zkSNARK-based Chain-Relays Martin Westerkamp, Jacob Eberhardt
2020/432 (PDF ) From A to Z: Projective coordinates leakage in the wild Alejandro Cabrera Aldaya, Cesar Pereida García, Billy Bob Brumley
2020/431 (PDF ) x-only point addition formula and faster compressed SIKE Geovandro Pereira, Javad Doliskani, David Jao
2020/430 (PDF ) Hierarchical One-out-of-Many Proofs With Applications to Blockchain Privacy and Ring Signatures Aram Jivanyan, Tigran Mamikonyan
2020/429 (PDF ) Mathematics and Cryptography: A Marriage of Convenience? Alice Silverberg
2020/428 (PDF ) Security Analysis of the COVID-19 Contact Tracing Specifications by Apple Inc. and Google Inc. Yaron Gvili
2020/427 (PDF ) Improving the Performance of the Picnic Signature Scheme Daniel Kales, Greg Zaverucha
2020/426 (PDF ) Privacy-Preserving Contact Tracing: current solutions and open questions Qiang Tang
2020/425 (PDF ) Friet: An Authenticated Encryption Scheme with Built-in Fault Detection Thierry Simon, Lejla Batina, Joan Daemen, Vincent Grosso, Pedro Maat Costa Massolino, Kostas Papagiannopoulos, Francesco Regazzoni, Niels Samwel
2020/424 (PDF ) Low-gate Quantum Golden Collision Finding Samuel Jaques, André Schrottenloher
2020/423 (PDF ) On One-way Functions and Kolmogorov Complexity Yanyi Liu, Rafael Pass
2020/422 (PDF ) Pattern Matching on Encrypted Data Anis Bkakria, Nora Cuppens, Frédéric Cuppens
2020/420 (PDF ) Practical Card-Based Protocol for Three-Input Majority Kenji Yasunaga
2020/419 (PDF ) Pointproofs: Aggregating Proofs for Multiple Vector Commitments Sergey Gorbunov, Leonid Reyzin, Hoeteck Wee, Zhenfei Zhang
2020/418 (PDF ) Delayed Authentication: Preventing Replay and Relay Attacks in Private Contact Tracing Krzysztof Pietrzak
2020/417 (PDF ) Optimal strategies for CSIDH Jesús-Javier Chi-Domínguez, Francisco Rodríguez-Henríquez
2020/416 (PDF ) The Multi-Base Discrete Logarithm Problem: Tight Reductions and Non-Rewinding Proofs for Schnorr Identification and Signatures Mihir Bellare, Wei Dai
2020/415 (PDF ) Indistinguishability Obfuscation Without Maps: Attacks and Fixes for Noisy Linear FE Shweta Agrawal, Alice Pellet-Mary
2020/414 (PDF ) Semi-Quantum Money Roy Radian, Or Sattath
2020/413 (PDF ) Defeating State-of-the-Art White-Box Countermeasures with Advanced Gray-Box Attacks Louis Goubin, Matthieu Rivain, Junwei Wang
2020/412 (PDF ) Fixslicing: A New GIFT Representation Alexandre Adomnicai, Zakaria Najm, Thomas Peyrin
2020/411 (PDF ) Secure Two-Party Computation in a Quantum World Niklas Büscher, Daniel Demmler, Nikolaos P. Karvelas, Stefan Katzenbeisser, Juliane Krämer, Deevashwer Rathee, Thomas Schneider, Patrick Struck
2020/410 (PDF ) Supersingular Isogeny Key Encapsulation (SIKE) Round 2 on ARM Cortex-M4 Hwajeong Seo, Mila Anastasova, Amir Jalali, Reza Azarderakhsh
2020/409 (PDF ) Classical Misuse Attacks on NIST Round 2 PQC: The Power of Rank-Based Schemes Loïs Huguenin-Dumittan, Serge Vaudenay
2020/408 (PDF ) Speed up over the Rainbow Nir Drucker, Shay Gueron
2020/407 (PDF ) Feather: Lightweight Multi-party Updatable Delegated Private Set Intersection Aydin Abadi, Sotirios Terzis, Changyu Dong
2020/406 (PDF ) Hybrid-BFT: Optimistically Responsive Synchronous Consensus with Optimal Latency or Resilience Atsuki Momose, Jason Paul Cruz, Yuichi Kaji
2020/405 (PDF ) Ordinos: A Verifiable Tally-Hiding E-Voting System Ralf Kuesters, Julian Liedtke, Johannes Mueller, Daniel Rausch, Andreas Vogt
2020/404 (PDF ) From Zebras to Tigers: Incentivizing participation in Crowd-sensing applications through fair and private Bitcoin rewards Tassos Dimitriou
2020/403 (PDF ) Bringing Order to Chaos: The Case of Collision-Resistant Chameleon-Hashes David Derler, Kai Samelin, Daniel Slamanig
2020/402 (PDF ) A Note on Low Order Assumptions in RSA groups István András Seres, Péter Burcsi
2020/401 (PDF ) Mining for Privacy: How to Bootstrap a Snarky Blockchain Thomas Kerber, Aggelos Kiayias, Markulf Kohlweiss
2020/400 (PDF ) Threshold Implementations Are Not Provably Secure Against Fault Sensitivity Analysis Jeroen Delvaux
2020/399 (PDF ) Analysis of DP3T Serge Vaudenay
2020/398 (PDF ) CAUDHT: Decentralized Contact Tracing Using a DHT and Blind Signatures Samuel Brack, Leonie Reichert, Björn Scheuermann
2020/397 (PDF ) Classification of 4-bit S-boxes for BOGI-permutation Seonggyeom Kim, Deukjo Hong, Jaechul Sung, Seokhie Hong
2020/396 (PDF ) Improving Non-Profiled Side-Channel Attacks using Autoencoder based Preprocessing Donggeun Kwon, HeeSeok Kim, Seokhie Hong
2020/395 (PDF ) Cryptography from Information Loss Marshall Ball, Elette Boyle, Akshay Degwekar, Apoorvaa Deshpande, Alon Rosen, Vinod Vaikuntanathan, Prashant Nalini Vasudevan
2020/394 (PDF ) Candidate iO from Homomorphic Encryption Schemes Zvika Brakerski, Nico Döttling, Sanjam Garg, Giulio Malavolta
2020/393 (PDF ) LevioSA: Lightweight Secure Arithmetic Computation Carmit Hazay, Yuval Ishai, Antonio Marcedone, Muthuramakrishnan Venkitasubramaniam
2020/392 (PDF ) An argument on the security of LRBC, a recently proposed lightweight block cipher Sadegh Sadeghi, Nasour Bagheri
2020/391 (PDF ) Optimized CSIDH Implementation Using a 2-torsion Point Donghoe Heo, Suhri Kim, Kisoon Yoon, Young-Ho Park, Seokhie Hong
2020/390 (PDF ) A French cipher from the late 19th century Rémi Géraud-Stewart, David Naccache
2020/389 (PDF ) A Unary Cipher with Advantages over the Vernam Cipher Gideon Samid
2020/388 (PDF ) Fast 4 way vectorized ladder for the complete set of Montgomery curves Huseyin Hisil, Berkan Egrice, Mert Yassi
2020/387 (PDF ) Low-complexity and Reliable Transforms for Physical Unclonable Functions Onur Gunlu, Rafael F. Schaefer
2020/386 (PDF ) Accountability in a Permissioned Blockchain: Formal Analysis of Hyperledger Fabric Ralf Kuesters, Daniel Rausch, Mike Simon
2020/385 (PDF ) Two-Sided Malicious Security for Private Intersection-Sum with Cardinality Peihan Miao, Sarvar Patel, Mariana Raykova, Karn Seth, Moti Yung
2020/384 (PDF ) A ”Final” Security Bug Nguyen Thoi Minh Quan
2020/383 (PDF ) Parallel strategies for SIDH: Towards computing SIDH twice as fast Daniel Cervantes-Vázquez, Eduardo Ochoa-Jiménez, Francisco Rodríguez-Henríquez
2020/382 (PDF ) Privacy-Preserving Incentive Systems with Highly Efficient Point-Collection Jan Bobolz, Fabian Eidens, Stephan Krenn, Daniel Slamanig, Christoph Striecks
2020/381 (PDF ) Proof-of-Reputation Blockchain with Nakamoto Fallback Leonard Kleinrock, Rafail Ostrovsky, Vassilis Zikas
2020/380 (PDF ) Rowhammer Induced Intermittent Fault Attack on ECC-hardened memory Anirban Chakraborty, Sarani Bhattacharya, Sayandeep Saha, Debdeep Mukhopdhyay
2020/379 (PDF ) Post-quantum WireGuard Andreas Hülsing, Kai-Chun Ning, Peter Schwabe, Florian Weber, Philip R. Zimmermann
2020/378 (PDF ) Efficient 4-way Vectorizations of the Montgomery Ladder Kaushik Nath, Palash Sarkar
2020/377 (PDF ) Oblivious tight compaction in O(n) time with smaller constant Samuel Dittmer, Rafail Ostrovsky
2020/376 (PDF ) On the privacy of a code-based single-server computational PIR scheme Sarah Bordage, Julien Lavauzelle
2020/375 (PDF ) Privacy-Preserving Contact Tracing of COVID-19 Patients Leonie Reichert, Samuel Brack, Björn Scheuermann
2020/374 (PDF ) Diogenes: Lightweight Scalable RSA Modulus Generation with a Dishonest Majority Megan Chen, Carmit Hazay, Yuval Ishai, Yuriy Kashnikov, Daniele Micciancio, Tarik Riviere, abhi shelat, Muthu Venkitasubramaniam, Ruihan Wang
2020/373 (PDF ) Tandem Deep Learning Side-Channel Attack Against FPGA Implementation of AES Huanyu Wang, Elena Dubrova
2020/372 (PDF ) Graph indicators of vectorial functions and bounds on the algebraic degree of composite functions Claude Carlet
2020/371 (PDF ) Single-Trace Attacks on Keccak Matthias J. Kannwischer, Peter Pessl, Robert Primas
2020/370 (PDF ) Multiparty Generation of an RSA Modulus Megan Chen, Ran Cohen, Jack Doerner, Yashvanth Kondi, Eysa Lee, Schuyler Rosefield, abhi shelat
2020/369 (PDF ) The Risk of Outsourcing: Hidden SCA Trojans in Third-Party IP-Cores Threaten Cryptographic ICs David Knichel, Thorben Moos, Amir Moradi
2020/368 (PDF ) Defeating NewHope with a Single Trace Dorian Amiet, Andreas Curiger, Lukas Leuenberger, Paul Zbinden
2020/367 (PDF ) Exploiting Decryption Failures in Mersenne Number Cryptosystems Marcel Tiepelt, Jan-Pieter D'Anvers
2020/366 (PDF ) FICS-PCB: A Multi-Modal Image Dataset for Automated Printed Circuit Board Visual Inspection Hangwei Lu, Dhwani Mehta, Olivia Paradis, Navid Asadizanjani, Mark Tehranipoor, Damon L. Woodard
2020/365 (PDF ) A New Algorithm to Find Monic Irreducible Polynomials over Extended Galois field GF prime p and extension q using Positional Arithmetic Sankhanil Dey, Amlan Chakrabarti, Ranjan Ghosh
2020/364 (PDF ) Subversion-Resistant Quasi-Adaptive NIZK and Applications to Modular zk-SNARKs Behzad Abdolmaleki, Daniel Slamanig
2020/363 (PDF ) On equivalence between known polynomial APN functions and power APN functions Qianhong Wan, Longjiang Qu, Chao Li
2020/361 (PDF ) How Not to Create an Isogeny-Based PAKE Reza Azarderakhsh, David Jao, Brian Koziel, Jason T. LeGrow, Vladimir Soukharev, Oleg Taraskin
2020/360 (PDF ) Composite Algorithm The New Algorithm to Search for Monic Irreducible Polynomials over Extended Galois Fields Sankhanil Dey, Amlan Chakrabarti, Ranjan Ghosh
2020/359 (PDF ) 4-bit Boolean functions in generation and cryptanalysis of secure 4-bit crypto S-boxes. Sankhanil Dey, Amlan Chakrabarti, Ranjan Ghosh
2020/358 (PDF ) Division Algorithm to search for monic irreducible polynomials over extended Galois Field GF(p^q). Sankhanil Dey, Amlan Chakrabarti, Ranjan Ghosh
2020/357 (PDF ) Quasigroups and Substitution Permutation Networks: A Failed Experiment George Teseleanu
2020/356 (PDF ) Efficient MPC with a Mixed Adversary Martin Hirt, Marta Mularczyk
2020/355 (PDF ) Permissionless Consensus in the Resource Model Benjamin Terner
2020/354 (PDF ) A Generalization of the ElGamal public-key cryptosystem Rajitha Ranasinghe, Pabasara Athukorala
2020/353 (PDF ) A Probabilistic Public Key Encryption Scheme Based on Quartic Reciprocity (Draft V1.22) Robert A. Threlfall
2020/352 (PDF ) Coda: Decentralized Cryptocurrency at Scale Joseph Bonneau, Izaak Meckler, Vanishree Rao, Evan Shapiro
2020/351 (PDF ) Optimized and secure pairing-friendly elliptic curves suitable for one layer proof composition Youssef El Housni, Aurore Guillevic
2020/350 (PDF ) New Multi-bit Differentials to Improve Attacks Against ChaCha Murilo Coutinho, T. C. Souza Neto
2020/349 (PDF ) Differential Power Analysis on (Non-)Linear Feedback Shift Registers Siang Meng Sim
2020/348 (PDF ) Constructing hidden order groups using genus three Jacobians Steve Thakur
2020/347 (PDF ) Some Low Round Zero Knowledge Protocols Hongda Li, Peifang Ni, Dongxue Pan
2020/346 (PDF ) Algebraic Attacks on Round-Reduced Keccak/Xoodoo Fukang Liu, Takanori Isobe, Willi Meier, Zhonghao Yang
2020/345 (PDF ) Bent functions stemming from Maiorana-McFarland class being provably outside its completed version Fengrong Zhangand, Nastja Cepak, Enes Pasalic, Yongzhuang Wei
2020/344 (PDF ) Anchoring the Value of Cryptocurrency Yibin Xu, Yangyu Huang, Jianhua Shao
2020/343 (PDF ) BSC: A Bitcoin Smart Contract Implementation Hiro Midas
2020/342 (PDF ) Security Assessment of White-Box Design Submissions of the CHES 2017 CTF Challenge Estuardo Alpirez Bock, Alexander Treff
2020/341 (PDF ) Faster computation of isogenies of large prime degree Daniel J. Bernstein, Luca De Feo, Antonin Leroux, Benjamin Smith
2020/340 (PDF ) Differential Privacy for Eye Tracking with Temporal Correlations Efe Bozkir, Onur Gunlu, Wolfgang Fuhl, Rafael F. Schaefer, Enkelejda Kasneci
2020/339 (PDF ) Cracking Matrix Modes of Operation with Goodness-of-Fit Statistics George Teseleanu
2020/338 (PDF ) Improved Primitives for MPC over Mixed Arithmetic-Binary Circuits Daniel Escudero, Satrajit Ghosh, Marcel Keller, Rahul Rachuri, Peter Scholl
2020/337 (PDF ) Improved Discrete Gaussian and Subgaussian Analysis for Lattice Cryptography Nicholas Genise, Daniele Micciancio, Chris Peikert, Michael Walter
2020/336 (PDF ) Gimli Encryption in 715.9 psec Santosh Ghosh, Michael Kounavis, Sergej Deutsch
2020/335 (PDF ) An n/2 byzantine node tolerated blockchain sharding approach Yibin Xu, Yangyu Huang
2020/334 (PDF ) 4-Uniform Permutations with Null Nonlinearity Christof Beierle, Gregor Leander
2020/332 (PDF ) Implementation Study of Two Verifiable Delay Functions Vidal Attias, Luigi Vigneri, Vassil Dimitrov
2020/331 (PDF ) The CTR mode with encrypted nonces and its extension to AE Sergey Agievich
2020/330 (PDF ) Hardness vs. (Very Little) Structure in Cryptography: A Multi-Prover Interactive Proofs Perspective Gil Segev, Ido Shahaf
2020/329 (PDF ) Asymptotic complexities of discrete logarithm algorithms in pairing-relevant finite fields Gabrielle De Micheli, Pierrick Gaudry, Cécile Pierrot
2020/328 (PDF ) Weight-Based Nakamoto-Style Blockchains Simon Holmgaard Kamp, Bernardo Magri, Christian Matt, Jesper Buus Nielsen, Søren Eller Thomsen, Daniel Tschudi
2020/327 (PDF ) On the design of stream ciphers with Cellular Automata having radius = 2 Anita John, Rohit Lakra, Jimmy Jose
2020/326 (PDF ) An upper bound on the decryption failure rate of static-key NewHope John M. Schanck
2020/325 (PDF ) SmartDHX: Diffie-Hellman Key Exchange with Smart Contracts Robert Muth, Florian Tschorsch
2020/324 (PDF ) Defeating CAS-Unlock Bicky Shakya, Xiaolin Xu, Mark Tehranipoor, Domenic Forte
2020/323 (PDF ) A Flexible n/2 Adversary Node Resistant and Halting Recoverable Blockchain Sharding Protocol Yibin Xu, Yangyu Huang, Jianhua Shao, George Theodorakopoulos
2020/322 (PDF ) Optimal and Error-Free Multi-Valued Byzantine Consensus Through Parallel Execution Andrew Loveless, Ronald Dreslinski, Baris Kasikci
2020/321 (PDF ) Compact domain-specific co-processor for accelerating module lattice-based key encapsulation mechanism Jose Maria Bermudo Mera, Furkan Turan, Angshuman Karmakar, Sujoy Sinha Roy, Ingrid Verbauwhede
2020/320 (PDF ) Universally Composable Relaxed Password Authenticated Key Exchange Michel Abdalla, Manuel Barbosa, Tatiana Bradley, Stanislaw Jarecki, Jonathan Katz, Jiayu Xu
2020/319 (PDF ) Secure k-ish nearest neighbors classifier Hayim Shaul, Dan Feldman, Daniela Rus
2020/318 (PDF ) Compact Adaptively Secure ABE from k-Lin: Beyond NC1 and towards NL Huijia Lin, Ji Luo
2020/317 (PDF ) Physical Time-Varying Transfer Functions as Generic Low-Overhead Power-SCA Countermeasure Archisman Ghosh, Debayan Das, Shreyas Sen
2020/316 (PDF ) Beyond Software Watermarking: Traitor-Tracing for Pseudorandom Functions Rishab Goyal, Sam Kim, Brent Waters, David J. Wu
2020/315 (PDF ) plookup: A simplified polynomial protocol for lookup tables Ariel Gabizon, Zachary J. Williamson
2020/314 (PDF ) Proposal of Multivariate Public Key Cryptosystem Based on Modulus of Numerous Prime Numbers and CRT with Security of IND-CPA Shigeo Tsujii, Ryo Fujita, Masahito Gotaishi
2020/313 (PDF ) Security analysis of SPAKE2+ Victor Shoup
2020/311 (PDF ) A Blockchain Traceable Scheme with Oversight Function Tianjun Ma, Haixia Xu, Peili Li
2020/310 (PDF ) Wavelet Scattering Transform and Ensemble Methods for Side-Channel Analysis Gabriel Destouet, Cécile Dumas, Anne Frassati, Valérie Perrier
2020/309 (PDF ) Cryptanalysis Results on Spook Patrick Derbez, Paul Huynh, Virginie Lallemand, María Naya-Plasencia, Léo Perrin, André Schrottenloher
2020/308 (PDF ) Post-Quantum TLS on Embedded Systems Kevin Bürstinghaus-Steinbach, Christoph Krauß, Ruben Niederhagen, Michael Schneider
2020/307 (PDF ) Handling vectorial functions by means of their graph indicators Claude Carlet
2020/306 (PDF ) Leakage Assessment in Fault Attacks: A Deep Learning Perspective Sayandeep Saha, Manaar Alam, Arnab Bag, Debdeep Mukhopadhyay, Pallab Dasgupta
2020/305 (PDF ) 3-Layer Public Key Cryptosystem with Short Tandem Repeat DNA Shigeo Tsujii, Toshiaki Saisho, Masao Yamasawa, Masahito Gotaishi, Kou Shikata, Koji Sasaki, Nobuharu Suzuki, Masaki Hashiyada
2020/304 (PDF ) Multiparty Homomorphic Encryption from Ring-Learning-With-Errors Christian Mouchet, Juan Troncoso-Pastoriza, Jean-Philippe Bossuat, Jean-Pierre Hubaux
2020/303 (PDF ) A Quantitative Analysis of Security, Anonymity and Scalability for the Lightning Network Sergei Tikhomirov, Pedro Moreno-Sanchez, Matteo Maffei
2020/302 (PDF ) Slippery hill-climbing technique for ciphertext-only cryptanalysis of periodic polyalphabetic substitution ciphers Thomas Kaeding
2020/301 (PDF ) MadHatter: A toy cipher that conceals two plaintexts in the same ciphertext Thomas Kaeding
2020/300 (PDF ) Secure Multiparty Computation (MPC) Yehuda Lindell
2020/299 (PDF ) Hydra: Fast Isomorphic State Channels Manuel M. T. Chakravarty, Sandro Coretti, Matthias Fitzi, Peter Gazi, Philipp Kant, Aggelos Kiayias, Alexander Russell
2020/298 (PDF ) Fast polynomial inversion for post quantum QC-MDPC cryptography Nir Drucker, Shay Gueron, Dusan Kostic
2020/297 (PDF ) Random Self-reducibility of Ideal-SVP via Arakelov Random Walks Koen de Boer, Léo Ducas, Alice Pellet-Mary, Benjamin Wesolowski
2020/296 (PDF ) Multidimensional Database Reconstruction from Range Query Access Patterns Akshima, David Cash, Francesca Falzon, Adam Rivkin, Jesse Stern
2020/295 (PDF ) Generalized Isotopic Shift Construction for APN Functions Lilya Budaghyan, Marco Calderini, Claude Carlet, Robert Coulter, Irene Villa
2020/294 (PDF ) Public-Key Generation with Verifiable Randomness Olivier Blazy, Patrick Towa, Damien Vergnaud
2020/293 (PDF ) Many-out-of-Many Proofs and Applications to Anonymous Zether Benjamin E. Diamond
2020/292 (PDF ) LWE with Side Information: Attacks and Concrete Security Estimation Dana Dachman-Soled, Léo Ducas, Huijing Gong, Mélissa Rossi
2020/290 (PDF ) Linear Cryptanalysis of Reduced-Round SIMON Using Super Rounds Reham Almukhlifi, Poorvi Vora
2020/289 (PDF ) The security of Groups of Unknown Order based on Jacobians of Hyperelliptic Curves Jonathan Lee
2020/288 (PDF ) Secure Key-Alternating Feistel Ciphers Without Key Schedule Yaobin Shen, Hailun Yan, Lei Wang, Xuejia Lai
2020/287 (PDF ) Private resource allocators and their applications Sebastian Angel, Sampath Kannan, Zachary Ratliff
2020/286 (PDF ) Shorter Non-Interactive Zero-Knowledge Arguments and ZAPs for Algebraic Languages Geoffroy Couteau, Dominik Hartmann
2020/285 (PDF ) Improved Security Bounds for Generalized Feistel Networks Yaobin Shen, Chun Guo, Lei Wang
2020/284 (PDF ) Database Reconstruction Attacks in Two Dimensions Evangelia Anna Markatou, Roberto Tamassia
2020/283 (PDF ) CryptoWills: How to Bequeath Cryptoassets István András Seres, Omer Shlomovits, Pratyush Ranjan Tiwari
2020/282 (PDF ) The Measure-and-Reprogram Technique 2.0: Multi-Round Fiat-Shamir and More Jelle Don, Serge Fehr, Christian Majenz
2020/281 (PDF ) Privacy-friendly Monero transaction signing on a hardware wallet, extended version Dusan Klinec Vashek Matyas
2020/280 (PDF ) Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions Juliane Krämer, Patrick Struck
2020/279 (PDF ) Impact of System-on-Chip Integration of AEAD Ciphers Shashank Raghuraman, Leyla Nazhandali
2020/278 (PDF ) MIRAGE: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKs Ahmed Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Dawn Song
2020/277 (PDF ) How Does Nakamoto Set His Clock? Full Analysis of Nakamoto Consensus in Bounded-Delay Networks Juan A. Garay, Aggelos Kiayias, Nikos Leonardos
2020/276 (PDF ) CryptoPIM: In-memory Acceleration for Lattice-based Cryptographic Hardware Hamid Nejatollahi, Saransh Gupta, Mohsen Imani, Tajana Simunic Rosing, Rosario Cammarota, Nikil Dutt
2020/275 (PDF ) Pholkos -- Efficient Large-state Tweakable Block Ciphers from the AES Round Function Jannis Bossert, Eik List, Stefan Lucks, Sebastian Schmitz
2020/274 (PDF ) An Optimal Relational Database Encryption Scheme Seny Kamara, Tarik Moataz, Stan Zdonik, Zheguang Zhao
2020/273 (PDF ) On the Fast Algebraic Immunity of Threshold Functions Pierrick Méaux
2020/272 (PDF ) Privacy-Preserving Fast and Exact Linear Equations Solver with Fully Homomorphic Encryption Keita Arimitsu, Kazuki Otsuka
2020/271 (PDF ) Signatures from Sequential-OR Proofs Marc Fischlin, Patrick Harasser, Christian Janson
2020/270 (PDF ) Practical Predicate Encryption for Inner Product Yi-Fan Tseng, Zi-Yuan Liu, Raylin Tso
2020/269 (PDF ) Order-Fairness for Byzantine Consensus Mahimna Kelkar, Fan Zhang, Steven Goldfeder, Ari Juels
2020/268 (PDF ) Time-memory trade-off in Toom-Cook multiplication: an application to module-lattice based cryptography Jose Maria Bermudo Mera, Angshuman Karmakar, Ingrid Verbauwhede
2020/267 (PDF ) Differential Power Analysis of the Picnic Signature Scheme Tim Gellersen, Okan Seker, Thomas Eisenbarth
2020/266 (PDF ) Quantum Indistinguishability for Public Key Encryption Tommaso Gagliardoni, Juliane Krämer, Patrick Struck
2020/265 (PDF ) New Constructions of Statistical NIZKs: Dual-Mode DV-NIZKs and More Benoît Libert, Alain Passelègue, Hoeteck Wee, David J. Wu
2020/264 (PDF ) Plaintext Recovery Attacks against Linearly Decryptable Fully Homomorphic Encryption Schemes Nicholas Mainardi, Alessandro Barenghi, Gerardo Pelosi
2020/263 (PDF ) FPL: White-Box Secure Block Cipher Using Parallel Table Look-Ups Jihoon Kwon, Byeonghak Lee, Jooyoung Lee, Dukjae Moon
2020/262 (PDF ) A Note on the Ending Elliptic Curve in SIDH Christopher Leonardi
2020/261 (PDF ) Foxtail+: A Learning with Errors-based Authentication Protocol for Resource-Constrained Devices Matthieu Monteiro, Kumara Kahatapitiya, Hassan Jameel Asghar, Kanchana Thilakarathna, Thierry Rakotoarivelo, Dali Kaafar, Shujun Li, Ron Steinfeld, Josef Pieprzyk
2020/260 (PDF ) Lattice-based (Partially) Blind Signature without Restart Samuel Bouaziz-Ermann, Sébastien Canard, Gautier Eberhart, Guillaume Kaim, Adeline Roux-Langlois, Jacques Traoré
2020/259 (PDF ) Computational and Information-Theoretic Two-Source (Non-Malleable) Extractors Divesh Aggarwal, Maciej Obremski, João Ribeiro, Mark Simkin, Luisa Siniscalchi
2020/258 (PDF ) NIZK from LPN and Trapdoor Hash via Correlation Intractability for Approximable Relations Zvika Brakerski, Venkata Koppula, Tamer Mour
2020/257 (PDF ) Biometric and Physical Identifiers with Correlated Noise for Controllable Private Authentication Onur Gunlu, Rafael F. Schaefer, H. Vincent Poor
2020/256 (PDF ) Statistical ZAPR Arguments from Bilinear Maps Alex Lombardi, Vinod Vaikuntanathan, Daniel Wichs
2020/255 (PDF ) Novel Deception Techniques for Malware Detection on Industrial Control Systems Takanori Machida, Dai Yamamoto, Yuki Unno, Hisashi Kojima
2020/254 (PDF ) Formalizing Data Deletion in the Context of the Right to be Forgotten Sanjam Garg, Shafi Goldwasser, Prashant Nalini Vasudevan
2020/253 (PDF ) Black-box use of One-way Functions is Useless for Optimal Fair Coin-Tossing Hemanta K. Maji, Mingyuan Wang
2020/252 (PDF ) Secure Non-interactive Simulation: Feasibility & Rate Hamidreza Amini Khorasgani, Hemanta K. Maji, Hai H. Nguyen
2020/251 (PDF ) Communication Lower Bounds for Perfect Maliciously Secure MPC Ivan Damgård, Nikolaj I. Schwartzbach
2020/250 (PDF ) On a Side Channel and Fault Attack Concurrent Countermeasure Methodology for MCU-based Byte-sliced Cipher Implementations Ehsan Aerabi, Athanasios Papadimitriou, David Hely
2020/248 (PDF ) Blinder: MPC Based Scalable and Robust Anonymous Committed Broadcast Ittai Abraham, Benny Pinkas, Avishay Yanai
2020/246 (PDF ) Ultra-Fast Modular Multiplication Implementation for Isogeny-Based Post-Quantum Cryptography Jing Tian, Jun Lin, Zhongfeng Wang
2020/245 (PDF ) New Assumptions and Efficient Cryptosystems from the $e$-th Power Residue Symbol Xiaopeng Zhao, Zhenfu Cao, Xiaolei Dong, Jun Shao, Licheng Wang, Zhusen Liu
2020/244 (PDF ) On Adaptive Attacks against Jao-Urbanik’s Isogeny-Based Protocol Andrea Basso, Péter Kutas, Simon-Philipp Merz, Christophe Petit, Charlotte Weitkämper
2020/243 (PDF ) An Analysis of Hybrid Public Key Encryption Benjamin Lipp
2020/241 (PDF ) Separate Your Domains: NIST PQC KEMs, Oracle Cloning and Read-Only Indifferentiability Mihir Bellare, Hannah Davis, Felix Günther
2020/240 (PDF ) MPC for MPC: Secure Computation on a Massively Parallel Computing Architecture T-H. Hubert Chan, Kai-Min Chung, Wei-Kai Lin, Elaine Shi
2020/239 (PDF ) Viktoria: A new Paradigm for Hash Functions Edimar Veríssimo
2020/238 (PDF ) Efficient ECM factorization in parallel with the Lyness map Andrew Hone
2020/237 (PDF ) On Security Notions for Encryption in a Quantum World Céline Chevalier, Ehsan Ebrahimi, Quoc-Huy Vu
2020/236 (PDF ) Mind the Composition: Birthday Bound Attacks on EWCDMD and SoKAC21 Mridul Nandi
2020/235 (PDF ) Statistical Zaps and New Oblivious Transfer Protocols Vipul Goyal, Abhishek Jain, Zhengzhong Jin, Giulio Malavolta
2020/234 (PDF ) Application of commutator subgroups of Sylow 2-subgroups of alternating group and Miller-Moreno groups to Key Exchange Protocol Ruslan V. Skuratovskii, Aled Williams
2020/233 (PDF ) Key-Homomorphic Pseudorandom Functions from LWE with a Small Modulus Sam Kim
2020/232 (PDF ) Combiners for AEAD Bertram Poettering, Paul Rösler
2020/231 (PDF ) Unbounded Dynamic Predicate Compositions in ABE from Standard Assumptions Nuttapong Attrapadung, Junichi Tomida
2020/230 (PDF ) Lattice analysis on MiNTRU problem Changmin Lee, Alexandre Wallet
2020/229 (PDF ) Tight Time-Space Lower Bounds for Finding Multiple Collision Pairs and Their Applications Itai Dinur
2020/228 (PDF ) Optimal Broadcast Encryption from Pairings and LWE Shweta Agrawal, Shota Yamada
2020/227 (PDF ) About the Tu-Deng Conjecture for $\w(t)$ Less Than or Equal to 10 Yindong Chen, Limin Lin, Chuliang Wei
2020/226 (PDF ) Multivariate Polynomial and Exponential Mappings based Password Authentication Protocol Meher Krishna Duggirala, Ravi Duggirala, Krishna Subba Rao Pulugurtha
2020/225 (PDF ) Generic-Group Delay Functions Require Hidden-Order Groups Lior Rotem, Gil Segev, Ido Shahaf
2020/224 (PDF ) Security under Message-Derived Keys: Signcryption in iMessage Mihir Bellare, Igors Stepanovs
2020/223 (PDF ) Compact NIZKs from Standard Assumptions on Bilinear Maps Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
2020/222 (PDF ) Improving Speed and Security in Updatable Encryption Schemes Dan Boneh, Saba Eskandarian, Sam Kim, Maurice Shih
2020/221 (PDF ) Multiparty Reusable Non-Interactive Secure Computation Fabrice Benhamouda, Huijia Lin
2020/220 (PDF ) Remote Side-Channel Attacks on Anonymous Transactions Florian Tramèr, Dan Boneh, Kenneth G. Paterson
2020/219 (PDF ) Multi-Client Functional Encryption for Separable Functions Michele Ciampi, Luisa Siniscalchi, Hendrik Waldner
2020/218 (PDF ) Design Space Exploration for Ultra-Low Energy and Secure IoT MCUs Ehsan Aerabi, Milad Bohlouli, MohammadHasan Ahmadi Livany, Mahdi Fazeli, Athanasios Papadimitriou, David Hely
2020/217 (PDF ) SynFi: Automatic Synthetic Fingerprint Generation M. Sadegh Riazi, Seyed M. Chavoshian, Farinaz Koushanfar
2020/216 (PDF ) Black-Box Constructions of Bounded-Concurrent Secure Computation Sanjam Garg, Xiao Liang, Omkant Pandey, Ivan Visconti
2020/215 (PDF ) Cryptographic Shallots: A Formal Treatment of Repliable Onion Encryption Megumi Ando, Anna Lysyanskaya
2020/214 (PDF ) Thresholdizing HashEdDSA: MPC to the Rescue Charlotte Bonte, Nigel P. Smart, Titouan Tanguy
2020/213 (PDF ) Finding Hash Collisions with Quantum Computers by Using Differential Trails with Smaller Probability than Birthday Bound Akinori Hosoyamada, Yu Sasaki
2020/212 (PDF ) Isogenies of certain abelian varieties over finite fields with p-ranks zero Steve Thakur
2020/211 (PDF ) Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography: A Practical Guide Through the Leakage-Resistance Jungle Davide Bellizia, Olivier Bronchain, Gaëtan Cassiers, Vincent Grosso, Chun Guo, Charles Momin, Olivier Pereira, Thomas Peters, François-Xavier Standaert
2020/210 (PDF ) SITM: See-In-The-Middle--Side-Channel Assisted Middle Round Differential Cryptanalysis on SPN Block Ciphers Shivam Bhasin, Jakub Breier, Xiaolu Hou, Dirmanto Jap, Romain Poussier, Siang Meng Sim
2020/209 (PDF ) Adaptive Simulation Security for Inner Product Functional Encryption Shweta Agrawal, Benoît Libert, Monosij Maitra, Radu Titiu
2020/208 (PDF ) Random Integer Lattice Generation via HNF Gengran Hu, Lin You, Liqin Hu, Hui Wang
2020/207 (PDF ) (Public) Verifiability For Composable Protocols Without Adaptivity Or Zero-Knowledge Carsten Baum, Bernardo David, Rafael Dowsley
2020/205 (PDF ) SodsBC: A Post-quantum by Design Asynchronous Blockchain Framework Shlomi Dolev, Bingyong Guo, Jianyu Niu, Ziyu Wang
2020/204 (PDF ) Cryptographic Reverse Firewalls for Interactive Proof Systems Chaya Ganesh, Bernardo Magri, Daniele Venturi
2020/203 (PDF ) MACAO: A Maliciously-Secure and Client-Efficient Active ORAM Framework Thang Hoang, Jorge Guajardo, Attila A. Yavuz
2020/202 (PDF ) Strong Anti-SAT: Secure and Effective Logic Locking Yuntao Liu, Michael Zuzak, Yang Xie, Abhishek Chakraborty, Ankur Srivastava
2020/201 (PDF ) A Survey on Neural Trojans Yuntao Liu, Ankit Mondal, Abhishek Chakraborty, Michael Zuzak, Nina Jacobsen, Daniel Xing, Ankur Srivastava
2020/200 (PDF ) Leakage and Tamper Resilient Permutation-Based Cryptography Christoph Dobraunig, Bart Mennink, Robert Primas
2020/199 (PDF ) Improvement on a Masked White-box Cryptographic Implementation Seungkwang Lee, Myungchul Kim
2020/198 (PDF ) MPSign: A Signature from Small-Secret Middle-Product Learning with Errors Shi Bai, Dipayan Das, Ryo Hiromasa, Miruna Rosca, Amin Sakzad, Damien Stehlé, Ron Steinfeld, Zhenfei Zhang
2020/197 (PDF ) Dynamic Decentralized Functional Encryption Jérémy Chotard, Edouard Dufour-Sans, Romain Gay, Duong Hieu Phan, David Pointcheval
2020/196 (PDF ) Trustless unknown-order groups Samuel Dobson, Steven D. Galbraith, Benjamin Smith
2020/195 (PDF ) Replicated state machines without replicated execution Jonathan Lee, Kirill Nikitin, Srinath Setty
2020/194 (PDF ) Adaptively Secure ABE for DFA from k-Lin and More Junqing Gong, Hoeteck Wee
2020/193 (PDF ) PSI from PaXoS: Fast, Malicious Private Set Intersection Benny Pinkas, Mike Rosulek, Ni Trieu, Avishay Yanai
2020/191 (PDF ) Lattice-Inspired Broadcast Encryption and Succinct Ciphertext-Policy ABE Zvika Brakerski, Vinod Vaikuntanathan
2020/190 (PDF ) Proof of Necessary Work: Succinct State Verification with Fairness Guarantees Assimakis Kattis, Joseph Bonneau
2020/189 (PDF ) Guaranteed Output Delivery Comes Free in Honest Majority MPC Vipul Goyal, Yifan Song, Chenzhi Zhu
2020/188 (PDF ) Out of Oddity -- New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems Tim Beyne, Anne Canteaut, Itai Dinur, Maria Eichlseder, Gregor Leander, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, Yu Sasaki, Yosuke Todo, Friedrich Wiemer
2020/187 (PDF ) Committing to Quantum Resistance, Better: A Speed–and–Risk–Configurable Defence for Bitcoin against a Fast Quantum Computing Attack Dragos Ioan Ilie, William J. Knottenbelt, Iain Stewart
2020/186 (PDF ) Bitcoin Crypto–Bounties for Quantum Capable Adversaries Dragos Ioan Ilie, Kostis Karantias, William J. Knottenbelt
2020/185 (PDF ) Hardware Private Circuits: From Trivial Composition to Full Verification Gaëtan Cassiers, Benjamin Grégoire, Itamar Levi, François-Xavier Standaert
2020/184 (PDF ) Fair and Decentralized Exchange of Digital Goods Ariel Futoransky, Carlos Sarraute, Daniel Fernandez, Matias Travizano, Ariel Waissbein
2020/183 (PDF ) A note on secure multiparty computation via higher residue symbols Ignacio Cascudo, Reto Schnyder
2020/182 (PDF ) An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC Maria Eichlseder, Lorenzo Grassi, Reinhard Lüftenegger, Morten Øygarden, Christian Rechberger, Markus Schofnegger, Qingju Wang
2020/181 (PDF ) $L_1$-Norm Ball for CSIDH: Optimal Strategy for Choosing the Secret Key Space Kohei Nakagawa, Hiroshi Onuki, Atsushi Takayasu, Tsuyoshi Takagi
2020/180 (PDF ) Multi-key Fully-Homomorphic Encryption in the Plain Model Prabhanjan Ananth, Abhishek Jain, ZhengZhong Jin, Giulio Malavolta
2020/179 (PDF ) Mind the Middle Layer: The HADES Design Strategy Revisited Nathan Keller, Asaf Rosemarin
2020/178 (PDF ) A >100 Gbps Inline AES-GCM Hardware Engine and Protected DMA Transfers between SGX Enclave and FPGA Accelerator Device Santosh Ghosh, Luis S Kida, Soham Jayesh Desai, Reshma Lal
2020/177 (PDF ) Revisiting (R)CCA Security and Replay Protection Christian Badertscher, Ueli Maurer, Christopher Portmann, Guilherme Rito
2020/176 (PDF ) Do not tell me what I cannot do! (The constrained device shouted under the cover of the fog): Implementing Symmetric Searchable Encryption on Constrained Devices (Extended Version) Eugene Frimpong, Alexandros Bakas, Hai-Van Dang, Antonis Michalas
2020/175 (PDF ) Lower Bounds for Off-Chain Protocols: Exploring the Limits of Plasma Stefan Dziembowski, Grzegorz Fabiański, Sebastian Faust, Siavash Riahi
2020/174 (PDF ) On Selective-Opening Security of Deterministic Primitives Mohammad Zaheri, Adam O'Neill
2020/173 (PDF ) Securing Proof-of-Work Ledgers via Checkpointing Dimitris Karakostas, Aggelos Kiayias
2020/172 (PDF ) Qubit-based Unclonable Encryption with Key Recycling Daan Leermakers, Boris Skoric
2020/171 (PDF ) High Performance Logistic Regression for Privacy-Preserving Genome Analysis Martine De Cock, Rafael Dowsley, Anderson C. A. Nascimento, Davis Railsback, Jianwei Shen, Ariel Todoki
2020/170 (PDF ) Reusable Two-Round MPC from DDH James Bartusek, Sanjam Garg, Daniel Masny, Pratyay Mukherjee
2020/169 (PDF ) Multiparty Homomorphic Encryption (or: On Removing Setup in Multi-Key FHE) Prabhanjan Ananth, Abhishek Jain, Zhengzhong Jin
2020/168 (PDF ) Improved Classical and Quantum Algorithms for Subset-Sum Xavier Bonnetain, Rémi Bricout, André Schrottenloher, Yixin Shen
2020/167 (PDF ) Turbo-Aggregate: Breaking the Quadratic Aggregation Barrier in Secure Federated Learning Jinhyun So, Basak Guler, A. Salman Avestimehr
2020/166 (PDF ) Non Atomic Payment Splitting in Channel Networks Stefan Dziembowski, Paweł Kędzior
2020/165 (PDF ) Subsampling and Knowledge Distillation On Adversarial Examples: New Techniques for Deep Learning Based Side Channel Evaluations Aron Gohr, Sven Jacob, Werner Schindler
2020/164 (PDF ) From discrete-log to lattices: maybe the real lessons were our broken schemes along the way? Alex Bienstock, Allison Bishop, Eli Goldin, Garrison Grogan, Victor Lecomte
2020/163 (PDF ) Impossibility Results for Lattice-Based Functional Encryption Schemes Akin Ünal
2020/162 (PDF ) A Secret-Sharing Based MPC Protocol for Boolean Circuits with Good Amortized Complexity Ignacio Cascudo, Jaron Skovsted Gundersen
2020/161 (PDF ) Pushing the Limits of Valiant's Universal Circuits: Simpler, Tighter and More Compact Hanlin Liu, Yu Yu, Shuoyao Zhao, Jiang Zhang, Wenling Liu, Zhenkai Hu
2020/160 (PDF ) Solving Some Affine Equations over Finite Fields Sihem Mesnager, Kwang Ho Kim, Jong Hyok Choe, Dok Nam Lee
2020/159 (PDF ) Privacy-preserving collaborative machine learning on genomic data using TensorFlow Cheng Hong, Zhicong Huang, Wen-jie Lu, Hunter Qu, Li Ma, Morten Dahl, Jason Mancuso
2020/158 (PDF ) Jump index in T-functions for designing a new basic structure of stream ciphers Ali Hadipour, Seyed Mahdi Sajadieh, Raheleh Afifi
2020/157 (PDF ) Multi-Source Non-Malleable Extractors and Applications Vipul Goyal, Akshayaram Srinivasan, Chenzhi Zhu
2020/156 (PDF ) Phantom: An Efficient Privacy Protocol Using zk-SNARKs Based on Smart Contracts Xing Li, Yi Zheng, Kunxian Xia, Tongcheng Sun, John Beyler
2020/155 (PDF ) Low Latency Privacy-preserving Outsourcing of Deep Neural Network Inference Yifan Tian, Laurent Njilla, Jiawei Yuan, Shucheng Yu
2020/154 (PDF ) Combiners for Functional Encryption, Unconditionally Aayush Jain, Nathan Manohar, Amit Sahai
2020/153 (PDF ) Constructing Secure Multi-Party Computation with Identifiable Abort Nicholas-Philip Brandt, Sven Maier, Tobias Müller, Jörn Müller-Quade
2020/152 (PDF ) Compressed $\Sigma$-Protocol Theory and Practical Application to Plug & Play Secure Algorithmics Thomas Attema, Ronald Cramer
2020/151 (PDF ) Breaking the decisional Diffie-Hellman problem for class group actions using genus theory -- extended version Wouter Castryck, Jana Sotáková, Frederik Vercauteren
2020/150 (PDF ) On the Security of NTS-KEM in the Quantum Random Oracle Model Varun Maram
2020/149 (PDF ) Incrementally Aggregatable Vector Commitments and Applications to Verifiable Decentralized Storage Matteo Campanelli, Dario Fiore, Nicola Greco, Dimitris Kolonelos, Luca Nizzardo
2020/148 (PDF ) Determining the Core Primitive for Optimally Secure Ratcheting Fatih Balli, Paul Rösler, Serge Vaudenay
2020/147 (PDF ) Non-Malleability against Polynomial Tampering Marshall Ball, Eshan Chattopadhyay, Jyun-Jie Liao, Tal Malkin, Li-Yang Tan
2020/146 (PDF ) Hierarchical Identity-Based Encryption with Tight Multi-Challenge Security Roman Langrehr, Jiaxin Pan
2020/145 (PDF ) Self-Secured PUF: Protecting the Loop PUF by Masking Lars Tebelmann, Jean-Luc Danger, Michael Pehl
2020/144 (PDF ) Double-Base Chains for Scalar Multiplications on Elliptic Curves Wei Yu, Saud Al Musa, Bao Li
2020/143 (PDF ) Impersonation Attacks on Lightweight Anonymous Authenticated Key Exchange Scheme for IoT Hailong Yao, Caifen Wang, Xingbing Fu, Chao Liu, Bin Wu, Fagen Li
2020/142 (PDF ) TARDIGRADE: An Atomic Broadcast Protocol for Arbitrary Network Conditions Erica Blum, Jonathan Katz, Julian Loss
2020/141 (PDF ) Deterministic-Prover Zero-Knowledge Proofs Hila Dahari, Yehuda Lindell
2020/140 (PDF ) PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model Shaoquan Jiang, Guang Gong, Jingnan He, Khoa Nguyen, Huaxiong Wang
2020/139 (PDF ) Going Beyond Dual Execution: MPC for Functions with Efficient Verification Carmit Hazay, abhi shelat, Muthuramakrishnan Venkitasubramaniam
2020/138 (PDF ) Smart Contract Derivatives Kostis Karantias, Aggelos Kiayias, Dionysis Zindros
2020/137 (PDF ) Consistency for Functional Encryption Christian Badertscher, Aggelos Kiayias, Markulf Kohlweiss, Hendrik Waldner
2020/136 (PDF ) Stacked Garbling for Disjunctive Zero-Knowledge Proofs David Heath, Vladimir Kolesnikov
2020/135 (PDF ) Threshold Ring Signatures: New Definitions and Post-Quantum Security Abida Haque, Alessandra Scafuro
2020/134 (PDF ) Malicious Security Comes Free in Honest-Majority MPC Vipul Goyal, Yifan Song
2020/133 (PDF ) Efficient and Fair Multiparty Protocols using Blockchain and Trusted Hardware Souradyuti Paul, Ananya Shrivastava
2020/132 (PDF ) Boosting Verifiable Computation on Encrypted Data Dario Fiore, Anca Nitulescu, David Pointcheval
2020/131 (PDF ) Coin Tossing with Lazy Defense: Hardness of Computation Results Hamidreza Amini Khorasgani, Hemanta K. Maji, Mingyuan Wang
2020/130 (PDF ) Breaking the $O(\sqrt n)$-Bit Barrier: Byzantine Agreement with Polylog Bits Per Party Elette Boyle, Ran Cohen, Aarushi Goel
2020/129 (PDF ) Encryption Schemes using Random Oracles: from Classical to Post-Quantum Security Juliane Krämer, Patrick Struck
2020/128 (PDF ) LegRoast: Efficient post-quantum signatures from the Legendre PRF Ward Beullens, Cyprien Delpech de Saint Guilhem
2020/127 (PDF ) Fifty Shades of Ballot Privacy: Privacy against a Malicious Board Véronique Cortier, Joseph Lallemand, Bogdan Warinschi
2020/126 (PDF ) Public-Key Puncturable Encryption: Modular and Compact Constructions Shi-Feng Sun, Amin Sakzad, Ron Steinfeld, Joseph Liu, Dawu Gu
2020/125 (PDF ) Oblivious Parallel Tight Compaction Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Enoch Peserico, Elaine Shi
2020/124 (PDF ) Lossy CSI-FiSh: Efficient Signature Scheme with Tight Reduction to Decisional CSIDH-512 Ali El Kaafarani, Shuichi Katsumata, Federico Pintore
2020/123 (PDF ) Zendoo: a zk-SNARK Verifiable Cross-Chain Transfer Protocol Enabling Decoupled and Decentralized Sidechains Alberto Garoffolo, Dmytro Kaidalov, Roman Oliynykov
2020/122 (PDF ) Verifiable Inner Product Encryption Scheme Najmeh Soroush, Vincenzo Iovino, Alfredo Rial, Peter B. Roenne, Peter Y. A. Ryan
2020/121 (PDF ) When HEAAN Meets FV: a New Somewhat Homomorphic Encryption with Reduced Memory Overhead Hao Chen, Ilia Iliashenko, Kim Laine
2020/120 (PDF ) The randomized slicer for CVPP: sharper, faster, smaller, batchier Léo Ducas, Thijs Laarhoven, Wessel P. J. van Woerden
2020/119 (PDF ) Hardness of LWE on General Entropic Distributions Zvika Brakerski, Nico Döttling
2020/118 (PDF ) InfoCommit: Information-Theoretic Polynomial Commitment and Verification Saeid Sahraei, Salman Avestimehr
2020/117 (PDF ) Efficient BIKE Hardware Design with Constant-Time Decoder Andrew Reinders, Rafael Misoczki, Santosh Ghosh, Manoj Sastry
2020/116 (PDF ) Separating Two-Round Secure Computation from Oblivious Transfer Benny Applebaum, Zvika Brakerski, Sanjam Garg, Yuval Ishai, Akshayaram Srinivasan
2020/115 (PDF ) A Verifiable and Practical Lattice-Based Decryption Mix Net with External Auditing Xavier Boyen, Thomas Haines, Johannes Mueller
2020/114 (PDF ) A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer Antoine Delignat-Lavaud, Cédric Fournet, Bryan Parno, Jonathan Protzenko, Tahina Ramananandro, Jay Bosamiya, Joseph Lallemand, Itsaka Rakotonirina, Yi Zhou
2020/113 (PDF ) New Discrete Logarithm Computation for the Medium Prime Case Using the Function Field Sieve Madhurima Mukhopadhyay, Palash Sarkar, Shashank Singh, Emmanuel Thome
2020/112 (PDF ) A Detailed Report on the Overhead of Hardware APIs for Lightweight Cryptography Patrick Karl, Michael Tempelmeier
2020/111 (PDF ) Adaptively Secure Constrained Pseudorandom Functions in the Standard Model Alex Davidson, Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
2020/110 (PDF ) Blazing Fast OT for Three-Round UC OT Extension Ran Canetti, Pratik Sarkar, Xiao Wang
2020/109 (PDF ) Fixing the Achilles Heel of E-Voting: The Bulletin Board Lucca Hirschi, Lara Schmid, David Basin
2020/108 (PDF ) Practical Forgeries for ORANGE Christoph Dobraunig, Florian Mendel, Bart Mennink
2020/107 (PDF ) One-shot Signatures and Applications to Hybrid Quantum/Classical Authentication Ryan Amos, Marios Georgiou, Aggelos Kiayias, Mark Zhandry
2020/106 (PDF ) Relaxed freshness in component authentication Frank Schuhmacher
2020/105 (PDF ) MCU intrinsic group features for component authentication Frank Schuhmacher
2020/104 (PDF ) On the Security Goals of White-Box Cryptography Estuardo Alpirez Bock, Alessandro Amadori, Chris Brzuska, Wil Michiels
2020/103 (PDF ) Improved Related-Tweakey Rectangle Attacks on Reduced-round Deoxys-BC-384 and Deoxys-I-256-128 Boxin Zhao, Xiaoyang Dong, Keting Jia, Willi Meier
2020/102 (PDF ) New Related-Tweakey Boomerang and Rectangle Attacks on Deoxys-BC Including BDT Effect Boxin Zhao, Xiaoyang Dong, Keting Jia
2020/101 (PDF ) A Survey of Subscription Privacy on the 5G Radio Interface - The Past, Present and Future Haibat Khan, Keith M. Martin
2020/100 (PDF ) A direct proof of APN-ness of the Kasami functions Claude Carlet, Kwang Ho Kim, Sihem Mesnager
2020/099 (PDF ) Many a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key Exchange Benjamin Dowling, Torben Brandt Hansen, Kenneth G. Paterson
2020/098 (PDF ) Improved key recovery on the Legendre PRF Novak Kaluđerović, Thorsten Kleinjung, Dusan Kostic
2020/097 (PDF ) Research on OpenSSL Elliptic Curves for Compliance with the Russian National Digital Signature Standard Stanislav S. Malakhov
2020/096 (PDF ) Fully Distributed Verifiable Random Functions and their Application to Decentralised Random Beacons David Galindo, Jia Liu, Mihai Ordean, Jin-Mann Wong
2020/095 (PDF ) SCloud: Public Key Encryption and Key Encapsulation Mechanism Based on Learning with Errors Zhongxiang Zheng, Anyu Wang, Haining Fan, Chunhuan Zhao, Chao Liu, Xue Zhang
2020/094 (PDF ) On the Profitability of Selfish Mining Against Multiple Difficulty Adjustment Algorithms Michael Davidson, Tyler Diamond
2020/093 (PDF ) A New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials Romain Gay
2020/092 (PDF ) Overcoming Impossibility Results in Composable Security using Interval-Wise Guarantees Daniel Jost, Ueli Maurer
2020/091 (PDF ) Enabling Faster Operations for Deeper Circuits in Full RNS Variants of FV-like Somewhat Homomorphic Encryption Jonathan Takeshita, Matthew Schoenbauer, Ryan Karl, Taeho Jung
2020/090 (PDF ) Witness Maps and Applications Suvradip Chakraborty, Manoj Prabhakaran, Daniel Wichs
2020/089 (PDF ) The MILP-Aided Conditional Differential Attack and Its Application to Trivium Chen-Dong Ye, Tian Tian, Fan-Yang Zeng
2020/088 (PDF ) Streamlet: Textbook Streamlined Blockchains Benjamin Y Chan, Elaine Shi
2020/087 (PDF ) Streamlined Blockchains: A Simple and Elegant Approach (A Tutorial and Survey) Elaine Shi
2020/086 (PDF ) Bootstrapping in FHEW-like Cryptosystems Daniele Micciancio, Yuriy Polyakov
2020/085 (PDF ) Phantom of the ADAS: Phantom Attacks on Driver-Assistance Systems Ben Nassi, Dudi Nassi, Raz Ben-Netanel, Yisroel Mirsky, Oleg Drokin, Yuval Elovici
2020/084 (PDF ) Bandwidth-efficient threshold EC-DSA Guilhem Castagnos, Dario Catalano, Fabien Laguillaumie, Federico Savasta, Ida Tucker
2020/083 (PDF ) Metal: A Metadata-Hiding File-Sharing System Weikeng Chen, Raluca Ada Popa
2020/082 (PDF ) Random Walks and Concurrent Zero-Knowledge Anand Aiyer, Xiao Liang, Nilu Nalini, Omkant Pandey
2020/081 (PDF ) Efficient polynomial commitment schemes for multiple points and polynomials Dan Boneh, Justin Drake, Ben Fisch, Ariel Gabizon
2020/080 (PDF ) Better Secret-Sharing via Robust Conditional Disclosure of Secrets Benny Applebaum, Amos Beimel, Oded Nir, Naty Peter
2020/079 (PDF ) Exploring HTTPS Security Inconsistencies: A Cross-Regional Perspective Eman Salem Alashwali, Pawel Szalachowski, Andrew Martin
2020/078 (PDF ) Quantum Random Number Generation with the Superconducting Quantum Computer IBM 20Q Tokyo Kentaro Tamura, Yutaka Shikano
2020/077 (PDF ) Improved Quantum Circuits for Elliptic Curve Discrete Logarithms Thomas Häner, Samuel Jaques, Michael Naehrig, Martin Roetteler, Mathias Soeken
2020/076 (PDF ) Wyner-Ziv reconciliation for key exchange based on Ring-LWE Charbel Saliba, Laura Luzzi, Cong Ling
2020/075 (PDF ) Memory-Tight Reductions for Practical Key Encapsulation Mechanisms Rishiraj Bhattacharyya
2020/074 (PDF ) Rolling up sleeves when subversion's in a field? Daniel R. L. Brown
2020/073 (PDF ) Anonymous Symmetric-Key Communication Fabio Banfi, Ueli Maurer
2020/072 (PDF ) Anonymous Tokens with Private Metadata Bit Ben Kreuter, Tancrède Lepoint, Michele Orrù, Mariana Raykova
2020/071 (PDF ) Post-Quantum Authentication in TLS 1.3: A Performance Study Dimitrios Sikeridis, Panos Kampanakis, Michael Devetsikiotis
2020/070 (PDF ) On Instantiating the Algebraic Group Model from Falsifiable Assumptions Thomas Agrikola, Dennis Hofheinz, Julia Kastner
2020/069 (PDF ) RSA and redactable blockchains Dima Grigoriev, Vladimir Shpilrain
2020/068 (PDF ) Further Clarification on Mantin's Digraph Repetition Bias in RC4 Pranab Chakraborty, Subhamoy Maitra
2020/067 (PDF ) Daence: Salsa20 and ChaCha in Deterministic Authenticated Encryption with no noNCEnse Taylor R Campbell
2020/066 (PDF ) Talek: Private Group Messaging with Hidden Access Patterns Raymond Cheng, William Scott, Elisaweta Masserova, Irene Zhang, Vipul Goyal, Thomas Anderson, Arvind Krishnamurthy, Bryan Parno
2020/065 (PDF ) A Performant, Misuse-Resistant API for Primality Testing Jake Massimo, Kenneth G. Paterson
2020/063 (PDF ) Attack on LAC Key Exchange in Misuse Situation Aurelien Greuet, Simon Montoya, Guenael Renault
2020/062 (PDF ) Lift-and-Shift: Obtaining Simulation Extractable Subversion and Updatable SNARKs Generically Behzad Abdolmaleki, Sebastian Ramacher, Daniel Slamanig
2020/061 (PDF ) Simple Schnorr Signature with Pedersen Commitment as Key Gary Yu
2020/060 (PDF ) Auditable Asymmetric Password Authenticated Public Key Establishment Antonio Faonio, Maria Isabel Gonzalez Vasco, Claudio Soriente, Hien Thi Thu Truong
2020/059 (PDF ) ARX-KW, a family of key wrapping constructions using SipHash and ChaCha Satō Shinichi
2020/058 (PDF ) Learning when to stop: a mutual information approach to fight overfitting in profiled side-channel analysis Guilherme Perin, Ileana Buhan, Stjepan Picek
2020/057 (PDF ) On the smoothing parameter and last minimum of random orthogonal lattices Elena Kirshanova, Huyen Nguyen, Damien Stehlé, Alexandre Wallet
2020/056 (PDF ) AKCN-E8: Compact and Flexible KEM from Ideal Lattice Zhengzhong JIn, Yunlei Zhao
2020/055 (PDF ) When one vulnerable primitive turns viral: Novel single-trace attacks on ECDSA and RSA Alejandro Cabrera Aldaya, Billy Bob Brumley
2020/054 (PDF ) Parameterized Hardware Accelerators for Lattice-Based Cryptography and Their Application to the HW/SW Co-Design of qTESLA Wen Wang, Shanquan Tian, Bernhard Jungk, Nina Bindel, Patrick Longa, Jakub Szefer
2020/053 (PDF ) Security Analysis Against "A New Encryption Scheme for Multivariate Quadratic Systems" Yasuhiko Ikematsu, Shuhei Nakamura
2020/052 (PDF ) Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE Mohamed Tolba, Muhammad ElSheikh, Amr M. Youssef
2020/051 (PDF ) Low-Latency Hardware Masking with Application to AES Pascal Sasdrich, Begül Bilgin, Michael Hutter, Mark Marson
2020/050 (PDF ) Delphi: A Cryptographic Inference Service for Neural Networks Pratyush Mishra, Ryan Lehmkuhl, Akshayaram Srinivasan, Wenting Zheng, Raluca Ada Popa
2020/049 (PDF ) ISA Extensions for Finite Field Arithmetic - Accelerating Kyber and NewHope on RISC-V Erdem Alkim, Hülya Evkan, Norman Lahr, Ruben Niederhagen, Richard Petri
2020/048 (PDF ) Practical Searchable Symmetric Encryption Supporting Conjunctive Queries without Keyword Pair Result Pattern Leakage Changshe Ma, Yiping Gu, Hongfei Li
2020/047 (PDF ) New Subquadratic Algorithms for Constructing Lightweight Hadamard MDS Matrices (Full Version) Tianshuo Cong, Ximing Fu, Xuting Zhou, Yuli Zou, Haining Fan
2020/046 (PDF ) On Analysis of Lightweight Stream Ciphers with Keyed Update Orhun Kara, Muhammed F. Esgin
2020/045 (PDF ) Pragmatic Authenticated Key Agreement for IEEE Std 802.15.6 Haibat Khan, Benjamin Dowling, Keith M. Martin
2020/044 (PDF ) Bypassing Non-Outsourceable Proof-of-Work Schemes Using Collateralized Smart Contracts Alexander Chepurnoy, Amitabh Saxena
2020/043 (PDF ) Zone Encryption with Anonymous Authentication for V2V Communication Jan Camenisch, Manu Drijvers, Anja Lehmann, Gregory Neven, Patrick Towa
2020/042 (PDF ) BLAZE: Blazing Fast Privacy-Preserving Machine Learning Arpita Patra, Ajith Suresh
2020/041 (PDF ) Consistency of Proof-of-Stake Blockchains with Concurrent Honest Slot Leaders Aggelos Kiayias, Saad Quader, Alexander Russell
2020/040 (PDF ) A Compact and Scalable Hardware/Software Co-design of SIKE Pedro Maat C. Massolino, Patrick Longa, Joost Renes, Lejla Batina
2020/039 (PDF ) Online Performance Evaluation of Deep Learning Networks for Side-Channel Analysis Damien Robissout, Gabriel Zaid, Brice Colombier, Lilian Bossuet, Amaury Habrard
2020/038 (PDF ) Bitstream Modification Attack on SNOW 3G Michail Moraitis, Elena Dubrova
2020/037 (PDF ) Proof-of-Stake Blockchain Protocols with Near-Optimal Throughput Matthias Fitzi, Peter Gaži, Aggelos Kiayias, Alexander Russell
2020/036 (PDF ) Analysis on Aigis-Enc: asymmetrical and symmetrical Yupu Hu, Siyue Dong, Xingting Dong
2020/035 (PDF ) Constant-round Dynamic Group Key Exchange from RLWE Assumption Rakyong Choi, Dongyeon Hong, Kwangjo Kim
2020/034 (PDF ) SkyEye: A Traceable Scheme for Blockchain Tianjun Ma, Haixia Xu, Peili Li
2020/033 (PDF ) Scalable Open-Vote Network on Ethereum Mohamed Seifelnasr, Hisham S. Galal, Amr M. Youssef
2020/032 (PDF ) A New Approach for the Implementation of Binary Matrices Using SLP Applications Mahdi Sajadieh, Mohsen Mousavi
2020/031 (PDF ) Locally Decodable Codes with Randomized Encoding Kuan Cheng, Xin Li, Yu Zheng
2020/030 (PDF ) K-Cipher: A Low Latency, Bit Length Parameterizable Cipher Michael Kounavis, Sergej Deutsch, Santosh Ghosh, David Durham
2020/029 (PDF ) Differentially-Private Multi-Party Sketching for Large-Scale Statistics Seung Geol Choi, Dana Dachman-Soled, Mukul Kulkarni, Arkady Yerukhimovich
2020/028 (PDF ) Verified Security of BLT Signature Scheme Denis Firsov, Ahto Buldas, Ahto Truu, Risto Laanoja
2020/027 (PDF ) On Roots Factorization for PQC Algorithms Alexander Maximov
2020/026 (PDF ) Post-Quantum Secure Architectures for Automotive Hardware Secure Modules Wen Wang, Marc Stöttinger
2020/025 (PDF ) Single Secret Leader Election Dan Boneh, Saba Eskandarian, Lucjan Hanzlik, Nicola Greco
2020/024 (PDF ) The Arwen Trading Protocols (Full Version) Ethan Heilman, Sebastien Lipmann, Sharon Goldberg
2020/023 (PDF ) Threshold Multi-Signature with an Offline Recovery Party Riccardo Longo, Alessio Meneghetti, Massimiliano Sala
2020/022 (PDF ) Differential Random Fault Attacks on certain CAESAR Stream Ciphers (Supplementary Material) Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson
2020/021 (PDF ) eSIDH: the revenge of the SIDH Daniel Cervantes-Vázquez, Eduardo Ochoa-Jiménez, Francisco Rodríguez-Henríquez
2020/020 (PDF ) Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes Shangqi Lai, Xingliang Yuan, Shi-Feng Sun, Joseph K. Liu, Ron Steinfeld, Amin Sakzad, Dongxi Liu
2020/019 (PDF ) Short Selling Attack: A Self-Destructive But Profitable 51% Attack On PoS Blockchains Suhyeon Lee, Seungjoo Kim
2020/018 (PDF ) Triptych: logarithmic-sized linkable ring signatures with applications Sarang Noether, Brandon Goodell
2020/017 (PDF ) Biometric-Authenticated Searchable Encryption Daniel Gardham, Mark Manulis, Constantin Cătălin Drăgan
2020/016 (PDF ) Short Threshold Dynamic Group Signatures Jan Camenisch, Manu Drijvers, Anja Lehmann, Gregory Neven, Patrick Towa
2020/015 (PDF ) Efficient Homomorphic Conversion Between (Ring) LWE Ciphertexts Hao Chen, Wei Dai, Miran Kim, Yongsoo Song
2020/014 (PDF ) SHA-1 is a Shambles - First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust Gaëtan Leurent, Thomas Peyrin
2020/013 (PDF ) On the Cryptographic Hardness of Local Search Nir Bitansky, Idan Gerichter
2020/012 (PDF ) Cortex-M4 Optimizations for \{R,M\}LWE Schemes Erdem Alkim, Yusuf Alper Bilgin, Murat Cenk, François Gérard
2020/011 (PDF ) Towards Vehicular Digital Forensics from Decentralized Trust: An Accountable, Privacy-preservation, and Secure Realization Ming Li, Jian Weng, Jia-Nan Liu, Xiaodong Lin, Charlie Obimbo
2020/010 (PDF ) Faster point compression for elliptic curves of $j$-invariant $0$ Dmitrii Koshelev
2020/009 (PDF ) Efficient Elliptic Curve Operations On Microcontrollers With Finite Field Extensions Thomas Pornin
2020/008 (PDF ) Secret Sharing Schemes for Ports of Matroids of Rank 3 Oriol Farràs
2020/007 (PDF ) On Lattice-Based Interactive Protocols: An Approach with Less or No Aborts Nabil Alkeilani Alkadri, Rachid El Bansarkhani, Johannes Buchmann
2020/006 (PDF ) Tight and Optimal Reductions for Signatures based on Average Trapdoor Preimage Sampleable Functions and Applications to Code-Based Signatures André Chailloux, Thomas Debris-Alazard
2020/005 (PDF ) Lai-Massey Scheme Revisited M. R. Mirzaee Shamsabad, S. M. Dehnavi
2020/002 (PDF ) On a Conjecture of O'Donnell Qichun Wang
2020/001 (PDF ) Elliptic Curves of Nearly Prime Order Manoj Gyawali, Daniele Di Tullio
2019/1499 (PDF ) Authenticated Key Distribution: When the Coupon Collector is Your Enemy Marc Beunardeau, Fatima-Ezzahra El Orche, Diana Maimut, David Naccache, Peter B. Roenne, Peter Y. A. Ryan
2019/1498 (PDF ) Supersingular Isogeny-Based Designated Verifier Blind Signature Rajeev Anand Sahu, Agnese Gini, Ankan Pal
2019/1497 (PDF ) Analysis of Modified Shell Sort for Fully Homomorphic Encryption Joon-Woo Lee, Young-Sik Kim, Jong-Seon No
2019/1496 (PDF ) Improved on Identity-based quantum signature based on Bell states Chang-Bin Wang, Shu-Mei Hsu, Hsiang Chang, Jue-Sam Chou
2019/1495 (PDF ) Tight Security of Cascaded LRW2 Ashwin Jha, Mridul Nandi
2019/1494 (PDF ) Scaling Verifiable Computation Using Efficient Set Accumulators Alex Ozdemir, Riad S. Wahby, Barry Whitehat, Dan Boneh
2019/1493 (PDF ) Solving $X^{q+1}+X+a=0$ over Finite Fields Kwang Ho Kim, Junyop Choe, Sihem Mesnager
2019/1492 (PDF ) Too Much Crypto Jean-Philippe Aumasson
2019/1491 (PDF ) Classification of quadratic APN functions with coefficients in GF(2) for dimensions up to 9 Yuyin Yu, Nikolay Kaleyski, Lilya Budaghyan, Yongqiang Li
2019/1490 (PDF ) Cryptanalysis of The Lifted Unbalanced Oil Vinegar Signature Scheme Jintai Ding, Joshua Deaton, Kurt Schmidt, Vishakha, Zheng Zhang
2019/1489 (PDF ) Keep the Dirt: Tainted TreeKEM, Adaptively and Actively Secure Continuous Group Key Agreement Joël Alwen, Margarita Capretto, Miguel Cueto, Chethan Kamath, Karen Klein, Ilia Markov, Guillermo Pascual-Perez, Krzysztof Pietrzak, Michael Walter, Michelle Yeo
2019/1488 (PDF ) Fine-Grained Cryptography Revisited Shohei Egashira, Yuyu Wang, Keisuke Tanaka
2019/1487 (PDF ) SNR-Centric Power Trace Extractors for Side-Channel Attacks Changhai Ou, Degang Sun, Siew-Kei Lam, Xinping Zhou, Kexin Qiao, Qu Wang
2019/1486 (PDF ) RLWE-based Zero-Knowledge Proofs for linear and multiplicative relations Ramiro Martínez, Paz Morillo
2019/1485 (PDF ) Implementation of a Strongly Robust Identity-Based Encryption Scheme over Type-3 Pairings Hiroshi Okano, Keita Emura, Takuya Ishibashi, Toshihiro Ohigashi, Tatsuya Suzuki
2019/1484 (PDF ) Force-Locking Attack on Sync Hotstuff Atsuki Momose, Jason Paul Cruz
2019/1483 (PDF ) Communication--Computation Trade-offs in PIR Asra Ali, Tancrède Lepoint, Sarvar Patel, Mariana Raykova, Phillipp Schoppmann, Karn Seth, Kevin Yeo
2019/1482 (PDF ) Transparent Polynomial Delegation and Its Applications to Zero Knowledge Proof Jiaheng Zhang, Tiancheng Xie, Yupeng Zhang, Dawn Song
2019/1481 (PDF ) On metric regularity of Reed-Muller codes Alexey Oblaukhov
2019/1480 (PDF ) Analogue of Vélu's Formulas for Computing Isogenies over Hessian Model of Elliptic Curves Fouazou Lontouo Perez Broon, Emmanuel Fouotsa
2019/1479 (PDF ) A New Encoding Framework for Predicate Encryption with Non-Linear Structures in Prime Order Groups Jongkil Kim, Willy Susilo, Fuchun Guo, Joonsang Baek, Nan Li
2019/1478 (PDF ) Leakage Detection with Kolmogorov-Smirnov Test Xinping Zhou, Kexin Qiao, Changhai Ou
2019/1477 (PDF ) Kilroy was here: The First Step Towards Explainability of Neural Networks in Profiled Side-channel Analysis Daan van der Valk, Stjepan Picek, Shivam Bhasin
2019/1476 (PDF ) On the Performance of Multilayer Perceptron in Profiling Side-channel Analysis Leo Weissbart
2019/1475 (PDF ) On the Security of Sponge-type Authenticated Encryption Modes Bishwajit Chakraborty, Ashwin Jha, Mridul Nandi
2019/1474 (PDF ) Remove Some Noise: On Pre-processing of Side-channel Measurements with Autoencoders Lichao Wu, Stjepan Picek
2019/1473 (PDF ) Splitting the Interpose PUF: A Novel Modeling Attack Strategy Nils Wisiol, Christopher Mühl, Niklas Pirnay, Phuong Ha Nguyen, Marian Margraf, Jean-Pierre Seifert, Marten van Dijk, Ulrich Rührmair
2019/1472 (PDF ) Efficient Fully Secure Leakage-Deterring Encryption Jan Camenisch, Maria Dubovitskaya, Patrick Towa
2019/1471 (PDF ) A Privacy-Enhancing Framework for Internet of Things Services Lukas Malina, Gautam Srivastava, Petr Dzurenda, Jan Hajny, Sara Ricci
2019/1470 (PDF ) PESTO: Proactively Secure Distributed Single Sign-On, or How to Trust a Hacked Server Carsten Baum, Tore K. Frederiksen, Julia Hesse, Anja Lehmann, Avishay Yanai
2019/1469 (PDF ) The Influence of LWE/RLWE Parameters on the Stochastic Dependence of Decryption Failures Georg Maringer, Tim Fritzmann, Johanna Sepúlveda
2019/1468 (PDF ) A New Trapdoor over Module-NTRU Lattice and its Application to ID-based Encryption Jung Hee Cheon, Duhyeong Kim, Taechan Kim, Yongha Son
2019/1467 (PDF ) Distributed Web Systems Leading to Hardware Oriented Cryptography and Post-Quantum Cryptologic Methodologies Andrew M. K. Nassief
2019/1466 (PDF ) A Note on the Instantiability of the Quantum Random Oracle Edward Eaton, Fang Song
2019/1465 (PDF ) An optimist's Poisson model of cryptanalysis Daniel R. L. Brown
2019/1464 (PDF ) New Techniques for Zero-Knowledge: Leveraging Inefficient Provers to Reduce Assumptions and Interaction Marshall Ball, Dana Dachman-Soled, Mukul Kulkarni
2019/1463 (PDF ) Rescuing Logic Encryption in Post-SAT Era by Locking & Obfuscation Amin Rezaei, Yuanqi Shen, Hai Zhou
2019/1461 (PDF ) Cryptanalysis of two recently proposed PUF based authentication protocols for IoT: PHEMAP and Salted PHEMAP Morteza Adeli, Nasour Bagheri
2019/1460 (PDF ) Byzantine Fault Tolerance in Partially Synchronous Networks Yongge Wang
2019/1459 (PDF ) Side Channel Information Set Decoding using Iterative Chunking Norman Lahr, Ruben Niederhagen, Richard Petri, Simona Samardjiska
2019/1458 (PDF ) Out-of-Band Authenticated Group Key Exchange: From Strong Authentication to Immediate Key Delivery Moni Naor, Lior Rotem, Gil Segev
2019/1457 (PDF ) Fast and Secure Updatable Encryption Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Yao Jiang
2019/1456 (PDF ) ModFalcon: compact signatures based on module NTRU lattices Chitchanok Chuengsatiansup, Thomas Prest, Damien Stehlé, Alexandre Wallet, Keita Xagawa
2019/1455 (PDF ) Generic Construction of Server-Aided Revocable Hierarchical Identity-Based Encryption with Decryption Key Exposure Resistance Yanyan Liu, Yiru Sun
2019/1454 (PDF ) Practical Relativistic Zero-Knowledge for NP Claude Crépeau, Arnaud Massenet, Louis Salvail, Lucas Stinchcombe, Nan Yang
2019/1453 (PDF ) Saber on ESP32 Bin Wang, Xiaozhuo Gu, Yingshan Yang
2019/1452 (PDF ) Leakage-Resilient Lattice-Based Partially Blind Signatures D. Papachristoudis, D. Hristu-Varsakelis, F. Baldimtsi, G. Stephanides
2019/1451 (PDF ) Tight bound on NewHope failure probability Thomas Plantard, Arnaud Sipasseuth, Willy Susilo, Vincent Zucca
2019/1450 (PDF ) Extractors for Adversarial Sources via Extremal Hypergraphs Eshan Chattopadhyay, Jesse Goodman, Vipul Goyal, Xin Li
2019/1449 (PDF ) Formalising Oblivious Transfer in the Semi-Honest and Malicious Model in CryptHOL David Butler, David Aspinall, Adria Gascon
2019/1448 (PDF ) Investigating Profiled Side-Channel Attacks Against the DES Key Schedule Johann Heyszl, Katja Miller, Florian Unterstein, Marc Schink, Alexander Wagner, Horst Gieser, Sven Freud, Tobias Damm, Dominik Klein, Dennis Kügler
2019/1447 (PDF ) Benchmarking Post-Quantum Cryptography in TLS Christian Paquin, Douglas Stebila, Goutam Tamvada
2019/1446 (PDF ) Boolean functions for homomorphic-friendly stream ciphers Claude Carlet, Pierrick Méaux
2019/1445 (PDF ) Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers Madura A Shelton, Niels Samwel, Lejla Batina, Francesco Regazzoni, Markus Wagner, Yuval Yarom
2019/1444 (PDF ) Compact Storage of Superblocks for NIPoPoW Applications Kostis Karantias, Aggelos Kiayias, Nikos Leonardos, Dionysis Zindros
2019/1443 (PDF ) CAS-Unlock: Unlocking CAS-Lock without Access to a Reverse-Engineered Netlist Abhrajit Sengupta, Ozgur Sinanoglu
2019/1441 (PDF ) A Code-specific Conservative Model for the Failure Rate of Bit-flipping Decoding of LDPC Codes with Cryptographic Applications Paolo Santini, Alessandro Barenghi, Gerardo Pelosi, Marco Baldi, Franco Chiaraluce
2019/1440 (PDF ) Winkle: Foiling Long-Range Attacks in Proof-of-Stake Systems Sarah Azouvi, George Danezis, Valeria Nikolaenko
2019/1439 (PDF ) Cryptanalysis of a pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds S. Sharmila Deva Selvi, Irene Miriam Isaac, C. Pandu Rangan
2019/1438 (PDF ) A new method for Searching Optimal Differential and Linear Trails in ARX Ciphers Zhengbin Liu, Yongqiang Li, Lin Jiao, Mingsheng Wang
2019/1437 (PDF ) Reverse Outsourcing: Reduce the Cloud's Workload in Outsourced Attribute-Based Encryption Scheme Fei Meng, Mingqiang Wang
2019/1436 (PDF ) Algebraic and Euclidean Lattices: Optimal Lattice Reduction and Beyond Paul Kirchner, Thomas Espitau, Pierre-Alain Fouque
2019/1435 (PDF ) Confidential Assets on MimbleWimble Yi Zheng, Howard Ye, Patrick Dai, Tongcheng Sun, Vladislav Gelfer
2019/1434 (PDF ) About Low DFR for QC-MDPC Decoding Nicolas Sendrier, Valentin Vasseur
2019/1433 (PDF ) T0RTT: Non-Interactive Immediate Forward-Secret Single-Pass Circuit Construction Sebastian Lauer, Kai Gellert, Robert Merget, Tobias Handirk, Jörg Schwenk
2019/1432 (PDF ) A Generic View on the Unified Zero-Knowledge Protocol and its Applications Diana Maimut, George Teseleanu
2019/1430 (PDF ) On the Impossibility of Probabilistic Proofs in Relativized Worlds Alessandro Chiesa, Siqi Liu
2019/1427 (PDF ) On the Relationship between Resilient Boolean Functions and Linear Branch Number of S-boxes Sumanta Sarkar, Kalikinkar Mandal, Dhiman Saha
2019/1426 (PDF ) On asymptotically optimal tests for random number generators Boris Ryabko
2019/1425 (PDF ) HIBEChain: A Hierarchical Identity-based Blockchain System for Large-Scale IoT Zhiguo Wan, Wei Liu, Hui Cui
2019/1424 (PDF ) Efficient Side-Channel Secure Message Authentication with Better Bounds Chun Guo, François-Xavier Standaert, Weijia Wang, Yu Yu
2019/1423 (PDF ) QC-MDPC decoders with several shades of gray Nir Drucker, Shay Gueron, Dusan Kostic
2019/1422 (PDF ) IPDL: A Probabilistic Dataflow Logic for Cryptography Xiong Fan, Joshua Gancher, Greg Morrisett, Elaine Shi, Kristina Sojakova
2019/1421 (PDF ) Extending NIST's CAVP Testing of Cryptographic Hash Function Implementations Nicky Mouha, Christopher Celi
2019/1420 (PDF ) A Non-Interactive Shuffle Argument With Low Trust Assumptions Antonis Aggelakis, Prastudy Fauzi, Georgios Korfiatis, Panos Louridas, Foteinos Mergoupis-Anagnou, Janno Siim, Michal Zajac
2019/1419 (PDF ) Image PUF: A Physical Unclonable Function for Printed Electronics based on Optical Variation of Printed Inks Ahmet Turan Erozan, Michael Hefenbrock, Michael Beigl, Jasmin Aghassi-Hagmann, Mehdi B. Tahoori
2019/1418 (PDF ) Designated-ciphertext Searchable Encryption Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo
2019/1417 (PDF ) CSIDH on Other Form of Elliptic Curves Xuejun Fan, Song Tian, Bao Li, Xiu Xu
2019/1416 (PDF ) The Signal Private Group System and Anonymous Credentials Supporting Efficient Verifiable Encryption Melissa Chase, Trevor Perrin, Greg Zaverucha
2019/1415 (PDF ) Toward A More Efficient Gröbner-based Algebraic Cryptanalysis Hossein Arabnezhad-Khanoki, Babak Sadeghiyan
2019/1413 (PDF ) Strong Authenticity with Leakage under Weak and Falsifiable Physical Assumptions Francesco Berti, Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert
2019/1412 (PDF ) Cryptanalysis and Improvement of Smart-ID's Clone Detection Mechanism Augustin P. Sarr
2019/1411 (PDF ) Isochronous Gaussian Sampling: From Inception to Implementation James Howe, Thomas Prest, Thomas Ricosset, Mélissa Rossi
2019/1409 (PDF ) Cloud-assisted Asynchronous Key Transport with Post-Quantum Security Gareth T. Davies, Herman Galteland, Kristian Gjøsteen, Yao Jiang
2019/1408 (PDF ) The group of automorphisms of the set of self-dual bent functions Aleksandr Kutsenko
2019/1407 (PDF ) Incrementally Verifiable Computation via Incremental PCPs Moni Naor, Omer Paneth, Guy N. Rothblum
2019/1406 (PDF ) Efficient, Coercion-free and Universally Verifiable Blockchain-based Voting Tassos Dimtiriou
2019/1405 (PDF ) Revisiting Higher-Order Computational Attacks against White-Box Implementations Houssem Maghrebi, Davide Alessio
2019/1404 (PDF ) CSIDH on the surface Wouter Castryck, Thomas Decru
2019/1402 (PDF ) Automatize parameter tuning in Ring-Learning-With-Errors-based leveled homomorphic cryptosystem implementations Vincent HERBERT
2019/1401 (PDF ) SMChain: A Scalable Blockchain Protocol for Secure Metering Systems in Distributed Industrial Plants Gang Wang, Zhijie Jerry Shi, Mark Nixon, Song Han
2019/1400 (PDF ) RedShift: Transparent SNARKs from List Polynomial Commitments Assimakis Kattis, Konstantin Panarin, Alexander Vlasov
2019/1399 (PDF ) (One) failure is not an option: Bootstrapping the search for failures in lattice-based encryption schemes Jan-Pieter D'Anvers, Mélissa Rossi, Fernando Virdia
2019/1398 (PDF ) How to Construct Rational Protocols with Nash Equilibrium Consistency in the UC framework Xiaoxia Jiang, Youliang Tian
2019/1397 (PDF ) How to compartment secrets Gaëlle Candel, Rémi Géraud-Stewart, David Naccache
2019/1396 (PDF ) A note on the multivariate cryptosystem based on a linear code Yasufumi Hashimoto
2019/1395 (PDF ) McTiny: fast high-confidence post-quantum key erasure for tiny network servers Daniel J. Bernstein, Tanja Lange
2019/1394 (PDF ) Voltage-based Covert Channels using FPGAs Dennis R. E. Gnad, Cong Dang Khoa Nguyen, Syed Hashim Gillani, Mehdi B. Tahoori
2019/1393 (PDF ) SoK: Computer-Aided Cryptography Manuel Barbosa, Gilles Barthe, Karthik Bhargavan, Bruno Blanchet, Cas Cremers, Kevin Liao, Bryan Parno
2019/1392 (PDF ) Decryption failure is more likely after success Nina Bindel, John M. Schanck
2019/1391 (PDF ) Are These Pairing Elements Correct? Automated Verification and Applications Susan Hohenberger, Satyanarayana Vusirikala
2019/1390 (PDF ) Practical Fully Secure Three-Party Computation via Sublinear Distributed Zero-Knowledge Proofs Elette Boyle, Niv Gilboa, Yuval Ishai, Ariel Nof
2019/1389 (PDF ) Generic Attack on Iterated Tweakable FX Constructions Ferdinand Sibleyras
2019/1388 (PDF ) Secure Key Encapsulation Mechanism with Compact Ciphertext and Public Key from Generalized Srivastava code Jayashree Dey, Ratna Dutta
2019/1387 (PDF ) The supersingular isogeny problem in genus 2 and beyond Craig Costello, Benjamin Smith
2019/1386 (PDF ) Provably Secure Three-party Password-based Authenticated Key Exchange from RLWE (Full Version) Chao Liu, Zhongxiang Zheng, Keting Jia, Qidi You
2019/1385 (PDF ) Improvements of the Balance Discovery Attack on Lightning Network Payment Channels Gijs van Dam, Rabiah Abdul Kadir, Puteri N. E. Nohuddin, Halimah Badioze Zaman
2019/1384 (PDF ) Identity-Based Encryption with Security against the KGC: A Formal Model and Its Instantiations Keita Emura, Shuichi Katsumata, Yohei Watanabe
2019/1383 (PDF ) Communication-Efficient Proactive Secret Sharing for Dynamic Groups with Dishonest Majorities Karim Eldefrawy, Tancrède Lepoint, Antonin Leroux
2019/1382 (PDF ) On the Power of Multiple Anonymous Messages Badih Ghazi, Noah Golowich, Ravi Kumar, Rasmus Pagh, Ameya Velingker
2019/1381 (PDF ) The Extended Autocorrelation and Boomerang Tables and Links Between Nonlinearity Properties of Vectorial Boolean Functions Kaisa Nyberg
2019/1380 (PDF ) Efficient Utilization of DSPs and BRAMs Revisited: New AES-GCM Recipes on FPGAs Elif Bilge Kavun, Nele Mentens, Jo Vliegen, Tolga Yalcin
2019/1379 (PDF ) Systematic and Random Searches for Compact 4-Bit and 8-Bit Cryptographic S-Boxes Christophe Clavier, Léo Reynaud
2019/1378 (PDF ) Alzette: a 64-bit ARX-box (feat. CRAX and TRAX) Christof Beierle, Alex Biryukov, Luan Cardoso dos Santos, Johann Großschädl, Léo Perrin, Aleksei Udovenko, Vesselin Velichkov, Qingju Wang
2019/1377 (PDF ) A Scalable Post-quantum Hash-Based Group Signature Masoumeh Shafieinejad, Navid Nasr Esfahani
2019/1376 (PDF ) Generic Constructions of RIBE via Subset Difference Method Xuecheng Ma, Dongdai Lin
2019/1375 (PDF ) New ideas to build noise-free homomorphic cryptosystems Gérald Gavin, Sandrine Tainturier
2019/1374 (PDF ) Challenges of Post-Quantum Digital Signing in Real-world Applications: A Survey Teik Guan Tan, Pawel Szalachowski, Jianying Zhou
2019/1373 (PDF ) A note on the cost of computing odd degree isogenies Daniel Cervantes-Vázquez, Francisco Rodríguez-Henríquez
2019/1372 (PDF ) Analyzing the Linear Keystream Biases in AEGIS Maria Eichlseder, Marcel Nageler, Robert Primas
2019/1371 (PDF ) A short-list of pairing-friendly curves resistant to Special TNFS at the 128-bit security level Aurore Guillevic
2019/1370 (PDF ) A Subset Fault Analysis of ASCON Priyanka Joshi, Bodhisatwa Mazumdar
2019/1369 (PDF ) Impeccable Circuits II Aein Rezaei Shahmirzadi, Shahram Rasoolzadeh, Amir Moradi
2019/1368 (PDF ) Efficient FPGA Implementations of LowMC and Picnic Daniel Kales, Sebastian Ramacher, Christian Rechberger, Roman Walch, Mario Werner
2019/1367 (PDF ) Tight reduction for generic construction of certificateless signature and its instantiation from DDH assumption Keitaro Hashimoto, Wakaha Ogata, Toi Tomita
2019/1366 (PDF ) A Lattice-based Enhanced Privacy ID Nada EL Kassem, Luis Fiolhais, Paulo Martins, Liqun Chen, Leonel Sousa
2019/1365 (PDF ) FLASH: Fast and Robust Framework for Privacy-preserving Machine Learning Megha Byali, Harsh Chaudhari, Arpita Patra, Ajith Suresh
2019/1364 (PDF ) Boolean Functions with Multiplicative Complexity 3 and 4 Cagdas Calik, Meltem Sonmez Turan, Rene Peralta
2019/1363 (PDF ) Multi-Device for Signal Sébastien Campion, Julien Devigne, Céline Duguey, Pierre-Alain Fouque
2019/1362 (PDF ) A Modern View on Forward Security Colin Boyd, Kai Gellert
2019/1361 (PDF ) Efficient Elliptic Curve Diffie-Hellman Computation at the 256-bit Security Level Kaushik Nath, Palash Sarkar
2019/1360 (PDF ) Sashimi: Cutting up CSI-FiSh secret keys to produce an actively secure distributed signing protocol Daniele Cozzo, Nigel P. smart
2019/1359 (PDF ) Universal Forgery Attack against GCM-RUP Yanbin Li, Gaëtan Leurent, Meiqin Wang, Wei Wang, Guoyan Zhang, Yu Liu
2019/1358 (PDF ) Traceable Inner Product Functional Encryption Xuan Thanh Do, Duong Hieu Phan, David Pointcheval
2019/1357 (PDF ) Cryptanalysis of the Legendre PRF and generalizations Ward Beullens, Tim Beyne, Aleksei Udovenko, Giuseppe Vitto
2019/1356 (PDF ) Towards Post-Quantum Security for Signal's X3DH Handshake Jacqueline Brendel, Marc Fischlin, Felix Günther, Christian Janson, Douglas Stebila
2019/1355 (PDF ) A Nonlinear Multivariate Cryptosystem Based on a Random Linear Code Daniel Smith-Tone, Cristina Tone
2019/1354 (PDF ) BlockMaze: An Efficient Privacy-Preserving Account-Model Blockchain Based on zk-SNARKs Zhangshuang Guan, Zhiguo Wan, Yang Yang, Yan Zhou, Butian Huang
2019/1353 (PDF ) Laconic Conditional Disclosure of Secrets and Applications Nico Döttling, Sanjam Garg, Vipul Goyal, Giulio Malavolta
2019/1352 (PDF ) Spectral analysis of ZUC-256 Jing Yang, Thomas Johansson, Alexander Maximov
2019/1351 (PDF ) Speeding Up OMD Instantiations in Hardware Diana Maimut, Alexandru Stefan Mega
2019/1350 (PDF ) Message Time of Arrival Codes: A Fundamental Primitive for Secure Distance Measurement Patrick Leu, Mridula Singh, Marc Roeschlin, Kenneth G. Paterson, Srdjan Capkun
2019/1349 (PDF ) UWB-ED: Distance Enlargement Attack Detection in Ultra-Wideband Mridula Singh, Patrick Leu, AbdelRahman Abdou, Srdjan Capkun
2019/1348 (PDF ) Network Time with a Consensus on Clock Handan Kilinc Alper
2019/1347 (PDF ) Variants of Wegman-Carter Message Authentication Code Supporting Variable Tag Lengths Sebati Ghosh, Palash Sarkar
2019/1346 (PDF ) Privacy-Preserving Decentralised Singular Value Decomposition Bowen Liu, Qiang Tang
2019/1345 (PDF ) Audita: A Blockchain-based Auditing Framework for Off-chain Storage Danilo Francati, Giuseppe Ateniese, Abdoulaye Faye, Andrea Maria Milazzo, Angelo Massimo Perillo, Luca Schiatti, Giuseppe Giordano
2019/1344 (PDF ) From Fairness to Full Security in Multiparty Computation Ran Cohen, Iftach Haitner, Eran Omri, Lior Rotem
2019/1343 (PDF ) An Efficient Key Mismatch Attack on the NIST Second Round Candidate Kyber Yue Qin, Chi Cheng, Jintai Ding
2019/1342 (PDF ) Scalable Wildcarded Identity-Based Encryption Jihye Kim, Seunghwa Lee, Jiwon Lee, Hyunok Oh
2019/1341 (PDF ) Succinct Non-Interactive Secure Computation Andrew Morgan, Rafael Pass, Antigoni Polychroniadou
2019/1340 (PDF ) Secret Shared Shuffle Melissa Chase, Esha Ghosh, Oxana Poburinnaya
2019/1339 (PDF ) Extracting Randomness from Extractor-Dependent Sources Yevgeniy Dodis, Vinod Vaikuntanathan, Daniel Wichs
2019/1338 (PDF ) Two-party Private Set Intersection with an Untrusted Third Party Phi Hung Le, Samuel Ranellucci, S. Dov Gordon
2019/1337 (PDF ) Offline Witness Encryption with Semi-Adaptive Security Peter Chvojka, Tibor Jager, Saqib A. Kakvi
2019/1336 (PDF ) Critical Perspectives on Provable Security: Fifteen Years of "Another Look" Papers Neal Koblitz, Alfred Menezes
2019/1335 (PDF ) On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions Tibor Jager, David Niehues
2019/1334 (PDF ) Privacy-Preserving Distributed Machine Learning based on Secret Sharing Ye Dong, Xiaojun Chen, Liyan Shen
2019/1333 (PDF ) The Dark SIDH of Isogenies Paul Bottinelli, Victoria de Quehen, Chris Leonardi, Anton Mosunov, Filip Pawlega, Milap Sheth
2019/1332 (PDF ) SEAL: Sealed-Bid Auction Without Auctioneers Samiran Bag, Feng Hao, Siamak F. Shahandashti, Indranil G. Ray
2019/1331 (PDF ) Key Enumeration from the Adversarial Viewpoint: When to Stop Measuring and Start Enumerating? Melissa Azouaoui, Romain Poussier, François-Xavier Standaert, Vincent Verneuil
2019/1330 (PDF ) OptiSwap: Fast Optimistic Fair Exchange Lisa Eckey, Sebastian Faust, Benjamin Schlosser
2019/1329 (PDF ) Drinfeld modules may not be for isogeny based cryptography Antoine Joux, Anand Kumar Narayanan
2019/1328 (PDF ) Refresh When You Wake Up: Proactive Threshold Wallets with Offline Devices Yashvanth Kondi, Bernardo Magri, Claudio Orlandi, Omer Shlomovits
2019/1327 (PDF ) Spy Based Analysis of Selfish Mining Attack on Multi-Stage Blockchain Donghoon Chang, Munawar Hasan, Pranav Jain
2019/1326 (PDF ) Release of Unverified Plaintext: Tight Unified Model and Application to ANYDAE Donghoon Chang, Nilanjan Datta, Avijit Dutta, Bart Mennink, Mridul Nandi, Somitra Sanadhya, Ferdinand Sibleyras
2019/1325 (PDF ) Efficient Attribute-based Proxy Re-Encryption with Constant Size Ciphertexts Arinjita Paul, S. Sharmila Deva Selvi, C. Pandu Rangan
2019/1324 (PDF ) Tweakable HCTR: A BBB Secure Tweakable Enciphering Scheme Avijit Dutta, Mridul Nandi
2019/1323 (PDF ) Secure Quantum Extraction Protocols Prabhanjan Ananth, Rolando L. La Placa
2019/1322 (PDF ) An Efficient Micropayment Channel on Ethereum Hisham S. Galal, Muhammad ElSheikh, Amr M. Youssef
2019/1321 (PDF ) Supersingular isogeny key exchange for beginners Craig Costello
2019/1320 (PDF ) Homomorphic Encryption Random Beacon Alisa Cherniaeva, Ilia Shirobokov, Omer Shlomovits
2019/1319 (PDF ) Automatic Search for the Linear (hull) Characteristics of ARX Ciphers: Applied to SPECK, SPARX, Chaskey and CHAM-64 (Full Version) Mingjiang Huang, Liming Wang
2019/1318 (PDF ) Automatic Tool for Searching for Differential Characteristics in ARX Ciphers and Applications (Full Version) Mingjiang Huang, Liming Wang
2019/1317 (PDF ) Reverse Firewalls for Actively Secure MPCs Suvradip Chakraborty, Stefan Dziembowski, Jesper Buus Nielsen
2019/1316 (PDF ) Binary Kummer Line Sabyasachi Karati
2019/1315 (PDF ) Trident: Efficient 4PC Framework for Privacy Preserving Machine Learning Harsh Chaudhari, Rahul Rachuri, Ajith Suresh
2019/1314 (PDF ) Towards Privacy-Preserving and Efficient Attribute-Based Multi-Keyword Search Zhidan Li, Wenmin Li, Fei Gao, Wei Yin, Hua Zhang, Qiaoyan Wen, Kaitai Liang
2019/1313 (PDF ) On Oblivious Amplification of Coin-Tossing Protocols Nir Bitansky, Nathan Geier
2019/1312 (PDF ) Cryptographic Fault Diagnosis using VerFI Victor Arribas, Felix Wegener, Amir Moradi, Svetla Nikova
2019/1311 (PDF ) BESTIE: Broadcast Encryption Scheme for Tiny IoT Equipments Jiwon Lee, Jihye Kim, Hyunok Oh
2019/1310 (PDF ) Lightweight Iterative MDS Matrices: How Small Can We Go? Shun Li, Siwei Sun, Danping Shi, Chaoyun Li, Lei Hu
2019/1309 (PDF ) SaberX4: High-throughput Software Implementationof Saber Key Encapsulation Mechanism Sujoy Sinha Roy
2019/1308 (PDF ) A Novel CCA Attack using Decryption Errors against LAC Qian Guo, Thomas Johansson, Jing Yang
2019/1305 (PDF ) Privacy-Preserving Computation over Genetic Data: HLA Matching and so on Jinming Cui, Huaping Li, Meng Yang
2019/1304 (PDF ) Reduction Modulo $2^{448}-2^{224}-1$ Kaushik Nath, Palash Sarkar
2019/1302 (PDF ) There Is Always an Exception: Controlling Partial Information Leakage in Secure Computation Máté Horváth, Levente Buttyán, Gábor Székely, Dóra Neubrandt
2019/1301 (PDF ) Modular lattice signatures, revisited Dipayan Das, Jeffrey Hoffstein, Jill Pipher, William Whyte, Zhenfei Zhang
2019/1300 (PDF ) Actively Secure Setup for SPDZ Dragos Rotaru, Nigel P. Smart, Titouan Tanguy, Frederik Vercauteren, Tim Wood
2019/1299 (PDF ) A constant-rate non-malleable code in the split-state model. Divesh Aggarwal, Maciej Obremski
2019/1298 (PDF ) An Efficient Passive-to-Active Compiler for Honest-Majority MPC over Rings Mark Abspoel, Anders Dalskov, Daniel Escudero, Ariel Nof
2019/1297 (PDF ) Exploring Energy Efficient Quantum-resistant Signal Processing Using Array Processors Hamid Nejatollahi, Sina Shahhosseini, Rosario Cammarota, Nikil Dutt
2019/1296 (PDF ) FastSwap: Concretely Efficient Contingent Payments for Complex Predicates Mathias Hall-Andersen
2019/1295 (PDF ) A trip between creation and destruction of non-commutative public key exchange protocols Borja Gómez
2019/1294 (PDF ) Hashing to elliptic curves of $j$-invariant $1728$ Dmitrii Koshelev
2019/1293 (PDF ) LizarMong: Excellent Key Encapsulation Mechanism based on RLWE and RLWR Chi-Gon Jung, JongHyeok Lee, Youngjin Ju, Yong-Been Kwon, Seong-Woo Kim, Yunheung Paek
2019/1292 (PDF ) Mitigating Leakage in Secure Cloud-Hosted Data Structures: Volume-Hiding for Multi-Maps via Hashing Sarvar Patel, Giuseppe Persiano, Kevin Yeo, Moti Yung
2019/1291 (PDF ) SÉTA: Supersingular Encryption from Torsion Attacks Luca De Feo, Cyprien Delpech de Saint Guilhem, Tako Boris Fouotsa, Péter Kutas, Antonin Leroux, Christophe Petit, Javier Silva, Benjamin Wesolowski
2019/1290 (PDF ) Trapdoor DDH groups from pairings and isogenies Péter Kutas, Christophe Petit, Javier Silva
2019/1289 (PDF ) On constant-time QC-MDPC decoding with negligible failure rate Nir Drucker, Shay Gueron, Dusan Kostic
2019/1288 (PDF ) Threshold Schemes from Isogeny Assumptions Luca De Feo, Michael Meyer
2019/1287 (PDF ) MatRiCT: Efficient, Scalable and Post-Quantum Blockchain Confidential Transactions Protocol Muhammed F. Esgin, Raymond K. Zhao, Ron Steinfeld, Joseph K. Liu, Dongxi Liu
2019/1286 (PDF ) Comparison of proof-of-work based blockchains against federated consensus and proof-of-validation based blockchains Ambili K N, Jimmy Jose
2019/1285 (PDF ) Full-Round Differential Attack on DoT Block Cipher Manoj Kumar
2019/1284 (PDF ) Shorter QA-NIZK and SPS with Tighter Security Masayuki Abe, Charanjit S. Jutla, Miyako Ohkubo, Jiaxin Pan, Arnab Roy, Yuyu Wang
2019/1283 (PDF ) Breaking the Hidden Irreducible Polynomials Scheme Christian Eder
2019/1282 (PDF ) Privacy-Preserving Decision Tree Training and Prediction against Malicious Server Adi Akavia, Max Leibovich, Yehezkel S. Resheff, Roey Ron, Moni Shahar, Margarita Vald
2019/1281 (PDF ) Partially-Fair Computation from Timed-Release Encryption and Oblivious Transfer Geoffroy Couteau, Bill Roscoe, Peter Ryan
2019/1280 (PDF ) Fast Secrecy Computation with Multiplication Under the Setting of $k\le N<2k-1$ using Secret Sharing Scheme Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal
2019/1279 (PDF ) Post-quantum Zero Knowledge in Constant Rounds Nir Bitansky, Omri Shmueli
2019/1278 (PDF ) An IND-CCA-Secure Code-Based EncryptionScheme Using Rank Metric Hamad Al Shehhi, Emanuele Bellini, Filipe Borba, Florian Caullery, Marc Manzano, Victor Mateu
2019/1277 (PDF ) Towards Quantum-Safe VPNs and Internet Maran van Heesch, Niels van Adrichem, Thomas Attema, Thijs Veugen
2019/1276 (PDF ) Two PQ Signature Use-cases: Non-issues, challenges and potential solutions. Panos Kampanakis, Dimitrios Sikeridis
2019/1275 (PDF ) Updatable Oblivious Key Management for Storage Systems Stanislaw Jarecki, Hugo Krawczyk, Jason Resch
2019/1274 (PDF ) Rank-metric Encryption on Arm-Cortex M0 Ameirah al Abdouli, Emanuele Bellini, Florian Caullery, Marc Manzano, Victor Mateu
2019/1273 (PDF ) A Comprehensive Framework for Fair and Efficient Benchmarking of Hardware Implementations of Lightweight Cryptography Jens-Peter Kaps, William Diehl, Michael Tempelmeier, Farnoud Farahmand, Ekawat Homsirikamol, Kris Gaj
2019/1272 (PDF ) The Niederreiter cryptosystem and Quasi-Cyclic codes Upendra Kapshikar, Ayan Mahalanobis
2019/1271 (PDF ) Round-optimal Verifiable Oblivious Pseudorandom Functions From Ideal Lattices Martin R. Albrecht, Alex Davidson, Amit Deo, Nigel P. Smart
2019/1270 (PDF ) SAVER: SNARK-friendly, Additively-homomorphic, and Verifiable Encryption and decryption with Rerandomization Jiwon Lee, Jaekyoung Choi, Jihye Kim, Hyunok Oh
2019/1269 (PDF ) Repudiable Ring Signature: Stronger Security and Logarithmic-Size Hao Lin, Mingqiang Wang
2019/1268 (PDF ) On the Security of RSA-PSS in the Wild Saqib A. Kakvi
2019/1266 (PDF ) Note on the noise growth of the RNS variants of the BFV scheme Jean Claude Bajard, Julien Eynard, Paulo Martins, Leonel Sousa, Vincent Zucca
2019/1264 (PDF ) Resource-Restricted Cryptography: Revisiting MPC Bounds in the Proof-of-Work Era Juan Garay, Aggelos Kiayias, Rafail Ostrovsky, Giorgos Panagiotakos, Vassilis Zikas
2019/1263 (PDF ) Comments on Cryptographic Entropy Measurement Anna Johnston
2019/1262 (PDF ) A Practical Model for Collaborative Databases: Securely Mixing, Searching and Computing Shweta Agrawal, Rachit Garg, Nishant Kumar, Manoj Prabhakaran
2019/1261 (PDF ) On Round-By-Round Soundness and State Restoration Attacks Justin Holmgren
2019/1260 (PDF ) TI-PUF: Toward Side-Channel Resistant Physical Unclonable Functions Anita Aghaie, Amir Moradi
2019/1259 (PDF ) Security and Efficiency Trade-offs for Elliptic Curve Diffie-Hellman at the 128-bit and 224-bit Security Levels Kaushik Nath, Palash Sarkar
2019/1258 (PDF ) Secure Pairwise Key Sharing using Geometric Group Key Sharing Method (Full Paper) Shogo Ochiai, Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal
2019/1257 (PDF ) Expressive CP-ABE Scheme Satisfying Constant-Size Keys and Ciphertexts Dhaval Khandla, Het Shahy, Manish Kumar Bz, Alwyn Roshan Pais, Nishant Raj
2019/1256 (PDF ) Permuted Puzzles and Cryptographic Hardness Elette Boyle, Justin Holmgren, Mor Weiss
2019/1255 (PDF ) Zero-Knowledge Proofs for Set Membership: Efficient, Succinct, Modular Daniel Benarroch, Matteo Campanelli, Dario Fiore, Kobi Gurkan, Dimitris Kolonelos
2019/1254 (PDF ) Cryptanalysis of FRS Obfuscation based on the CLT13 Multilinear Map Jiseung Kim, Changmin Lee
2019/1253 (PDF ) Probabilistic Properties of Modular Addition \\ (Extended abstract) Victoria Vysotskaya
2019/1252 (PDF ) Simplifying Constructions and Assumptions for $i\mathcal{O}$ Aayush Jain, Huijia Lin, Amit Sahai
2019/1251 (PDF ) Lattice-based Zero-knowledge SNARGs for Arithmetic Circuits Anca Nitulescu
2019/1250 (PDF ) The Price of Active Security in Cryptographic Protocols Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss
2019/1249 (PDF ) Related-key Attack on 5-Round Kuznyechik Vitaly Kiryukhin
2019/1248 (PDF ) A Comparison of Chi^2-Test and Mutual Information as Distinguisher for Side-Channel Analysis Bastian Richter, David Knichel, Amir Moradi
2019/1247 (PDF ) A Note on Masking Generic Boolean Functions Lauren De Meyer, Felix Wegener, Amir Moradi
2019/1246 (PDF ) A Note on Our Submission to Track 4 of iDASH 2019 Marcel Keller, Ke Sun
2019/1245 (PDF ) Observations on the Quantum Circuit of the SBox of AES Jian Zou, Yongyang Liu, Chen Dong, Wenling Wu, Le Dong
2019/1244 (PDF ) A Note on a Static SIDH Protocol Samuel Dobson, Trey Li, Lukas Zobernig
2019/1242 (PDF ) Non-Profiled Side Channel Attack based on Deep Learning using Picture Trace Jong-Yoen Park, Dong-Guk Han, Dirmanto Jap, Shivam Bhasin, Yoo-Seung Won
2019/1241 (PDF ) SIMS : Self Sovereign Identity Management System with Preserving Privacy in Blockchain Jeonghyuk Lee, Jungyeon Hwang, Jaekyung Choi, Hyunok Oh, Jihye Kim
2019/1240 (PDF ) Forward and Backward Private DSSE for Range Queries Cong Zuo, Shi-Feng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk, Lei Xu
2019/1239 (PDF ) Computationally Modeling User-Mediated Authentication Protocols Britta Hale
2019/1238 (PDF ) Linear-Regression on Packed Encrypted Data in the Two-Server Model Adi Akavia, Hayim Shaul, Mor Weiss, Zohar Yakhini
2019/1237 (PDF ) QFactory: classically-instructed remote secret qubits preparation Alexandru Cojocaru, Léo Colisson, Elham Kashefi, Petros Wallden
2019/1236 (PDF ) Single-Trace Vulnerability of Countermeasures against Instruction-related Timing Attack Bo-Yeon Sim, Dong-Guk Han
2019/1235 (PDF ) Physical Cryptography Mariana Costiuc, Diana Maimut, George Teseleanu
2019/1234 (PDF ) Efficient Homomorphic Comparison Methods with Optimal Complexity Jung Hee Cheon, Dongwoo Kim, Duhyeong Kim
2019/1233 (PDF ) Arbitrary Univariate Function Evaluation and Re-Encryption Protocols over Lifted-ElGamal Type Ciphertexts Koji Nuida, Satsuya Ohata, Shigeo Mitsunari, Nuttapong Attrapadung
2019/1232 (PDF ) Efficient Construction of Nominative Signature Secure under Symmetric Key Primitives and Standard Assumptions on Lattice Meenakshi Kansal, Ratna Dutta, Sourav Mukhopadhyay
2019/1231 (PDF ) Distinguishing LWE Instances Using Fourier Transform: A Refined Framework and its Applications Zhao Chunhuan, Zheng Zhongxiang, Wang Xiaoyun, Xu Guangwu
2019/1230 (PDF ) Linear-Size Constant-Query IOPs for Delegating Computation Eli Ben-Sasson, Alessandro Chiesa, Lior Goldberg, Tom Gur, Michael Riabzev, Nicholas Spooner
2019/1229 (PDF ) Transparent SNARKs from DARK Compilers Benedikt Bünz, Ben Fisch, Alan Szepieniec
2019/1228 (PDF ) Guess what?! On the impossibility of unconditionally secure public-key encryption Lorenz Panny
2019/1227 (PDF ) Dynamic Searchable Encryption with Small Client Storage Ioannis Demertzis, Javad Ghareh Chamani, Dimitrios Papadopoulos, Charalampos Papamanthou
2019/1225 (PDF ) Analysis of Nakamoto Consensus, Revisited Jianyu Niu, Chen Feng, Hoang Dau, Yu-Chih Huang, Jingge Zhu
2019/1224 (PDF ) Practical Volume-Based Attacks on Encrypted Databases Rishabh Poddar, Stephanie Wang, Jianan Lu, Raluca Ada Popa
2019/1223 (PDF ) Integrita: Protecting View-Consistency in Online Social Network with Federated Servers Sanaz Taheri Boshrooyeh, Alptekin Küpçü, Öznur Özkasap
2019/1222 (PDF ) Sub-Linear Privacy-Preserving Near-Neighbor Search M. Sadegh Riazi, Beidi Chen, Anshumali Shrivastava, Dan Wallach, Farinaz Koushanfar
2019/1221 (PDF ) Probabilistic Data Structures in Adversarial Environments David Clayton, Christopher Patton, Thomas Shrimpton
2019/1220 (PDF ) Side-channel Attacks on Blinded Scalar Multiplications Revisited Thomas Roche, Laurent Imbert, Victor Lomné
2019/1219 (PDF ) Multi-Locking and Perfect Argument Order: Two Major Improvements of Attribute-Based Encryption~(Long Paper) Nugier Cyrius, Adelin Remi, Migliore Vincent, Alata Eric
2019/1218 (PDF ) On the Efficiency of Software Implementations of Lightweight Block Ciphers from the Perspective of Programming Languages Abdur Rehman Raza, Khawir Mahmood, Muhammad Faisal Amjad, Haider Abbas, Mehreen Afzal
2019/1216 (PDF ) Automated Search for Block Cipher Differentials: A GPU-Accelerated Branch-and-Bound Algorithm Wei-Zhu Yeoh, Je Sen Teh, Jiageng Chen
2019/1215 (PDF ) Anonyma: Anonymous Invitation-Only Registration in Malicious Adversarial Model Sanaz Taheri Boshrooyeh, Alptekin Küpçü, Öznur Özkasap
2019/1214 (PDF ) A New Secure and Efficient Ownership Transfer Protocol based on Quadric Residue and Homomorphic Encryption Farokhlagha Moazami, Masoumeh Safkhani
2019/1213 (PDF ) Exploring Lightweight Efficiency of ForkAES Fatih Balli, Subhadeep Banik
2019/1212 (PDF ) Swap and Rotate: Lightweight linear layers for SPN-based blockciphers Subhadeep Banik, Fatih Balli, Francesco Regazzoni, Serge Vaudenay
2019/1211 (PDF ) Topology-Hiding Computation for Networks with Unknown Delays Rio LaVigne, Chen-Da Liu-Zhang, Ueli Maurer, Tal Moran, Marta Mularczyk, Daniel Tschudi
2019/1210 (PDF ) Adaptive Security of Practical Garbling Schemes Zahra Jafargholi, Sabine Oechsner
2019/1209 (PDF ) On collisions related to an ideal class of order 3 in CSIDH Hiroshi Onuki, Tsuyoshi Takagi
2019/1208 (PDF ) Towards Post-Quantum Secure Symmetric Cryptography: A Mathematical Perspective Xenia Bogomolec, John Gregory Underhill, Stiepan Aurélien Kovac
2019/1207 (PDF ) Behind multiple trapdoors: A cryptographic commitment scheme for establishing secure communications Borja Gómez
2019/1206 (PDF ) High-Speed Modular Multipliers for Isogeny-Based Post-Quantum Cryptography Jing Tian, Zhe Liu, Jun Lin, Zhongfeng Wang, Binjing Li
2019/1205 (PDF ) Secure Multi-party Quantum Computation with a Dishonest Majority Yfke Dulek, Alex Grilo, Stacey Jeffery, Christian Majenz, Christian Schaffner
2019/1204 (PDF ) Efficient simulation of random states and random unitaries Gorjan Alagic, Christian Majenz, Alexander Russell
2019/1203 (PDF ) Authentication in Key-Exchange: Definitions, Relations and Composition Cyprien Delpech de Saint Guilhem, Marc Fischlin, Bogdan Warinschi
2019/1202 (PDF ) Rational isogenies from irrational endomorphisms Wouter Castryck, Lorenz Panny, Frederik Vercauteren
2019/1201 (PDF ) Efficient Redactable Signature and Application to Anonymous Credentials Olivier Sanders
2019/1200 (PDF ) A note on short invertible ring elements and applications to cyclotomic and trinomials number fields Thomas Attema, Ronald Cramer, Chaoping Xing
2019/1199 (PDF ) Black-Box Wallets: Fast Anonymous Two-Way Payments for Constrained Devices Max Hoffmann, Michael Klooß, Markus Raiber, Andy Rupp
2019/1198 (PDF ) Encrypted Databases: New Volume Attacks against Range Queries Zichen Gui, Oliver Johnson, Bogdan Warinschi
2019/1197 (PDF ) Secret sharing and duality Laszlo Csirmaz
2019/1196 (PDF ) Evaluating Octic Residue Symbols Marc Joye
2019/1195 (PDF ) Non-Malleable Commitments Using Goldreich-Levin List Decoding Vipul Goyal, Silas Richelson
2019/1194 (PDF ) Perfect Forward Security of SPAKE2 Michel Abdalla, Manuel Barbosa
2019/1193 (PDF ) Security models for everlasting privacy Panagiotis Grontas, Aris Pagourtzis, Alexandros Zacharakis
2019/1192 (PDF ) Polynomials Whose Secret Shares Multiplication Preserves Degree for 2-CNF Circuits Over a Dynamic Set of Secrets Daniel Berend, Dor Bitan, Shlomi Dolev
2019/1191 (PDF ) On the equivalence of authentication codes and robust (2,2)-threshold schemes Maura B. Paterson, Douglas R. Stinson
2019/1190 (PDF ) Improving Matsui's Search Algorithm for the Best Differential/Linear Trails and its Applications for DES, DESL and GIFT Fulei Ji, Wentao Zhang, Tianyou Ding
2019/1189 (PDF ) Security Analysis and Improvements for the IETF MLS Standard for Group Messaging Joël Alwen, Sandro Coretti, Yevgeniy Dodis, Yiannis Tselekounis
2019/1188 (PDF ) Improving Password Guessing via Representation Learning Dario Pasquini, Ankit Gangwal, Giuseppe Ateniese, Massimo Bernaschi, Mauro Conti
2019/1187 (PDF ) Adapting Rigidity to Symmetric Cryptography: Towards "Unswerving" Designs Orr Dunkelman, Léo Perrin
2019/1186 (PDF ) Trading Accumulation Size for Witness Size: A Merkle Tree Based Universal Accumulator Via Subset Differences Mahabir Prasad Jhanwar, Pratyush Ranjan Tiwari
2019/1185 (PDF ) Formalising $\Sigma$-Protocols and Commitment Schemes using CryptHOL David Butler, Andreas Lochbihler, David Aspinall, Adria Gascon
2019/1184 (PDF ) A concrete instantiation of Bulletproof zero-knowledge proof Andrey Jivsov
2019/1183 (PDF ) Broadcast-Optimal Two-Round MPC Ran Cohen, Juan Garay, Vassilis Zikas
2019/1182 (PDF ) Robust Secret Sharing with Almost Optimal Share Size and Security Against Rushing Adversaries Serge Fehr, Chen Yuan
2019/1180 (PDF ) Key Recovery from Gram-Schmidt Norm Leakage in Hash-and-Sign Signatures over NTRU Lattices Pierre-Alain Fouque, Paul Kirchner, Mehdi Tibouchi, Alexandre Wallet, Yang Yu
2019/1179 (PDF ) Practical MP-LWE-based encryption balancing security-risk vs. efficiency Ron Steinfeld, Amin Sakzad, Raymond K. Zhao
2019/1178 (PDF ) SoK: Sharding on Blockchain Gang Wang, Zhijie Jerry Shi, Mark Nixon, Song Han
2019/1177 (PDF ) Proofs for Inner Pairing Products and Applications Benedikt Bünz, Mary Maller, Pratyush Mishra, Nirvan Tyagi, Psi Vesely
2019/1176 (PDF ) The Thirteenth Power Residue Symbol Eric Brier, David Naccache
2019/1175 (PDF ) Revisiting Leakage Abuse Attacks Laura Blackstone, Seny Kamara, Tarik Moataz
2019/1174 (PDF ) Hidden Irreducible Polynomials : A cryptosystem based on Multivariate Public Key Cryptography Borja Gómez
2019/1173 (PDF ) Immunization against Complete Subversion without Random Oracles Giuseppe Ateniese, Danilo Francati, Bernardo Magri, Daniele Venturi
2019/1172 (PDF ) Lever: Breaking the Shackles of Scalable On-chain Validation Mingming Wang, Qianhong Wu
2019/1171 (PDF ) Almost universal codes for MIMO wiretap channels Laura Luzzi, Roope Vehkalahti, Cong Ling
2019/1170 (PDF ) Space-efficient quantum multiplication of polynomials for binary finite fields with sub-quadratic Toffoli gate count Iggy van Hoof
2019/1169 (PDF ) Semantically Secure Lattice Codes for Compound MIMO Channels Antonio Campello, Cong Ling, Jean-Claude Belfiore
2019/1168 (PDF ) Better Concrete Security for Half-Gates Garbling (in the Multi-Instance Setting) Chun Guo, Jonathan Katz, Xiao Wang, Chenkai Weng, Yu Yu
2019/1167 (PDF ) BLAZE: Practical Lattice-Based Blind Signatures for Privacy-Preserving Applications Nabil Alkeilani Alkadri, Rachid El Bansarkhani, Johannes Buchmann
2019/1166 (PDF ) The complete cost of cofactor h=1 Peter Schwabe, Amber Sprenkels
2019/1165 (PDF ) Fast verification of masking schemes in characteristic two Nicolas Bordes, Pierre Karpman
2019/1164 (PDF ) Identity-Concealed Authenticated Encryption from Ring Learning With Errors (Full version) Chao Liu, Zhongxiang Zheng, Keting Jia, Limin Tao
2019/1163 (PDF ) On the Difficulty of FSM-based Hardware Obfuscation Marc Fyrbiak, Sebastian Wallat, Jonathan Déchelotte, Nils Albartus, Sinan Böcker, Russell Tessier, Christof Paar
2019/1162 (PDF ) Subversion-Resistant Simulation (Knowledge) Sound NIZKs Karim Baghery
2019/1161 (PDF ) Estimating quantum speedups for lattice sieves Martin R. Albrecht, Vlad Gheorghiu, Eamonn W. Postlethwaite, John M. Schanck
2019/1160 (PDF ) Cryptanalysis of the Multivariate Encryption Scheme EFLASH Morten Øygarden, Patrick Felke, Håvard Raddum, Carlos Cid
2019/1159 (PDF ) Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Rindal, Peter Scholl
2019/1158 (PDF ) Practical Privacy-Preserving K-means Clustering Payman Mohassel, Mike Rosulek, Ni Trieu
2019/1157 (PDF ) A Note on the Chi-square Method : A Tool for Proving Cryptographic Security Srimanta Bhattacharya, Mridul Nandi
2019/1156 (PDF ) How to Extract Useful Randomness from Unreliable Sources Divesh Aggarwal, Maciej Obremski, João Ribeiro, Luisa Siniscalchi, Ivan Visconti
2019/1155 (PDF ) Machine-Checked Proofs for Cryptographic Standards José Bacelar Almeida, Cécile Baritel-Ruet, Manuel Barbosa, Gilles Barthe, François Dupressoir, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, Alley Stoughton, Pierre-Yves Strub
2019/1154 (PDF ) The Retracing Boomerang Attack Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir
2019/1153 (PDF ) Stronger Security and Constructions of Multi-Designated Verifier Signatures Ivan Damgård, Helene Haagh, Rebekah Mercer, Anca Nițulescu, Claudio Orlandi, Sophia Yakoubov
2019/1152 (PDF ) Active Fences against Voltage-based Side Channels in Multi-Tenant FPGAs Jonas Krautter, Dennis R. E. Gnad, Falk Schellenberg, Amir Moradi, Mehdi B. Tahoori
2019/1151 (PDF ) Non-Committing Encryption with Quasi-Optimal Ciphertext-Rate Based on the DDH Problem Yusuke Yoshida, Fuyuki Kitagawa, Keisuke Tanaka
2019/1150 (PDF ) The Bitcoin Backbone Protocol Against Quantum Adversaries Alexandru Cojocaru, Juan Garay, Aggelos Kiayias, Fang Song, Petros Wallden
2019/1149 (PDF ) LockDown: Balance Availability Attack against Lightning Network Channels Cristina Pérez-Solà, Alejandro Ranchal-Pedrosa, Jordi Herrera-Joancomartí, Guillermo Navarro-Arribas, Joaquin Garcia-Alfaro
2019/1148 (PDF ) On the Feasibility and Impact of Standardising Sparse-secret LWE Parameter Sets for Homomorphic Encryption Benjamin R. Curtis, Rachel Player
2019/1147 (PDF ) Batching non-membership proofs with bilinear accumulators Steve Thakur
2019/1146 (PDF ) Implementing Grover oracles for quantum key search on AES and LowMC Samuel Jaques, Michael Naehrig, Martin Roetteler, Fernando Virdia
2019/1145 (PDF ) B-SIDH: supersingular isogeny Diffie-Hellman using twisted torsion Craig Costello
2019/1144 (PDF ) Rerandomizable Signatures under Standard Assumption Sanjit Chatterjee, R. Kabaleeshwaran
2019/1143 (PDF ) Auditable Compressed Storage Iraklis Leontiadis, Reza Curtmola
2019/1142 (PDF ) Lattice Reduction for Modules, or How to Reduce ModuleSVP to ModuleSVP Tamalika Mukherjee, Noah Stephens-Davidowitz
2019/1141 (PDF ) KORGAN: An Efficient PKI Architecture Based on PBFT Through Dynamic Threshold Signatures Murat Yasin Kubilay, Mehmet Sabir Kiraz, Haci Ali Mantar
2019/1140 (PDF ) Sapphire: A Configurable Crypto-Processor for Post-Quantum Lattice-based Protocols (Extended Version) Utsav Banerjee, Tenzin S. Ukyab, Anantha P. Chandrakasan
2019/1139 (PDF ) Coded Merkle Tree: Solving Data Availability Attacks in Blockchains Mingchao Yu, Saeid Sahraei, Songze Li, Salman Avestimehr, Sreeram Kannan, Pramod Viswanath
2019/1138 (PDF ) ChainSplitter: Towards Blockchain-based Industrial IoT Architecture for Supporting Hierarchical Storage Gang Wang, Zhijie Jerry Shi, Mark Nixon, Song Han
2019/1137 (PDF ) On the Complexity of Arithmetic Secret Sharing Ronald Cramer, Chaoping Xing, Chen Yuan
2019/1136 (PDF ) An implementation of the Paillier crypto system with threshold decryption without a trusted dealer Thijs Veugen, Thomas Attema, Gabriele Spini
2019/1135 (PDF ) A Provably Secure Conditional Proxy Re-Encryption Scheme without Pairing Arinjita Paul, S. Sharmila Deva Selvi, C. Pandu Rangan
2019/1134 (PDF ) Blackbox Secret Sharing Revisited: A Coding-Theoretic Approach with Application to Expansionless Near-Threshold Schemes Ronald Cramer, Chaoping Xing
2019/1133 (PDF ) Threat Models and Security of Phase-Change Memory Gang Wang
2019/1132 (PDF ) Lower Bounds for Encrypted Multi-Maps and Searchable Encryption in the Leakage Cell Probe Model Sarvar Patel, Giuseppe Persiano, Kevin Yeo
2019/1131 (PDF ) Nearly Optimal Robust Secret Sharing against Rushing Adversaries Pasin Manurangsi, Akshayaram Srinivasan, Prashant Nalini Vasudevan
2019/1130 (PDF ) On affine Cremona semigroups, corresponding protocols of Non-commutative Cryptography and encryption with several nonlinear multivariate transformations on secure Eulerian mode. V. Ustimenko
2019/1129 (PDF ) Privacy-Enhanced Machine Learning with Functional Encryption Tilen Marc, Miha Stopar, Jan Hartman, Manca Bizjak, Jolanda Modic
2019/1128 (PDF ) SoK: Communication Across Distributed Ledgers Alexei Zamyatin, Mustafa Al-Bassam, Dionysis Zindros, Eleftherios Kokoris-Kogias, Pedro Moreno-Sanchez, Aggelos Kiayias, William J. Knottenbelt
2019/1127 (PDF ) Symmetric-key Corruption Detection : When XOR-MACs Meet Combinatorial Group Testing Kazuhiko Minematsu, Norifumi Kamiya
2019/1126 (PDF ) Encrypted Distributed Hash Tables Archita Agarwal, Seny Kamara
2019/1125 (PDF ) Breaking Anonymity of Some Recent Lightweight RFID Authentication Protocols Karim Baghery, Behzad Abdolmaleki, Shahram Khazaei, Mohammad Reza Aref
2019/1124 (PDF ) Evolving Ramp Secret Sharing with a Small Gap Amos Beimel, Hussien Othman
2019/1123 (PDF ) FSPVDsse: A Forward Secure Publicly Verifiable Dynamic SSE scheme Laltu Sardar, Sushmita Ruj
2019/1122 (PDF ) Exploring Trade-offs in Batch Bounded Distance Decoding Martin R. Albrecht, Benjamin R. Curtis, Thomas Wunderer
2019/1121 (PDF ) Further Optimizations of CSIDH: A Systematic Approach to Efficient Strategies, Permutations, and Bound Vectors Aaron Hutchinson, Jason LeGrow, Brian Koziel, Reza Azarderakhsh
2019/1120 (PDF ) Structure-Preserving Signatures on Equivalence Classes From Standard Assumptions Mojtaba Khalili, Daniel Slamanig, Mohammad Dakhilalian
2019/1119 (PDF ) MicroSCOPE: Enabling Access Control in Searchable Encryption with the use of Attribute-based Encryption and SGX (Extended Version) Antonis Michalas, Alexandros Bakas, Hai-Van Dang, Alexandr Zalitko
2019/1118 (PDF ) A Diffie-Hellman quantum session key establishment protocol without entanglement Yalin Chen, Chang Hsiang, Liang-Chun Wang, Yu-Yuan Chou, Jue-Sam Chou
2019/1116 (PDF ) Computational Extractors with Negligible Error in the CRS Model Ankit Garg, Yael Tauman Kalai, Dakshita Khurana
2019/1115 (PDF ) Collision Attacks on Round-Reduced Gimli-Hash/Ascon-Xof/Ascon-Hash Rui Zong, Xiaoyang Dong, Xiaoyun Wang
2019/1114 (PDF ) A Hybrid of Dual and Meet-in-the-Middle Attack on Sparse and Ternary Secret LWE Jung Hee Cheon, Minki Hhan, Seungwan Hong, Yongha Son
2019/1113 (PDF ) Towards a Homomorphic Machine Learning Big Data Pipeline for the Financial Services Sector Oliver Masters, Hamish Hunt, Enrico Steffinlongo, Jack Crawford, Flavio Bergamaschi, Maria E. Dela Rosa, Caio C. Quini, Camila T. Alves, Feranda de Souza, Deise G. Ferreira
2019/1112 (PDF ) Subliminal Hash Channels George Teseleanu
2019/1111 (PDF ) Short Paper: Towards Characterizing Sybil Attacks in Cryptocurrency Mixers Mikerah Quintyne-Collins
2019/1109 (PDF ) Revisiting Multivariate Ring Learning with Errors and its Applications on Lattice-based Cryptography Alberto Pedrouzo-Ulloa, Juan Ramón Troncoso-Pastoriza, Nicolas Gama, Mariya Georgieva, Fernando Pérez-González
2019/1108 (PDF ) Lower Bounds for Multi-Server Oblivious RAMs Kasper Green Larsen, Mark Simkin, Kevin Yeo
2019/1107 (PDF ) On a Generalization of Substitution-Permutation Networks: The HADES Design Strategy Lorenzo Grassi, Reinhard Lüftenegger, Christian Rechberger, Dragos Rotaru, Markus Schofnegger
2019/1106 (PDF ) Side-channel Masking with Pseudo-Random Generator Jean-Sébastien Coron, Aurélien Greuet, Rina Zeitoun
2019/1105 (PDF ) On the Multi-User Security of Short Schnorr Signatures with Preprocessing Jeremiah Blocki, Seunghoon Lee
2019/1104 (PDF ) More Efficient MPC from Improved Triple Generation and Authenticated Garbling Kang Yang, Xiao Wang, Jiang Zhang
2019/1103 (PDF ) Multisketches: Practical Secure Sketches Using Off-the-Shelf Biometric Matching Algorithms Rahul Chatterjee, M. Sadegh Riazi, Tanmoy Chowdhury, Emanuela Marasco, Farinaz Koushanfar, Ari Juels
2019/1101 (PDF ) On the (Quantum) Random Oracle Methodology: New Separations and More Jiang Zhang, Yu Yu, Dengguo Feng, Shuqin Fan, Zhenfeng Zhang
2019/1100 (PDF ) Efficient Explicit Constructions of Multipartite Secret Sharing Schemes Qi Chen, Chunming Tang, Zhiqiang Lin
2019/1099 (PDF ) On the Feasibility of Fine-Grained TLS Security Configurations in Web Browsers Based on the Requested Domain Name Eman Salem Alashwali, Kasper Rasmussen
2019/1098 (PDF ) Full-Threshold Actively-Secure Multiparty Arithmetic Circuit Garbling Eleftheria Makri, Tim Wood
2019/1097 (PDF ) Anonymous Transactions with Revocation and Auditing in Hyperledger Fabric Dmytro Bogatov, Angelo De Caro, Kaoutar Elkhiyaoui, Björn Tackmann
2019/1096 (PDF ) Proof-of-Burn Kostis Karantias, Aggelos Kiayias, Dionysis Zindros
2019/1095 (PDF ) Secure Computation with Preprocessing via Function Secret Sharing Elette Boyle, Niv Gilboa, Yuval Ishai
2019/1094 (PDF ) Is Information-Theoretic Topology-Hiding Computation Possible? Marshall Ball, Elette Boyle, Ran Cohen, Tal Malkin, Tal Moran
2019/1093 (PDF ) Quantum Random Oracle Model with Auxiliary Input Minki Hhan, Keita Xagawa, Takashi Yamakawa
2019/1092 (PDF ) Cerberus Channels: Incentivizing Watchtowers for Bitcoin Georgia Avarikioti, Orfeas Stefanos Thyfronitis Litos, Roger Wattenhofer
2019/1091 (PDF ) Short Paper: XOR Arbiter PUFs have Systematic Response Bias Nils Wisiol, Niklas Pirnay
2019/1090 (PDF ) Low Complexity MDS Matrices Using $GF(2^n)$ SPB or GPB Xinggu Chen, Haining Fan
2019/1089 (PDF ) Lattice-Face Key Infrastructure (LFKI) for Quantum Resistant Computing Josiah Johnson Umezurike
2019/1088 (PDF ) KRNC: New Foundations for Permissionless Byzantine Consensus and Global Monetary Stability Clinton Ehrlich, Anna Guzova
2019/1087 (PDF ) Cryptanalysis of a Protocol for Efficient Sorting on SHE Encrypted Data Shyam Murthy, Srinivas Vivek
2019/1086 (PDF ) The SPHINCS+ Signature Framework Daniel J. Bernstein, Andreas Hülsing, Stefan Kölbl, Ruben Niederhagen, Joost Rijneveld, Peter Schwabe
2019/1085 (PDF ) Matrix PRFs: Constructions, Attacks, and Applications to Obfuscation Yilei Chen, Minki Hhan, Vinod Vaikuntanathan, Hoeteck Wee
2019/1084 (PDF ) Distributed Vector-OLE: Improved Constructions and Implementation Phillipp Schoppmann, Adrià Gascón, Leonie Reichert, Mariana Raykova
2019/1083 (PDF ) What's in a Downgrade? A Taxonomy of Downgrade Attacks in the TLS Protocol and Application Protocols Using TLS Eman Salem Alashwali, Kasper Rasmussen
2019/1082 (PDF ) On the Security of Multikey Homomorphic Encryption Hyang-Sook Lee, Jeongeun Park
2019/1081 (PDF ) OCEAN: A Built-In Replacement for Mining Pools Raymond Chee, Kartik Chitturi, Edouard Dufour-Sans, Kyle Soska
2019/1080 (PDF ) Preimages and Collisions for Up to 5-Round Gimli-Hash Using Divide-and-Conquer Methods Fukang Liu, Takanori Isobe, Willi Meier
2019/1079 (PDF ) When NTT Meets Karatsuba: Preprocess-then-NTT Technique Revisited Yiming Zhu, Zhen Liu, Yanbin Pan
2019/1078 (PDF ) Puncturable Proxy Re-Encryption supporting to Group Messaging Service Tran Viet Xuan Phuong, Willy Susilo, Jongkil Kim, Guomin Yang, Dongxi Liu
2019/1077 (PDF ) Adaptively Secure Garbling Schemes for Parallel Computations Kai-Min Chung, Luowen Qian
2019/1076 (PDF ) Fractal: Post-Quantum and Transparent Recursive Proofs from Holography Alessandro Chiesa, Dev Ojha, Nicholas Spooner
2019/1075 (PDF ) Private Information Retrieval with Sublinear Online Time Henry Corrigan-Gibbs, Dmitry Kogan
2019/1074 (PDF ) Non-monotonic Practical ABE with Direct Revocation, Blackbox Traceability, and a Large Attribute Universe Dirk Thatmann
2019/1073 (PDF ) iUC: Flexible Universal Composability Made Simple Jan Camenisch, Stephan Krenn, Ralf Kuesters, Daniel Rausch
2019/1072 (PDF ) Rate-1 Trapdoor Functions from the Diffie-Hellman Problem Nico Döttling, Sanjam Garg, Mohammad Hajiabadi, Kevin Liu, Giulio Malavolta
2019/1071 (PDF ) DLSCA: a Tool for Deep Learning Side Channel Analysis Martin Brisfors, Sebastian Forsmark
2019/1070 (PDF ) Secure Delegation of Isogeny Computations and Cryptographic Applications Robi Pedersen, Osmanbey Uzunkol
2019/1069 (PDF ) Efficient Private PEZ Protocols for Symmetric Functions Yoshiki Abe, Mitsugu Iwamoto, Kazuo Ohta
2019/1068 (PDF ) Not a Free Lunch but a Cheap Lunch: Experimental Results for Training Many Neural Nets Efficiently Joey Green, Tilo Burghardt, Elisabeth Oswald
2019/1067 (PDF ) Lattice Trapdoors and IBE from Middle-Product LWE Alex Lombardi, Vinod Vaikuntanathan, Thuy Duong Vuong
2019/1066 (PDF ) HEAX: An Architecture for Computing on Encrypted Data M. Sadegh Riazi, Kim Laine, Blake Pelton, Wei Dai
2019/1065 (PDF ) Subversion-Resistant Commitment Schemes: Definitions and Constructions Karim Baghery
2019/1064 (PDF ) Separating Symmetric and Asymmetric Password-Authenticated Key Exchange Julia Hesse
2019/1063 (PDF ) A Framework for UC-Secure Commitments from Publicly Computable Smooth Projective Hashing Behzad Abdolmaleki, Hamidreza Khoshakhlagh, Daniel Slamanig
2019/1062 (PDF ) Local Proofs Approaching the Witness Length Noga Ron-Zewi, Ron D. Rothblum
2019/1061 (PDF ) Breaking and Fixing Anonymous Credentials for the Cloud Ulrich Haböck, Stephan Krenn
2019/1060 (PDF ) Sharing the LUOV: Threshold Post-Quantum Signatures Daniele Cozzo, Nigel P. smart
2019/1059 (PDF ) A New Method for Geometric Interpretation of Elliptic Curve Discrete Logarithm Problem Daniele Di Tullio, Ankan Pal
2019/1058 (PDF ) Privacy-preserving auditable token payments in a permissioned blockchain system Elli Androulaki, Jan Camenisch, Angelo De Caro, Maria Dubovitskaya, Kaoutar Elkhiyaoui, Björn Tackmann
2019/1057 (PDF ) A Study of Persistent Fault Analysis Andrea Caforio, Subhadeep Banik
2019/1056 (PDF ) Adventures in Supersingularland Sarah Arpin, Catalina Camacho-Navarro, Kristin Lauter, Joelle Lim, Kristina Nelson, Travis Scholl, Jana Sotáková
2019/1055 (PDF ) Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy Cong Zuo, Shi-Feng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk
2019/1054 (PDF ) Truthful and Faithful Monetary Policy for a Stablecoin Conducted by a Decentralised, Encrypted Artificial Intelligence David Cerezo Sánchez
2019/1053 (PDF ) Modeling Memory Faults in Signature and Authenticated Encryption Schemes Marc Fischlin, Felix Günther
2019/1052 (PDF ) Improved Cryptanalysis of the KMOV Elliptic Curve Cryptosystem Abderrahmane Nitaj, Willy Susilo, Joseph Tonien
2019/1051 (PDF ) A New Public Key Cryptosystem Based on Edwards Curves Maher Boudabra, Abderrahmane Nitaj
2019/1050 (PDF ) A New Attack on RSA and Demytko's Elliptic Curve Cryptosystem Abderrahmane Nitaj, Emmanuel Fouotsa
2019/1049 (PDF ) CrypTFlow: Secure TensorFlow Inference Nishant Kumar, Mayank Rathee, Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma
2019/1048 (PDF ) New point compression method for elliptic $\mathbb{F}_{\!q^2}$-curves of $j$-invariant $0$ Dmitrii Koshelev
2019/1047 (PDF ) Marlin: Preprocessing zkSNARKs with Universal and Updatable SRS Alessandro Chiesa, Yuncong Hu, Mary Maller, Pratyush Mishra, Psi Vesely, Nicholas Ward
2019/1046 (PDF ) The Function-Inversion Problem: Barriers and Opportunities Henry Corrigan-Gibbs, Dmitry Kogan
2019/1045 (PDF ) Predicate Encryption from Bilinear Maps and One-Sided Probabilistic Rank Josh Alman, Robin Hui
2019/1044 (PDF ) Verifiable Registration-Based Encryption Rishab Goyal, Satyanarayana Vusirikala
2019/1043 (PDF ) Breaking the Bluetooth Pairing – The Fixed Coordinate Invalid Curve Attack Eli Biham, Lior Neumann
2019/1042 (PDF ) A Machine-Checked Proof of Security for AWS Key Management Service José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Matthew Campagna, Ernie Cohen, Benjamin Gregoire, Vitor Pereira, Bernardo Portela, Pierre-Yves Strub, Serdar Tasiran
2019/1041 (PDF ) A Conditional Privacy Preserving Authentication and Multi Party Group Key Establishment Scheme for Real-Time Application in VANETs Swapnil Paliwal, Anvita Chandrakar
2019/1040 (PDF ) Hardware-Software Co-Design Based Obfuscation of Hardware Accelerators Abhishek Chakraborty, Ankur Srivastava
2019/1039 (PDF ) Accelerated V2X provisioning with Extensible Processor Platform Henrique S. Ogawa, Thomas E. Luther, Jefferson E. Ricardini, Helmiton Cunha, Marcos Simplicio Jr., Diego F. Aranha, Ruud Derwig, Harsh Kupwade-Patil
2019/1038 (PDF ) Dynamic Searchable Encryption with Access Control Johannes Blömer, Nils Löken
2019/1037 (PDF ) Card-based Cryptography Meets Formal Verification Alexander Koch, Michael Schrempp, Michael Kirsten
2019/1036 (PDF ) Post-Quantum Variants of ISO/IEC Standards: Compact Chosen Ciphertext Secure Key Encapsulation Mechanism from Isogenies Kazuki Yoneyama
2019/1035 (PDF ) An LLL Algorithm for Module Lattices Changmin Lee, Alice Pellet-Mary, Damien Stehlé, Alexandre Wallet
2019/1034 (PDF ) Sponges Resist Leakage: The Case of Authenticated Encryption Jean Paul Degabriele, Christian Janson, Patrick Struck
2019/1033 (PDF ) Anonymous AE John Chan, Phillip Rogaway
2019/1032 (PDF ) On Fully Secure MPC with Solitary Output Shai Halevi, Yuval Ishai, Eyal Kushilevitz, Nikolaos Makriyannis, Tal Rabin
2019/1031 (PDF ) An efficient and secure ID-based multi-proxy multi-signature scheme based on lattice Rahim Toluee, Taraneh Eghlidos
2019/1030 (PDF ) How to leverage hardness of constant degree expanding polynomials over R to build iO Aayush Jain, Huijia Lin, Christian Matt, Amit Sahai
2019/1029 (PDF ) Approximate Trapdoors for Lattices and Smaller Hash-and-Sign Signatures Yilei Chen, Nicholas Genise, Pratyay Mukherjee
2019/1028 (PDF ) Faster Sieving Algorithm for Approximate SVP with Constant Approximation Factors Divesh Aggarwal, Bogdan Ursu, Serge Vaudenay
2019/1027 (PDF ) Quantum LLL with an Application to Mersenne Number Cryptosystems Marcel Tiepelt, Alan Szepieniec
2019/1026 (PDF ) Efficient Tightly-Secure Structure-Preserving Signatures and Unbounded Simulation-Sound QA-NIZK Proofs Mojtaba Khalili, Daniel Slamanig
2019/1025 (PDF ) On Perfect Correctness without Derandomization Gilad Asharov, Naomi Ephraim, Ilan Komargodski, Rafael Pass
2019/1024 (PDF ) Optimal-Round Preprocessing-MPC via Polynomial Representation and Distributed Random Matrix Dor Bitan, Shlomi Dolev
2019/1023 (PDF ) Randomly Choose an Angle from Immense Number of Angles to Rotate Qubits, Compute and Reverse Dor Bitan, Shlomi Dolev
2019/1022 (PDF ) A Simple and Efficient Key Reuse Attack on NTRU Cryptosystem Jintai Ding, Joshua Deaton, Kurt Schmidt, Vishakha, Zheng Zhang
2019/1021 (PDF ) Recursive Proof Composition without a Trusted Setup Sean Bowe, Jack Grigg, Daira Hopwood
2019/1020 (PDF ) Transparent Polynomial Commitment Scheme with Polylogarithmic Communication Complexity Alexander Vlasov, Konstantin Panarin
2019/1019 (PDF ) Revisiting the Hybrid attack on sparse and ternary secret LWE Yongha Son, Jung Hee Cheon
2019/1018 (PDF ) Towards Instantiating the Algebraic Group Model Julia Kastner, Jiaxin Pan
2019/1017 (PDF ) The Local Forking Lemma and its Application to Deterministic Encryption Mihir Bellare, Wei Dai, Lucy Li
2019/1016 (PDF ) Quantum Algorithms for the Approximate $k$-List Problem and their Application to Lattice Sieving Elena Kirshanova, Erik Mårtensson, Eamonn W. Postlethwaite, Subhayan Roy Moulik
2019/1015 (PDF ) Asynchronous Distributed Key Generation for Computationally-Secure Randomness, Consensus, and Threshold Signatures. Eleftherios Kokoris-Kogias, Dahlia Malkhi, Alexander Spiegelman
2019/1014 (PDF ) Security Reductions for White-Box Key-Storage in Mobile Payments Estuardo Alpirez Bock, Chris Brzuska, Marc Fischlin, Christian Janson, Wil Michiels
2019/1013 (PDF ) A Critical Analysis of ISO 17825 (`Testing methods for the mitigation of non-invasive attack classes against cryptographic modules') Carolyn Whitnall, Elisabeth Oswald
2019/1012 (PDF ) Simple and Efficient KDM-CCA Secure Public Key Encryption Fuyuki Kitagawa, Takahiro Matsuda, Keisuke Tanaka
2019/1011 (PDF ) COSAC: COmpact and Scalable Arbitrary-Centered Discrete Gaussian Sampling over Integers Raymond K. Zhao, Ron Steinfeld, Amin Sakzad
2019/1010 (PDF ) On Perfect Correctness in (Lockable) Obfuscation Rishab Goyal, Venkata Koppula, Satyanarayana Vusirikala, Brent Waters
2019/1009 (PDF ) LLL and stochastic sandpile models Jintai Ding, Seungki Kim, Tsuyoshi Takagi, Yuntao Wang
2019/1008 (PDF ) Side-Channel Countermeasures' Dissection and the Limits of Closed Source Security Evaluations Olivier Bronchain, François-Xavier Standaert
2019/1007 (PDF ) SPAE a mode of operation for AES on low-cost hardware Philippe Elbaz-Vincent, Cyril Hugounenq, Sébastien Riou
2019/1006 (PDF ) Lucente Stabile Atkins (LSA) Cryptosystem (Unbreakable) Francesco Lucente Stabile, Carey Patrick Atkins
2019/1005 (PDF ) Threshold Implementations in the Robust Probing Model Siemen Dhooghe, Svetla Nikova, Vincent Rijmen
2019/1004 (PDF ) Forkcipher: a New Primitive for Authenticated Encryption of Very Short Messages Elena Andreeva, Virginie Lallemand, Antoon Purnal, Reza Reyhanitabar, Arnab Roy, Damian Vizar
2019/1003 (PDF ) Twisted Hessian Isogenies Thinh Dang, Dustin Moody
2019/1002 (PDF ) Boomerang Uniformity of Popular S-box Constructions Shizhu Tian, Christina Boura, Léo Perrin
2019/1001 (PDF ) Middle-Product Learning with Rounding Problem and its Applications Shi Bai, Katharina Boudgoust, Dipayan Das, Adeline Roux-Langlois, Weiqiang Wen, Zhenfei Zhang
2019/1000 (PDF ) Security of Symmetric Primitives against Key-Correlated Attacks Aisling Connolly, Pooya Farshim, Georg Fuchsbauer
2019/999 (PDF ) On the Fast Algebraic Immunity of Majority Functions Pierrick Méaux
2019/998 (PDF ) Beyond Honest Majority: The Round Complexity of Fair and Robust Multi-party Computation Arpita Patra, Divya Ravi
2019/997 (PDF ) On the (In)security of Kilian-Based SNARGs James Bartusek, Liron Bronfman, Justin Holmgren, Fermi Ma, Ron Rothblum
2019/996 (PDF ) Pseudorandom Black Swans: Cache Attacks on CTR_DRBG Shaanan Cohney, Andrew Kwong, Shachar Paz, Daniel Genkin, Nadia Heninger, Eyal Ronen, Yuval Yarom
2019/995 (PDF ) Blackbox Constructions from Mix-Nets Douglas Wikström
2019/994 (PDF ) A new family of APN quadrinomials Lilya Budaghyan, Tor Helleseth, Nikolay Kaleyski
2019/993 (PDF ) Private Set Relations with Bloom Filters for Outsourced SLA Validation Louis Tajan, Dirk Westhoff, Frederik Armknecht
2019/992 (PDF ) Duel of the Titans: The Romulus and Remus Families of Lightweight AEAD Algorithms Tetsu Iwata, Mustafa Khairallah, Kazuhiko Minematsu, Thomas Peyrin
2019/991 (PDF ) Vectorized linear approximations for attacks on SNOW 3G Jing Yang, Thomas Johansson, Alexander Maximov
2019/990 (PDF ) Efficient Range-Trapdoor Functions and Applications: Rate-1 OT and More Sanjam Garg, Mohammad Hajiabadi, Rafail Ostrovsky
2019/989 (PDF ) Substitution Attacks against Message Authentication Marcel Armour, Bertram Poettering
2019/988 (PDF ) RAMPARTS: A Programmer-Friendly System for Building Homomorphic Encryption Applications David W. Archer, Jose Manuel Calderon Trilla, Jason Dagit, Alex J. Malozemoff, Yuriy Polyakov, Kurt Rohloff, Gerard Ryan
2019/987 (PDF ) Subverting Decryption in AEAD Marcel Armour, Bertram Poettering
2019/986 (PDF ) Outpost: A Responsive Lightweight Watchtower Majid Khabbazian, Tejaswi Nadahalli, Roger Wattenhofer
2019/985 (PDF ) EthDKG: Distributed Key Generation with Ethereum Smart Contracts Philipp Schindler, Aljosha Judmayer, Nicholas Stifter, Edgar Weippl
2019/984 (PDF ) Collusion Resistant Trace-and-Revoke for Arbitrary Identities from Standard Assumptions Sam Kim, David J. Wu
2019/983 (PDF ) Graph Similarity and Its Applications to Hardware Security Marc Fyrbiak, Sebastian Wallat, Sascha Reinhard, Nicolai Bissantz, Christof Paar
2019/982 (PDF ) CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (not $\mathtt{q}$-type) Assumptions Toi Tomita, Wakaha Ogata, Kaoru Kurosawa, Ryo Kuwayama
2019/981 (PDF ) Traceback for End-to-End Encrypted Messaging Nirvan Tyagi, Ian Miers, Thomas Ristenpart
2019/980 (PDF ) New Approaches to Traitor Tracing with Embedded Identities Rishab Goyal, Venkata Koppula, Brent Waters
2019/979 (PDF ) PrivFL: Practical Privacy-preserving Federated Regressions on High-dimensional Data over Mobile Networks Kalikinkar Mandal, Guang Gong
2019/978 (PDF ) Strength in Numbers: Improving Generalization with Ensembles in Profiled Side-channel Analysis Guilherme Perin, Lukasz Chmielewski, Stjepan Picek
2019/977 (PDF ) Non-malleable Zero-Knowledge Arguments with Lower Round Complexity Zhenbin Yan, Yi Deng
2019/976 (PDF ) Towards real-time hidden speaker recognition by means of fully homomorphic encryption Martin Zuber, Sergiu Carpov, Renaud Sirdey
2019/974 (PDF ) Zaphod: Efficiently Combining LSSS and Garbled Circuits in SCALE Abdelrahaman Aly, Emmanuela Orsini, Dragos Rotaru, Nigel P. Smart, Tim Wood
2019/973 (PDF ) On the Non-Existence of Short Vectors in Random Module Lattices Ngoc Khanh Nguyen
2019/972 (PDF ) Noninteractive Zero Knowledge Proof System for NP from Ring LWE Wenping MA
2019/971 (PDF ) Verifpal: Cryptographic Protocol Analysis for the Real World Nadim Kobeissi, Georgio Nicolas, Mukesh Tiwari
2019/969 (PDF ) Succinct Arguments for Bilinear Group Arithmetic: Practical Structure-Preserving Cryptography Russell W. F. Lai, Giulio Malavolta, Viktoria Ronge
2019/968 (PDF ) There Are 10 Types of Vectors (and Polynomials): Efficient Zero-Knowledge Proofs of "One-Hotness" via Polynomials with One Zero William Black, Ryan Henry
2019/967 (PDF ) On NIST's Compression Estimate Test Prasanna Raghaw Mishra, Bhartendu Nandan, Navneet Gaba
2019/966 (PDF ) Fast, Compact, and Expressive Attribute-Based Encryption Junichi Tomida, Yuto Kawahara, Ryo Nishimaki
2019/965 (PDF ) Beyond Security and Efficiency: On-Demand Ratcheting with Security Awareness Andrea Caforio, F Betül Durak, Serge Vaudenay
2019/964 (PDF ) WI Is Not Enough: Zero-Knowledge Contingent (Service) Payments Revisited Georg Fuchsbauer
2019/963 (PDF ) Faster homomorphic encryption is not enough: improved heuristic for multiplicative depth minimization of Boolean circuits Pascal Aubry, Sergiu Carpov, Renaud Sirdey
2019/962 (PDF ) New Constructions of Hinting PRGs, OWFs with Encryption, and more Rishab Goyal, Satyanarayana Vusirikala, Brent Waters
2019/961 (PDF ) Computing across Trust Boundaries using Distributed Homomorphic Cryptography Christian Mouchet, Juan Troncoso-Pastoriza, Jean-Pierre Hubaux
2019/960 (PDF ) Another Look at Key Randomisation Hypotheses Subhabrata Samajder, Palash Sarkar
2019/959 (PDF ) Table Redundancy Method for Protecting against Fault Attacks Seungkwang Lee, Nam-su Jho, Myungchul Kim
2019/958 (PDF ) Using SMT Solvers to Automate Chosen Ciphertext Attacks Gabrielle Beck, Maximilian Zinkus, Matthew Green
2019/957 (PDF ) TaaS: Commodity MPC via Triples-as-a-Service Nigel P. Smart, Titouan Tanguy
2019/956 (PDF ) Security of Hedged Fiat-Shamir Signatures under Fault Attacks Diego F. Aranha, Claudio Orlandi, Akira Takahashi, Greg Zaverucha
2019/955 (PDF ) Structure-Preserving and Re-randomizable RCCA-secure Public Key Encryption and its Applications Antonio Faonio, Dario Fiore, Javier Herranz, Carla Ràfols
2019/954 (PDF ) CPA on Hardware Implementation of COLM Authenticated Cipher and Protect it with DOM Masking Scheme Mohsen Jahanbani, Zeinolabedin Norouzi, Nasour Bagheri
2019/953 (PDF ) PLONK: Permutations over Lagrange-bases for Oecumenical Noninteractive arguments of Knowledge Ariel Gabizon, Zachary J. Williamson, Oana Ciobotaru
2019/952 (PDF ) Non-Interactive Zero Knowledge Proofs in the Random Oracle Model Vincenzo Iovino, Ivan Visconti
2019/951 (PDF ) Collisions on Feistel-MiMC and univariate GMiMC Xavier Bonnetain
2019/950 (PDF ) Another look at some isogeny hardness assumptions Simon-Philipp Merz, Romy Minko, Christophe Petit
2019/949 (PDF ) A Note on Parameter Choices of Round5 Yongha Son
2019/948 (PDF ) Generic Side-channel attacks on CCA-secure lattice-based PKE and KEM schemes Prasanna Ravi, Sujoy Sinha Roy, Anupam Chattopadhyay, Shivam Bhasin
2019/947 (PDF ) nGraph-HE2: A High-Throughput Framework for Neural Network Inference on Encrypted Data Fabian Boemer, Anamaria Costache, Rosario Cammarota, Casimir Wierzynski
2019/946 (PDF ) Dynamically Obfuscated Scan Chain To Resist Oracle-Guided Attacks On Logic Locked Design M Sazadur Rahman, Adib Nahiyan, Sarah Amir, Fahim Rahman, Farimah Farahmandi, Domenic Forte, Mark Tehranipoor
2019/945 (PDF ) A Key-Independent Distinguisher for 6-round AES in an Adaptive Setting Navid Ghaedi Bardeh
2019/944 (PDF ) Efficient zero-knowledge arguments in the discrete log setting, revisited Max Hoffmann, Michael Klooß, Andy Rupp
2019/943 (PDF ) Analysis of Nakamoto Consensus Ling Ren
2019/942 (PDF ) Ouroboros Clepsydra: Ouroboros Praos in the Universally Composable Relative Time Model Handan Kılınç Alper
2019/941 (PDF ) Does "www." Mean Better Transport Layer Security? Eman Salem Alashwali, Pawel Szalachowski, Andrew Martin
2019/940 (PDF ) Security analysis of two lightweight certificateless signature schemes Nasrollah Pakniat
2019/939 (PDF ) Homomorphic Encryption Standard Martin Albrecht, Melissa Chase, Hao Chen, Jintai Ding, Shafi Goldwasser, Sergey Gorbunov, Shai Halevi, Jeffrey Hoffstein, Kim Laine, Kristin Lauter, Satya Lokam, Daniele Micciancio, Dustin Moody, Travis Morrison, Amit Sahai, Vinod Vaikuntanathan
2019/938 (PDF ) Low-Memory Attacks against Two-Round Even-Mansour using the 3-XOR Problem Gaëtan Leurent, Ferdinand Sibleyras
2019/937 (PDF ) Fault Template Attacks on Block Ciphers Exploiting Fault Propagation Sayandeep Saha, Arnab Bag, Debapriya Basu Roy, Sikhar Patranabis, Debdeep Mukhopadhyay
2019/936 (PDF ) SNEIK on Microcontrollers: AVR, ARMv7-M, and RISC-V with Custom Instructions Markku-Juhani O. Saarinen
2019/934 (PDF ) Linear Approximations of Random Functions and Permutations Mohsin Khan, Kaisa Nyberg
2019/933 (PDF ) Low Entropy Key Negotiation Attacks on Bluetooth and Bluetooth Low Energy Daniele Antonioli, Nils Ole Tippenhauer, Kasper Rasmussen
2019/932 (PDF ) Related-key Differential Cryptanalysis of Full Round CRAFT Muhammad ElSheikh, Amr M. Youssef
2019/931 (PDF ) Low Weight Discrete Logarithms and Subset Sum in $2^{0.65n}$ with Polynomial Memory Andre Esser, Alexander May
2019/930 (PDF ) Module-LWE versus Ring-LWE, Revisited Yang Wang, Mingqiang Wang
2019/929 (PDF ) On the Degree-Insensitive SI-GDH problem and assumption Samuel Dobson, Steven D. Galbraith
2019/928 (PDF ) Blockchain-enabled Cryptographically-secure Hardware Obfuscation Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert, Domenic Forte
2019/927 (PDF ) Isogeny-based hashing despite known endomorphisms Lorenz Panny
2019/926 (PDF ) Formal Verification of a Constant-Time Preserving C Compiler Gilles Barthe, Sandrine Blazy, Benjamin Grégoire, Rémi Hutin, Vincent Laporte, David Pichardie, Alix Trieu
2019/925 (PDF ) Fully Auditable Privacy-preserving Cryptocurrency Against Malicious Auditors Wulu Li, Yongcan Wang, Lei Chen, Xin Lai, Xiao Zhang, Jiajun Xin
2019/924 (PDF ) Your Money or Your Life---Modeling and Analyzing the Security of Electronic Payment in the UC Framework Dirk Achenbach, Roland Gröll, Timon Hackenjos, Alexander Koch, Bernhard Löwe, Jeremias Mechler, Jörn Müller-Quade, Jochen Rill
2019/923 (PDF ) Automated Probe Repositioning for On-Die EM Measurements Bastian Richter, Alexander Wild, Amir Moradi
2019/922 (PDF ) A High-Assurance Evaluator for Machine-Checked Secure Multiparty Computation Karim Eldefrawy, Vitor Pereira
2019/921 (PDF ) Tree authenticated ephemeral keys Pavol Zajac
2019/920 (PDF ) Related-Key Differential Slide Attack Against Fountain V1 Raluca Posteuca
2019/919 (PDF ) Detecting Faults in Inner Product Masking Scheme - IPM-FD: IPM with Fault Detection (extended version∗) Wei Cheng, Claude Carlet, Kouassi Goli, Sylvain Guilley, Jean-Luc Danger
2019/918 (PDF ) Resolving the Trilemma in Logic Encryption Hai Zhou, Amin Rezaei, Yuanqi Shen
2019/917 (PDF ) Simplified Revocable Hierarchical Identity-Based Encryption from Lattices Shixiong Wang, Juanyang Zhang, Jingnan He, Huaxiong Wang, Chao Li
2019/915 (PDF ) Unique Rabin-Williams Signature Scheme Decryption Lynn Margaret Batten, Hugh Cowie Williams
2019/914 (PDF ) Composable and Finite Computational Security of Quantum Message Transmission Fabio Banfi, Ueli Maurer, Christopher Portmann, Jiamin Zhu
2019/913 (PDF ) Information Conservational Security with “Black Hole” Keypad Compression and Scalable One-Time Pad — An Analytical Quantum Intelligence Approach to Pre- and Post-Quantum Cryptography Wen-Ran Zhang
2019/912 (PDF ) Fine-Grained Forward Secrecy: Allow-List/Deny-List Encryption and Applications David Derler, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks
2019/911 (PDF ) IoT-Friendly AKE: Forward Secrecy and Session Resumption Meet Symmetric-Key Cryptography Gildas Avoine, Sébastien Canard, Loïc Ferreira
2019/910 (PDF ) Efficiently Masking Binomial Sampling at Arbitrary Orders for Lattice-Based Crypto Tobias Schneider, Clara Paglialonga, Tobias Oder, Tim Güneysu
2019/909 (PDF ) A Practicable Timing Attack Against HQC and its Countermeasure Guillaume Wafo-Tapa, Slim Bettaieb, Loic Bidoux, Philippe Gaborit, Etienne Marcatel
2019/908 (PDF ) Simulation-Sound Arguments for LWE and Applications to KDM-CCA2 Security Benoît Libert, Khoa Nguyen, Alain Passelègue, Radu Titiu
2019/907 (PDF ) Practical Forgery Attacks on Limdolen and HERN Raghvendra Rohit, Guang Gong
2019/906 (PDF ) Efficient and secure software implementations of Fantomas Rafael J. Cruz, Antonio Guimarães, Diego F. Aranha
2019/904 (PDF ) Timed-Release Encryption With Master Time Bound Key (Full Version) Gwangbae Choi, Serge Vaudenay
2019/903 (PDF ) Probabilistic analysis on Macaulay matrices over finite fields and complexity of constructing Gröbner bases Igor Semaev, Andrea Tenti
2019/902 (PDF ) Fractional LWE: a nonlinear variant of LWE Gérald Gavin, Stéphane Bonnevay
2019/901 (PDF ) Improvements in Everlasting Privacy: Efficient and Secure Zero Knowledge Proofs Thomas Haines, Clementine Gritti
2019/899 (PDF ) A Comparison of Single-Bit and Multi-Bit DPA for Attacking AES128 on an ATmega328P Michael Yonli
2019/898 (PDF ) One Bit is All It Takes: A Devastating Timing Attack on BLISS’s Non-Constant Time Sign Flips Mehdi Tibouchi, Alexandre Wallet
2019/897 (PDF ) On inverse protocols of Post Quantum Cryptography based on pairs of noncommutative multivariate platforms used in tandem Vasyl Ustimenko
2019/896 (PDF ) On the optionality and fairness of Atomic Swaps Runchao Han, Haoyu Lin, Jiangshan Yu
2019/895 (PDF ) The Singularity Attack to the Multivariate Signature Scheme Himq-3 Jintai Ding, Zheng Zhang, Joshua Deaton, Vishakha
2019/894 (PDF ) BioID: a Privacy-Friendly Identity Document Fatih Balli, F. Betül Durak, Serge Vaudenay
2019/893 (PDF ) New Efficient, Constant-Time Implementations of Falcon Thomas Pornin
2019/892 (PDF ) CCM-SIV: Single-PRF Nonce-Misuse-Resistant Authenticated Encryption Patrick Kresmer, Alexander Zeh
2019/891 (PDF ) Shielded Computations in Smart Contracts Overcoming Forks Vincenzo Botta, Daniele Friolo, Daniele Venturi, Ivan Visconti
2019/890 (PDF ) An Adaptive Attack on 2-SIDH Samuel Dobson, Steven D. Galbraith, Jason LeGrow, Yan Bo Ti, Lukas Zobernig
2019/889 (PDF ) Securing DNSSEC Keys via Threshold ECDSA From Generic MPC Anders Dalskov, Marcel Keller, Claudio Orlandi, Kris Shrishak, Haya Shulman
2019/888 (PDF ) Weak Keys in the Rekeying Paradigm: Application to COMET and mixFeed Mustafa Khairallah
2019/887 (PDF ) Accelerating V2X Cryptography through Batch Operations Paul Bottinelli, Robert Lambert
2019/886 (PDF ) Round Complexity of Byzantine Agreement, Revisited T-H. Hubert Chan, Rafael Pass, Elaine Shi
2019/885 (PDF ) On the alpha value of polynomials in the tower number field sieve algorithm Aurore Guillevic, Shashank Singh
2019/884 (PDF ) Cryptanalysis of Round-Reduced KECCAK using Non-Linear Structures Mahesh Sreekumar Rajasree
2019/883 (PDF ) HoneyBadgerMPC and AsynchroMix: Practical AsynchronousMPC and its Application to Anonymous Communication Donghang Lu, Thomas Yurek, Samarth Kulshreshtha, Rahul Govind, Rahul Mahadev, Aniket Kate, Andrew Miller
2019/882 (PDF ) Modifying The Tropical Version of Stickel’s Key Exchange Protocol Any Muanalifah, Serge˘ı Sergeev
2019/881 (PDF ) On the Boomerang Uniformity of some Permutation Polynomials Marco Calderini, Irene Villa
2019/880 (PDF ) A Blockchain-Based Access Control Scheme for Smart Grids Yuyang Zhou, Yuanfeng Guan, Zhiwei Zhang, Fagen Li
2019/879 (PDF ) Cube-Based Cryptanalysis of Subterranean-SAE Fukang Liu, Takanori Isobe, Willi Meier
2019/878 (PDF ) Algebraically Structured LWE, Revisited Chris Peikert, Zachary Pepin
2019/877 (PDF ) Blind Schnorr Signatures and Signed ElGamal Encryption in the Algebraic Group Model Georg Fuchsbauer, Antoine Plouviez, Yannick Seurin
2019/876 (PDF ) Kadcast: A Structured Approach to Broadcast in Blockchain Networks Elias Rohrer, Florian Tschorsch
2019/875 (PDF ) Quantum Alice and Silent Bob: Qubit-based Quantum Key Recycling with almost no classical communication Daan Leermakers, Boris Skoric
2019/874 (PDF ) ABDKS Attribute-Based Encryption with Dynamic Keyword Search in Fog Computing Fei Meng, Mingqiang Wang
2019/873 (PDF ) Count of rotational symmetric bent Boolean functions Shashi Kant Pandey, P. R. Mishra
2019/872 (PDF ) Efficient Information-Theoretic Secure Multiparty Computation over $\mathbb{Z}/p^k \mathbb{Z}$ via Galois Rings Mark Abspoel, Ronald Cramer, Ivan Damgård, Daniel Escudero, Chen Yuan
2019/871 (PDF ) Non-Locality and Zero-Knowledge MIPs Claude Crépeau, Nan Yang
2019/870 (PDF ) The Eleventh Power Residue Symbol Marc Joye, Oleksandra Lapiha, Ky Nguyen, David Naccache
2019/869 (PDF ) ProtectIOn: Root-of-Trust for IO in Compromised Platforms Aritra Dhar, Enis Ulqinaku, Kari Kostiainen, Srdjan Capkun
2019/868 (PDF ) On the Round Complexity of Randomized Byzantine Agreement Ran Cohen, Iftach Haitner, Nikolaos Makriyannis, Matan Orland, Alex Samorodnitsky
2019/867 (PDF ) A Practical Forgery Attack on Lilliput-AE Orr Dunkelman, Nathan Keller, Eran Lambooij, Yu Sasaki
2019/866 (PDF ) A Fast Characterization Method for Semi-invasive Fault Injection Attacks Lichao Wu, Gerard Ribera, Noemie Beringuier-Boher, Stjepan Picek
2019/865 (PDF ) Cryptanalysis of Reduced-Round SipHash Le He, Hongbo Yu
2019/863 (PDF ) Fast Actively Secure Five-Party Computation with Security Beyond Abort Megha Byali, Carmit Hazay, Arpita Patra, Swati Singla
2019/862 (PDF ) Key recovery attacks on the Legendre PRFs within the birthday bound Dmitry Khovratovich
2019/861 (PDF ) A Tale of Three Signatures: practical attack of ECDSA with wNAF Gabrielle De Micheli, Rémi Piau, Cécile Pierrot
2019/860 (PDF ) Machine learning and side channel analysis in a CTF competition Yongbo Hu, Yeyang Zheng, Pengwei Feng, Lirui Liu, Chen Zhang, Aron Gohr, Sven Jacob, Werner Schindler, Ileana Buhan, Karim Tobich
2019/859 (PDF ) A Coin-Free Oracle-Based Augmented Black Box Framework Kyosuke Yamashita, Mehdi Tibouchi, Masayuki Abe
2019/858 (PDF ) Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH Eric Crockett, Christian Paquin, Douglas Stebila
2019/857 (PDF ) Bitcontracts: Supporting Smart Contracts in Legacy Blockchains Karl Wüst, Loris Diana, Kari Kostiainen, Ghassan Karame, Sinisa Matetic, Srdjan Capkun
2019/856 (PDF ) More results on Shortest Linear Programs Subhadeep Banik, Yuki Funabiki, Takanori Isobe
2019/855 (PDF ) WIDESEAS: A lattice-based PIR scheme implemented in EncryptedQuery Dominic Dams, Jeff Lataille, Rino Sanchez, John Wade
2019/854 (PDF ) Reducing the Cost of Implementing AES as a Quantum Circuit Brandon Langenberg, Hai Pham, Rainer Steinwandt
2019/853 (PDF ) A critique of game-based definitions of receipt-freeness for voting Ashley Fraser, Elizabeth A. Quaglia, Ben Smyth
2019/852 (PDF ) Weak-Key Distinguishers for AES Lorenzo Grassi, Gregor Leander, Christian Rechberger, Cihangir Tezcan, Friedrich Wiemer
2019/851 (PDF ) On Designing Lightweight RFID Security Protocols for Medical IoT Masoumeh Safkhani, Ygal Bendavid, Samad Rostampour, Nasour Bagheri
2019/850 (PDF ) Cryptanalysis of an Ultra lightweight Authentication Scheme based on Permutation Matrix Encryption for Internet of Vehicles Morteza Adeli, Nasour Bagheri
2019/849 (PDF ) Trust Based Intrusion Detection System to Detect Insider Attacks in IoT Systems Ambili K N, Jimmy Jose
2019/848 (PDF ) Observations on the DLCT and Absolute Indicators Anne Canteaut, Lukas Kölsch, Friedrich Wiemer
2019/847 (PDF ) Improved Heuristics for Short Linear Programs Quan Quan Tan, Thomas Peyrin
2019/846 (PDF ) Practical Attribute Based Inner Product Functional Encryption from Simple Assumptions Yuechen Chen, Linru Zhang, Siu-Ming Yiu
2019/845 (PDF ) A Reaction Attack against Cryptosystems based on LRPC Codes Simona Samardjiska, Paolo Santini, Edoardo Persichetti, Gustavo Banegas
2019/844 (PDF ) pqm4: Testing and Benchmarking NIST PQC on ARM Cortex-M4 Matthias J. Kannwischer, Joost Rijneveld, Peter Schwabe, Ko Stoffelen
2019/843 (PDF ) How to Construct CSIDH on Edwards Curves Tomoki Moriya, Hiroshi Onuki, Tsuyoshi Takagi
2019/842 (PDF ) Improved SIMD Implementation of Poly1305 Sreyosi Bhattacharyya, Palash Sarkar
2019/841 (PDF ) Practical Cryptanalysis of k-ary C* Daniel Smith-Tone
2019/840 (PDF ) A Study on the Applicability of the Lesamnta-LW Lightweight Hash Function to TPMS Yuhei Watanabe, Hideki Yamamoto, Hirotaka Yoshida
2019/839 (PDF ) Statistical Zap Arguments from Quasi-Polynomial LWE Abhishek Jain, Zhengzhong Jin
2019/838 (PDF ) Ouroboros Chronos: Permissionless Clock Synchronization via Proof-of-Stake Christian Badertscher, Peter Gaži, Aggelos Kiayias, Alexander Russell, Vassilis Zikas
2019/837 (PDF ) Stronger and Faster Side-Channel Protections for CSIDH Daniel Cervantes-Vázquez, Mathilde Chenu, Jesús-Javier Chi-Domínguez, Luca De Feo, Francisco Rodríguez-Henríquez, Benjamin Smith
2019/836 (PDF ) Optimal Transport Layer for Secure Computation Markus Brandt, Claudio Orlandi, Kris Shrishak, Haya Shulman
2019/835 (PDF ) ACE: Asynchronous and Concurrent Execution of Complex Smart Contracts Karl Wüst, Sinisa Matetic, Silvan Egli, Kari Kostiainen, Srdjan Capkun
2019/834 (PDF ) Succinct Arguments in the Quantum Random Oracle Model Alessandro Chiesa, Peter Manohar, Nicholas Spooner
2019/833 (PDF ) AES MixColumn with 92 XOR gates Alexander Maximov
2019/832 (PDF ) Asymptotically-Good Arithmetic Secret Sharing over Z/(p^\ell Z) with Strong Multiplication and Its Applications to Efficient MPC Ronald Cramer, Matthieu Rambaud, Chaoping Xing
2019/831 (PDF ) Privacy of Stateful RFID Systems with Constant Tag Identifiers Cristian Hristea, Ferucio Laurentiu Tiplea
2019/830 (PDF ) The Simplest Multi-key Linearly Homomorphic Signature Scheme Diego F. Aranha, Elena Pagnin
2019/829 (PDF ) Batch Binary Weierstrass Billy Bob Brumley, Sohaib ul Hassan, Alex Shaindlin, Nicola Tuveri, Kide Vuojärvi
2019/828 (PDF ) Optimal Collision Side-Channel Attacks Cezary Glowacz, Vincent Grosso
2019/827 (PDF ) k-root-n: An efficient algorithm for avoiding short term double-spending alongside distributed ledger technologies such as blockchain Zvi Schreiber
2019/826 (PDF ) Modular Multiplication Algorithm Suitable For Low-Latency Circuit Implementations Erdinç Öztürk
2019/825 (PDF ) Plaintext Recovery Attacks against XTS Beyond Collisions Takanori Isobe, Kazuhiko Minematsu
2019/824 (PDF ) Hardware Implementations of NIST Lightweight Cryptographic Candidates: A First Look Behnaz Rezvani, Flora Coleman, Sachin Sachin, William Diehl
2019/823 (PDF ) Securely Sampling Biased Coins with Applications to Differential Privacy Jeffrey Champion, abhi shelat, Jonathan Ullman
2019/822 (PDF ) Surveying definitions of coercion resistance Thomas Haines, Ben Smyth
2019/821 (PDF ) Towards Forward Secure Internet Traffic Eman Salem Alashwali, Pawel Szalachowski, Andrew Martin
2019/820 (PDF ) Universal Location Referencing and Homomorphic Evaluation of Geospatial Query Asma Aloufi, Peizhao Hu, Hang Liu, Sherman S. M. Chow
2019/819 (PDF ) Blindfolded Evaluation of Random Forests with Multi-Key Homomorphic Encryption Asma Aloufi, Peizhao Hu, Harry W. H. Wong, Sherman S. M. Chow
2019/818 (PDF ) X-DeepSCA: Cross-Device Deep Learning Side Channel Attack Debayan Das, Anupam Golder, Josef Danial, Santosh Ghosh, Arijit Raychowdhury, Shreyas Sen
2019/817 (PDF ) Non-zero Inner Product Encryptions: Strong Security under Standard Assumptions Tapas Pal, Ratna Dutta
2019/816 (PDF ) Crisis: Probabilistically Self Organizing Total Order in Unstructured P2P Networks Mirco Richter
2019/814 (PDF ) Faster Subgroup Checks for BLS12-381 Sean Bowe
2019/813 (PDF ) Multi-Client Symmetric Searchable Encryption with Forward Privacy Alexandros Bakas, Antonis Michalas
2019/812 (PDF ) Improved Interpolation Attacks on Cryptographic Primitives of Low Algebraic Degree Chaoyun Li, Bart Preneel
2019/811 (PDF ) SEAL: Attack Mitigation for Encrypted Databases via Adjustable Leakage Ioannis Demertzis, Dimitrios Papadopoulos, Charalampos Papamanthou, Saurabh Shintre
2019/810 (PDF ) Refutation and Redesign of a Physical Model of TERO-based TRNGs and PUFs Jeroen Delvaux
2019/809 (PDF ) On the Data Limitation of Small-State Stream Ciphers: Correlation Attacks on Fruit-80 and Plantlet Yosuke Todo, Willi Meier, Kazumaro Aoki
2019/808 (PDF ) 2-Message Publicly Verifiable WI from (Subexponential) LWE Alex Lombardi, Vinod Vaikuntanathan, Daniel Wichs
2019/807 (PDF ) When PKI (finally) met Provable Security Hemi Leibowitz, Amir Herzberg, Ewa Syta
2019/806 (PDF ) Proxy-Mediated Searchable Encryption in SQL Databases Using Blind Indexes Eugene Pilyankevich, Dmytro Kornieiev, Artem Storozhuk
2019/805 (PDF ) RRTxFM: Probabilistic Counting for Differentially Private Statistics Saskia Nuñez von Voigt, Florian Tschorsch
2019/804 (PDF ) Improved Low-Memory Subset Sum and LPN Algorithms via Multiple Collisions Claire Delaplace, Andre Esser, Alexander May
2019/803 (PDF ) Methodology for Efficient CNN Architectures in Profiling Attacks -- Extended Version Gabriel Zaid, Lilian Bossuet, Amaury Habrard, Alexandre Venelli
2019/802 (PDF ) New Circuit Minimization Techniques for Smaller and Faster AES SBoxes Alexander Maximov, Patrik Ekdahl
2019/801 (PDF ) A Chosen Random Value Attack on WPA3 SAE authentication protocol Sheng Sun
2019/800 (PDF ) Can we Beat the Square Root Bound for ECDLP over $\mathbb{F}_{p^2}$ via Representations? Claire Delaplace, Alexander May
2019/799 (PDF ) Breaking the Lightweight Secure PUF: Understanding the Relation of Input Transformations and Machine Learning Resistance Nils Wisiol, Georg T. Becker, Marian Margraf, Tudor A. A. Soroceanu, Johannes Tobisch, Benjamin Zengin
2019/798 (PDF ) A Generic Construction for Revocable Identity-Based Encryption with Subset Difference Methods Kwangsu Lee
2019/797 (PDF ) Don't forget your roots: constant-time root finding over $\mathbb{F}_{2^m}$ Douglas Martins, Gustavo Banegas, Ricardo Custodio
2019/796 (PDF ) The End of Logic Locking? A Critical View on the Security of Logic Locking Susanne Engels, Max Hoffmann, Christof Paar
2019/795 (PDF ) More Practical Single-Trace Attacks on the Number Theoretic Transform Peter Pessl, Robert Primas
2019/794 (PDF ) Efficient Cryptography on the RISC-V Architecture Ko Stoffelen
2019/793 (PDF ) On equivalence between known families of quadratic APN functions Lylia Budaghyan, Marco Calderini, Irene Villa
2019/792 (PDF ) TICK: Tiny Client for Blockchains Wei Zhang, Jiangshan Yu, Qingqiang He, Nan Zhang, Nan Guan
2019/791 (PDF ) Sublattice Attacks on LWE over Arbitrary Number Field Lattices Hao Chen
2019/790 (PDF ) Simple and Efficient Approach for Achieving End-to-End Anonymous Communication Wei Jiang, Adam Bowers, Dan Lin
2019/789 (PDF ) Relation between o-equivalence and EA-equivalence for Niho bent functions Diana Davidova, Lilya Budaghyan, Claude Carlet, Tor Helleseth, Ferdinand Ihringer, Tim Penttila
2019/788 (PDF ) The Impact of Time on DNS Security Aanchal Malhotra, Willem Toorop, Benno Overeinder, Ralph Dolmans, Sharon Goldberg
2019/787 (PDF ) Optimized implementation of the NIST PQC submission ROLLO on microcontroller Jérôme Lablanche, Lina Mortajine, Othman Benchaalal, Pierre-Louis Cayrel, Nadia El Mrabet
2019/786 (PDF ) P6V2G: A Privacy-Preserving V2G Scheme for Two-Way Payments and Reputation Rebecca Schwerdt, Matthias Nagel, Valerie Fetzer, Tobias Gräf, Andy Rupp
2019/785 (PDF ) A publicly verifiable quantum blind signature scheme without entanglement based on asymmetric cryptography Yalin Chen, Jue-Sam Chou, Liang-Chun Wang, Yu-Yuan Chou
2019/784 (PDF ) Towards a Hybrid Public Key Infrastructure (PKI): A Review Priyadarshi Singh, Abdul Basit, N Chaitanya Kumar, V. Ch. Venkaiah
2019/783 (PDF ) Dissecting the CHES 2018 AES Challenge Tobias Damm, Sven Freud, Dominik Klein
2019/782 (PDF ) Algorithmic aspects of elliptic bases in finite field discrete logarithm algorithms Antoine Joux, Cecile Pierrot
2019/781 (PDF ) BBQ: Using AES in Picnic Signatures Cyprien Delpech de Saint Guilhem, Lauren De Meyer, Emmanuela Orsini, Nigel P. Smart
2019/780 (PDF ) Statistical ZAP Arguments Saikrishna Badrinarayan, Rex Fernando, Aayush Jain, Dakshita Khurana, Amit Sahai
2019/779 (PDF ) Seems Legit: Automated Analysis of Subtle Attacks on Protocols that Use Signatures Dennis Jackson, Cas Cremers, Katriel Cohn-Gordon, Ralf Sasse
2019/778 (PDF ) A Composable Security Treatment of the Lightning Network Aggelos Kiayias, Orfeas Stefanos Thyfronitis Litos
2019/777 (PDF ) A Reduction-Based Proof for Authentication and Session Key Security in 3-Party Kerberos Jörg Schwenk, Douglas Stebila
2019/776 (PDF ) Scalable Private Set Union from Symmetric-Key Techniques Vladimir Kolesnikov, Mike Rosulek, Ni Trieu, Xiao Wang
2019/775 (PDF ) Pay To Win: Cheap, Crowdfundable, Cross-chain Algorithmic Incentive Manipulation Attacks on PoW Cryptocurrencies Aljosha Judmayer, Nicholas Stifter, Alexei Zamyatin, Itay Tsabary, Ittay Eyal, Peter Gazi, Sarah Meiklejohn, Edgar Weippl
2019/774 (PDF ) Estimating Gaps in Martingales and Applications to Coin-Tossing: Constructions and Hardness Hamidreza Amini Khorasgani, Hemanta Maji, Tamalika Mukherjee
2019/773 (PDF ) Efficient Secure Ridge Regression from Randomized Gaussian Elimination Frank Blom, Niek J. Bouman, Berry Schoenmakers, Niels de Vreede
2019/772 (PDF ) Mixture Integral Attacks on Reduced-Round AES with a Known/Secret S-Box Lorenzo Grassi, Markus Schofnegger
2019/771 (PDF ) DDH-based Multisignatures with Public Key Aggregation Duc-Phong Le, Guomin Yang, Ali Ghorbani
2019/770 (PDF ) Practical Attacks on Reduced-Round AES Navid Ghaedi Bardeh, Sondre Rønjom
2019/769 (PDF ) Exploiting Determinism in Lattice-based Signatures - Practical Fault Attacks on pqm4 Implementations of NIST candidates Prasanna Ravi, Mahabir Prasad Jhanwar, James Howe, Anupam Chattopadhyay, Shivam Bhasin
2019/768 (PDF ) Distributing any Elliptic Curve Based Protocol Nigel P. Smart, Younes Talibi Alaoui
2019/767 (PDF ) On cryptographic parameters of permutation polynomials of the form $x^rh(x^{(q-1)/d})$ Jaeseong Jeong, Chang Heon Kim, Namhun Koo, Soonhak Kwon, Sumin Lee
2019/766 (PDF ) Complexity of Estimating Renyi Entropy of Markov Chains Maciej Obremski, Maciej Skorski
2019/765 (PDF ) SPQCop: Side-channel protected Post-Quantum Cryptoprocessor Arpan Jati, Naina Gupta, Anupam Chattopadhyay, Somitra Kumar Sanadhya
2019/764 (PDF ) The Adversarial Robustness of Sampling Omri Ben-Eliezer, Eylon Yogev
2019/763 (PDF ) Fast Correlation Attacks on Grain-like Small State Stream Ciphers and Cryptanalysis of Plantlet, Fruit-v2 and Fruit-80 Shichang Wang, Meicheng Liu, Dongdai Lin, Li Ma
2019/762 (PDF ) Verifiable Computing for Approximate Computation Shuo Chen, Jung Hee Cheon, Dongwoo Kim, Daejun Park
2019/761 (PDF ) Athena: A verifiable, coercion-resistant voting system with linear complexity Ben Smyth
2019/760 (PDF ) Differential Fault Analysis of NORX Amit Jana, Dhiman Saha, Goutam Paul
2019/759 (PDF ) Code Constructions for Physical Unclonable Functions and Biometric Secrecy Systems Onur Günlü, Onurcan Iscan, Vladimir Sidorenko, Gerhard Kramer
2019/758 (PDF ) Genus 2 Supersingular Isogeny Oblivious Transfer Ramsès Fernàndez-València
2019/757 (PDF ) EverCrypt: A Fast, Verified, Cross-Platform Cryptographic Provider Jonathan Protzenko, Bryan Parno, Aymeric Fromherz, Chris Hawblitzel, Marina Polubelova, Karthikeyan Bhargavan, Benjamin Beurdouche, Joonwon Choi, Antoine Delignat-Lavaud, Cedric Fournet, Natalia Kulatova, Tahina Ramananandro, Aseem Rastogi, Nikhil Swamy, Christoph Wintersteiger, Santiago Zanella-Beguelin
2019/756 (PDF ) SKIVA: Flexible and Modular Side-channel and Fault Countermeasures Pantea Kiaei, Darius Mercadier, Pierre-Evariste Dagand, Karine Heydemann, Patrick Schaumont
2019/755 (PDF ) Generic Attacks on Hash Combiners Zhenzhen Bao, Itai Dinur, Jian Guo, Gaëtan Leurent, Lei Wang
2019/754 (PDF ) Is it Easier to Prove Theorems that are Guaranteed to be True? Rafael Pass, Muthuramakrishnan Venkitasubramaniam
2019/753 (PDF ) Design of Anonymous Endorsement System in Hyperledger Fabric Subhra Mazumdar, Sushmita Ruj
2019/752 (PDF ) Fact and Fiction: Challenging the Honest Majority Assumption of Permissionless Blockchains Runchao Han, Zhimei Sui, Jiangshan Yu, Joseph Liu, Shiping Chen
2019/751 (PDF ) Discrete logarithms in quasi-polynomial time in finite fields of fixed characteristic Thorsten Kleinjung, Benjamin Wesolowski
2019/750 (PDF ) A Short Note on a Weight Probability Distribution Related to SPNs Sondre Rønjom
2019/749 (PDF ) The privacy of the TLS 1.3 protocol Ghada Arfaoui, Xavier Bultel, Pierre-Alain Fouque, Adina Nedelcu, Cristina Onete
2019/748 (PDF ) Temporary Censorship Attacks in the Presence of Rational Miners Fredrik Winzer, Benjamin Herd, Sebastian Faust
2019/747 (PDF ) Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications Rupeng Yang, Man Ho Au, Zhenfei Zhang, Qiuliang Xu, Zuoxia Yu, William Whyte
2019/746 (PDF ) Public-Key Function-Private Hidden Vector Encryption (and More) James Bartusek, Brent Carmer, Abhishek Jain, Zhengzhong Jin, Tancrède Lepoint, Fermi Ma, Tal Malkin, Alex J. Malozemoff, Mariana Raykova
2019/745 (PDF ) Efficient Perfectly Sound One-message Zero-Knowledge Proofs via Oracle-aided Simulation Vincenzo Iovino
2019/744 (PDF ) Privacy-Preserving Classification of Personal Text Messages with Secure Multi-Party Computation: An Application to Hate-Speech Detection Devin Reich, Ariel Todoki, Rafael Dowsley, Martine De Cock, Anderson C. A. Nascimento
2019/743 (PDF ) Lattice-Based Remote User Authentication from Reusable Fuzzy Signature Yangguang Tian, Yingjiu Li, Robert. H Deng, Binanda Sengupta, Guomin Yang
2019/742 (PDF ) Vulnerability Analysis of a Soft Core Processor through Fine-grain Power Profiling William Diehl, Abubakr Abdulgadir, Jens-Peter Kaps
2019/741 (PDF ) Comprehensive security analysis of CRAFT Hosein Hadipour, Sadegh Sadeghi, Majid M. Niknam, Nasour Bagheri
2019/740 (PDF ) A Secure Publish/Subscribe Protocol for Internet of Things Lukas Malina, Gautam Srivastava, Petr Dzurenda, Jan Hajny, Radek Fujdiak
2019/739 (PDF ) A Survey on Authenticated Encryption -- ASIC Designer's Perspective Elif Bilge Kavun, Hristina Mihajloska, Tolga Yalcin
2019/737 (PDF ) Highly Efficient Key Exchange Protocols with Optimal Tightness -- Enabling real-world deployments with theoretically sound parameters Katriel Cohn-Gordon, Cas Cremers, Kristian Gjøsteen, Håkon Jacobsen, Tibor Jager
2019/736 (PDF ) Onion Ring ORAM: Efficient Constant Bandwidth Oblivious RAM from (Leveled) TFHE Hao Chen, Ilaria Chillotti, Ling Ren
2019/735 (PDF ) SoK of Used Cryptography in Blockchain Mayank Raikwar, Danilo Gligoroski, Katina Kralevska
2019/734 (PDF ) From Usability to Secure Computing and Back Again Lucy Qin, Andrei Lapets, Frederick Jansen, Peter Flockhart, Kinan Dak Albab, Ira Globus-Harris, Shannon Roberts, Mayank Varia
2019/733 (PDF ) Compressible FHE with Applications to PIR Craig Gentry, Shai Halevi
2019/732 (PDF ) Fully Homomorphic NIZK and NIWI Proofs Prabhanjan Ananth, Apoorvaa Deshpande, Yael Tauman Kalai, Anna Lysyanskaya
2019/731 (PDF ) On the Complexity of ``Superdetermined'' Minrank Instances Javier Verbel, John Baena, Daniel Cabarcas, Ray Perlner, Daniel Smith-Tone
2019/730 (PDF ) PQDH: A Quantum-Safe Replacement for Diffie-Hellman based on SIDH Vladimir Soukharev, Basil Hess
2019/729 (PDF ) Linear Complexity of A Family of Binary pq2 -periodic Sequences From Euler Quotients Jingwei Zhang, Shuhong Gao, Chang-An Zhao
2019/728 (PDF ) Verifying Solutions to LWE with Implications for Concrete Security Palash Sarkar, Subhadip Singha
2019/727 (PDF ) Iterative Differential Characteristic of TRIFLE-BC Fukang Liu, Takanori Isobe
2019/726 (PDF ) A Framework for Universally Composable Oblivious Transfer from One-Round Key-Exchange Pedro Branco, Jintai Ding, Manuel Goulão, Paulo Mateus
2019/725 (PDF ) He Gives C-Sieves on the CSIDH Chris Peikert
2019/724 (PDF ) Breaking Tweakable Enciphering Schemes using Simon's Algorithm Sebati Ghosh, Palash Sarkar
2019/723 (PDF ) On Deploying Secure Computing: Private Intersection-Sum-with-Cardinality Mihaela Ion, Ben Kreuter, Ahmet Erhan Nergiz, Sarvar Patel, Mariana Raykova, Shobhit Saxena, Karn Seth, David Shanahan, Moti Yung
2019/722 (PDF ) Neural Network Model Assessment for Side-Channel Analysis Guilherme Perin, Baris Ege, Lukasz Chmielewski
2019/721 (PDF ) Optimized SIKE Round 2 on 64-bit ARM Hwajeong Seo, Amir Jalali, Reza Azarderakhsh
2019/720 (PDF ) Leveraging Linear Decryption: Rate-1 Fully-Homomorphic Encryption and Time-Lock Puzzles Zvika Brakerski, Nico Döttling, Sanjam Garg, Giulio Malavolta
2019/718 (PDF ) Improved Building Blocks for Secure Multi-Party Computation based on Secret Sharing with Honest Majority Marina Blanton, Ahreum Kang, Chen Yuan
2019/717 (PDF ) Homomorphism learning problems and its applications to public-key cryptography Christopher Leonardi, Luis Ruiz-Lopez
2019/716 (PDF ) On the Quantum Complexity of the Continuous Hidden Subgroup Problem Koen de Boer, Léo Ducas, Serge Fehr
2019/715 (PDF ) On the Security of Lattice-based Fiat-Shamir Signatures in the Presence of Randomness Leakage Yuejun Liu, Yongbin Zhou, Shuo Sun, Tianyu Wang, Rui Zhang, Jingdian Ming
2019/714 (PDF ) Generalized Related-Key Rectangle Attacks on Block Ciphers with Linear Key Schedule: Applications to SKINNY and GIFT Boxin Zhao, Xiaoyang Dong, Willi Meier, Keting Jia, Gaoli Wang
2019/713 (PDF ) Public Ledger for Sensitive Data Riccardo Longo, Massimiliano Sala
2019/712 (PDF ) SimpleENC and SimpleENCsmall -- an Authenticated Encryption Mode for the Lightweight Setting Shay Gueron, Yehuda Lindell
2019/711 (PDF ) SIKE'd Up: Fast and Secure Hardware Architectures for Supersingular Isogeny Key Encapsulation Brian Koziel, A-Bon Ackie, Rami El Khatib, Reza Azarderakhsh, Mehran Mozaffari-Kermani
2019/709 (PDF ) Secure Computation for Cloud data Storage Davood Rezaeipour
2019/708 (PDF ) Upper Bounds on the Multiplicative Complexity of Symmetric Boolean Functions Luís T. A. N. Brandão, Çağdaş Çalık, Meltem Sönmez Turan, René Peralta
2019/707 (PDF ) Post-Quantum UC-Secure Oblivious Transfer in the Standard Model with Adaptive Corruptions Olivier Blazy, Céline Chevalier, Quoc Huy Vu
2019/706 (PDF ) Endemic Oblivious Transfer Daniel Masny, Peter Rindal
2019/705 (PDF ) Commodity-Based 2PC for Arithmetic Circuits Ivan Damgård, Helene Haagh, Michael Nielsen, Claudio Orlandi
2019/704 (PDF ) Arcula: A Secure Hierarchical Deterministic Wallet for Multi-asset Blockchains Adriano Di Luzio, Danilo Francati, Giuseppe Ateniese
2019/703 (PDF ) A Cautionary Note Regarding the Usage of Leakage Detection Tests in Security Evaluation Carolyn Whitnall, Elisabeth Oswald
2019/702 (PDF ) Cryptanalysis of Plantlet Subhadeep Banik, Khashayar Barooti, Takanori Isobe
2019/701 (PDF ) Decentralized Multi-authority Anonymous Authentication for Global Identities with Non-interactive Proofs Hiroaki Anada
2019/700 (PDF ) SAEB: A Lightweight Blockcipher-Based AEAD Mode of Operation Yusuke Naito, Mitsuru Matsui, Takeshi Sugawara, Daisuke Suzuki
2019/699 (PDF ) Tight quantum security of the Fiat-Shamir transform for commit-and-open identification schemes with applications to post-quantum signature schemes André Chailloux
2019/698 (PDF ) A Formal Treatment of Deterministic Wallets Poulami Das, Sebastian Faust, Julian Loss
2019/697 (PDF ) Breaking ACORN with a Single Fault Elena Dubrova
2019/696 (PDF ) Black-Box Language Extension of Non-Interactive Zero-Knowledge Arguments Masayuki Abe, Miguel Ambrona, Miyako Ohkubo
2019/695 (PDF ) An Efficient Secure Three-Party Sorting Protocol with an Honest Majority Koji Chida, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Naoto Kiribuchi, Benny Pinkas
2019/694 (PDF ) A Unified and Composable Take on Ratcheting Daniel Jost, Ueli Maurer, Marta Mularczyk
2019/693 (PDF ) Security-Efficiency Tradeoffs in Searchable Encryption -- Lower Bounds and Optimal Constructions Raphael Bost, Pierre-Alain Fouque
2019/692 (PDF ) Synchronous Consensus with Optimal Asynchronous Fallback Guarantees Erica Blum, Jonathan Katz, Julian Loss
2019/691 (PDF ) Comparing proofs of security for lattice-based encryption Daniel J. Bernstein
2019/690 (PDF ) Multiple-Differential Mechanism for Collision-Optimized Divide-and-Conquer Attacks Changhai Ou, Siew-Kei Lam, Guiyuan Jiang
2019/689 (PDF ) On-Device Power Analysis Across Hardware Security Domains Colin O'Flynn, Alex Dewar
2019/688 (PDF ) Better Bootstrapping for Approximate Homomorphic Encryption Kyoohyung Han, Dohyeong Ki
2019/687 (PDF ) General Linear Group Action on Tensors: A Candidate for Post-Quantum Cryptography Zhengfeng Ji, Youming Qiao, Fang Song, Aaram Yun
2019/686 (PDF ) On the Complexity of Collision Resistant Hash Functions: New and Old Black-Box Separations Nir Bitansky, Akshay Degwekar
2019/685 (PDF ) Exploring NIST LWC/PQC Synergy with R5Sneik: How SNEIK 1.1 Algorithms were Designed to Support Round5 Markku-Juhani O. Saarinen
2019/684 (PDF ) Revelio: A MimbleWimble Proof of Reserves Protocol Arijit Dutta, Saravanan Vijayakumaran
2019/683 (PDF ) The Notion of Transparency Order, Revisited Huizhong Li, Yongbin Zhou, Jingdian Ming, Guang Yang, Chengbin Jin
2019/682 (PDF ) Modern Family: A Revocable Hybrid Encryption Scheme Based on Attribute-Based Encryption, Symmetric Searchable Encryption and SGX Alexandros Bakas, Antonis Michalas
2019/681 (PDF ) Lattice-based Cryptography for IoT in A Quantum World: Are We Ready? Ayesha Khalid, Sarah McCarthy, Weiqiang Liu, Maire O’Neill
2019/680 (PDF ) Non-Commutative Ring Learning With Errors From Cyclic Algebras Charles Grover, Andrew Mendelsohn, Cong Ling, Roope Vehkalahti
2019/679 (PDF ) Forgery Attacks on FlexAE and FlexAEAD Maria Eichlseder, Daniel Kales, Markus Schofnegger
2019/678 (PDF ) A Modified pqsigRM: RM Code-Based Signature Scheme Yongwoo Lee, Wijik Lee, Young-Sik Kim, Jong-Seon No
2019/677 (PDF ) A Note on Lower Digits Extraction Polynomial for Bootstrapping Mingjia Huo, Kewen Wu, Qi Ye
2019/676 (PDF ) Robust and Scalable Consensus for Sharded Distributed Ledgers Eleftherios Kokoris-Kogias
2019/675 (PDF ) Balance: Dynamic Adjustment of Cryptocurrency Deposits Dominik Harz, Lewis Gudgeon, Arthur Gervais, William J. Knottenbelt
2019/674 (PDF ) Polar Sampler: A Novel Bernoulli Sampler Using Polar Codes with Application to Integer Gaussian Sampling Jiabo Wang, Cong Ling
2019/673 (PDF ) A New Approach to Constructing Digital Signature Schemes (Extended Paper) Ahto Buldas, Denis Firsov, Risto Laanoja, Henri Lakk, Ahto Truu
2019/672 (PDF ) A Blockchain-Assisted Hash-Based Signature Scheme Ahto Buldas, Risto Laanoja, Ahto Truu
2019/671 (PDF ) A Server-Assisted Hash-Based Signature Scheme Ahto Buldas, Risto Laanoja, Ahto Truu
2019/670 (PDF ) On designing secure small-state stream ciphers against time-memory-data tradeoff attacks Vahid Amin Ghafari, Honggang Hu, Fujiang Lin
2019/669 (PDF ) Related-Key Boomerang Attacks on GIFT with Automated Trail Search Including BCT Effect Yunwen Liu, Yu Sasaki
2019/668 (PDF ) New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160 Fukang Liu, Christoph Dobraunig, Florian Mendel, Takanori Isobe, Gaoli Wang, Zhenfu Cao
2019/667 (PDF ) PPAD-Hardness via Iterated Squaring Modulo a Composite Arka Rai Choudhuri, Pavel Hubacek, Chethan Kamath, Krzysztof Pietrzak, Alon Rosen, Guy N. Rothblum
2019/666 (PDF ) On the Geometric Ergodicity of Metropolis-Hastings Algorithms for Lattice Gaussian Sampling Zheng Wang, Cong Ling
2019/665 (PDF ) Key Exchange and Authenticated Key Exchange with Reusable Keys Based on RLWE Assumption Jintai Ding, Pedro Branco, Kevin Schmitt
2019/664 (PDF ) How Diversity Affects Deep-Learning Side-Channel Attacks Huanyu Wang, Martin Brisfors, Sebastian Forsmark, Elena Dubrova
2019/663 (PDF ) Can Verifiable Delay Functions be Based on Random Oracles? Mohammad Mahmoody, Caleb Smith, David J. Wu
2019/662 (PDF ) Generalized Proofs of Knowledge with Fully Dynamic Setup Christian Badertscher, Daniel Jost, Ueli Maurer
2019/661 (PDF ) Mind the Portability: A Warriors Guide through Realistic Profiled Side-channel Analysis Shivam Bhasin, Anupam Chattopadhyay, Annelie Heuser, Dirmanto Jap, Stjepan Picek, Ritu Ranjan Shrivastwa
2019/660 (PDF ) Lattice Gaussian Sampling by Markov Chain Monte Carlo: Bounded Distance Decoding and Trapdoor Sampling Zheng Wang, Cong Ling
2019/659 (PDF ) Tight Verifiable Delay Functions Nico Döttling, Sanjam Garg, Giulio Malavolta, Prashant Nalini Vasudevan
2019/658 (PDF ) Two-Thirds Honest-Majority MPC for Malicious Adversaries at Almost the Cost of Semi-Honest Jun Furukawa, Yehuda Lindell
2019/657 (PDF ) Multi-Party PSM, Revisited: Improved Communication and Unbalanced Communication Leonard Assouline, Tianren Liu
2019/655 (PDF ) Visualizing size-security tradeoffs for lattice-based encryption Daniel J. Bernstein
2019/654 (PDF ) Concise Linkable Ring Signatures and Forgery Against Adversarial Keys Brandon Goodell, Sarang Noether, Arthur Blue
2019/653 (PDF ) On the Local Leakage Resilience of Linear Secret Sharing Schemes Fabrice Benhamouda, Akshay Degwekar, Yuval Ishai, Tal Rabin
2019/652 (PDF ) The Exchange Attack: How to Distinguish Six Rounds of AES with $2^{88.2}$ chosen plaintexts Navid Ghaedi Bardeh, Sondre Rønjom
2019/651 (PDF ) Efficient MPC via Program Analysis: A Framework for Efficient Optimal Mixing Muhammad Ishaq, Ana Milanova, Vassilis Zikas
2019/650 (PDF ) Incremental Proofs of Sequential Work Nico Döttling, Russell W. F. Lai, Giulio Malavolta
2019/649 (PDF ) Txilm: Lossy Block Compression with Salted Short Hashing Donghui Ding, Xin Jiang, Jiaping Wang, Hao Wang, Xiaobing Zhang, Yi Sun
2019/648 (PDF ) Efficient Invisible and Unlinkable Sanitizable Signatures Xavier Bultel, Pascal Lafourcade, Russell W. F. Lai, Giulio Malavolta, Dominique Schröder, Sri Aravinda Krishnan Thyagarajan
2019/647 (PDF ) Strong Asymmetric PAKE based on Trapdoor CKEM Tatiana Bradley, Stanislaw Jarecki, Jiayu Xu
2019/646 (PDF ) Communication-Efficient Unconditional MPC with Guaranteed Output Delivery Vipul Goyal, Yanyi Liu, Yifan Song
2019/645 (PDF ) Attribute Based Encryption for Deterministic Finite Automata from DLIN Shweta Agrawal, Monosij Maitra, Shota Yamada
2019/644 (PDF ) Timed Signatures and Zero-Knowledge Proofs -Timestamping in the Blockchain Era- Aydin Abadi, Michele Ciampi, Aggelos Kiayias, Vassilis Zikas
2019/643 (PDF ) Indistinguishability Obfuscation Without Multilinear Maps: New Paradigms via Low Degree Weak Pseudorandomness and Security Amplification Prabhanjan Ananth, Aayush Jain, Huijia Lin, Christian Matt, Amit Sahai
2019/642 (PDF ) Algebraic Techniques for Short(er) Exact Lattice-Based Zero-Knowledge Proofs Jonathan Bootle, Vadim Lyubashevsky, Gregor Seiler
2019/641 (PDF ) Simulation Extractability in Groth's zk-SNARK Shahla Atapoor, Karim Baghery
2019/640 (PDF ) On Round Optimal Statistical Zero Knowledge Arguments Nir Bitansky, Omer Paneth
2019/639 (PDF ) Trapdoor Hash Functions and Their Applications Nico Döttling, Sanjam Garg, Yuval Ishai, Giulio Malavolta, Tamer Mour, Rafail Ostrovsky
2019/638 (PDF ) On the Distribution of Quadratic Residues and Non-residues Modulo Composite Integers and Applications to Cryptography Ferucio Laurentiu Tiplea, Sorin Iftene, George Teseleanu, Anca-Maria Nica
2019/637 (PDF ) Cryptographic Sensing Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai
2019/636 (PDF ) Broadcast and Trace with N^epsilon Ciphertext Size from Standard Assumptions Rishab Goyal, Willy Quach, Brent Waters, Daniel Wichs
2019/635 (PDF ) Homomorphic Time-Lock Puzzles and Applications Giulio Malavolta, Sri Aravinda Krishnan Thyagarajan
2019/634 (PDF ) SpOT-Light: Lightweight Private Set Intersection from Sparse OT Extension Benny Pinkas, Mike Rosulek, Ni Trieu, Avishay Yanai
2019/633 (PDF ) New non-linearity parameters of Boolean functions Igor Semaev
2019/632 (PDF ) Fully Homomorphic Encryption for RAMs Ariel Hamlin, Justin Holmgren, Mor Weiss, Daniel Wichs
2019/631 (PDF ) Non-Uniformly Sound Certificates with Applications to Concurrent Zero-Knowledge Cody Freitag, Ilan Komargodski, Rafael Pass
2019/630 (PDF ) ABE for DFA from k-Lin Junqing Gong, Brent Waters, Hoeteck Wee
2019/629 (PDF ) Attribute Based Encryption (and more) for Nondeterministic Finite Automata from LWE Shweta Agrawal, Monosij Maitra, Shota Yamada
2019/628 (PDF ) Watermarking Public-Key Cryptographic Primitives Rishab Goyal, Sam Kim, Nathan Manohar, Brent Waters, David J. Wu
2019/627 (PDF ) Unconditionally Secure Computation Against Low-Complexity Leakage Andrej Bogdanov, Yuval Ishai, Akshayaram Srinivasan
2019/626 (PDF ) Simultaneous Amplification: The Case of Non-Interactive Zero-Knowledge Vipul Goyal, Aayush Jain, Amit Sahai
2019/625 (PDF ) Public-Key Cryptography in the Fine-Grained Setting Rio Lavigne, Andrea Lincoln, Virginia Vassilevska Williams
2019/624 (PDF ) Nonces are Noticed: AEAD Revisited Mihir Bellare, Ruth Ng, Björn Tackmann
2019/623 (PDF ) Exploring Constructions of Compact NIZKs from Various Assumptions Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
2019/622 (PDF ) Extended Truncated-differential Distinguishers on Round-reduced AES Zhenzhen Bao, Jian Guo, Eik List
2019/621 (PDF ) A Modified Simple Substitution Cipher With Unbounded Unicity Distance Bruce Kallick
2019/620 (PDF ) Obfuscated Fuzzy Hamming Distance and Conjunctions from Subset Product Problems Steven D. Galbraith, Lukas Zobernig
2019/619 (PDF ) Continuous Verifiable Delay Functions Naomi Ephraim, Cody Freitag, Ilan Komargodski, Rafael Pass
2019/618 (PDF ) Preimage Attacks on Reduced Troika with Divide-and-Conquer Methods Fukang Liu, Takanori Isobe
2019/617 (PDF ) Trustless, Censorship-Resilient and Scalable Votings in the Permission-based Blockchain Model Sebastian Gajek, Marco Lewandowsky
2019/616 (PDF ) Channels of Small Log-Ratio Leakage and Characterization of Two-Party Differentially Private Computation Iftach Haitner, Noam Mazor, Ronen Shaltiel, Jad Silbak
2019/615 (PDF ) My Gadget Just Cares For Me - How NINA Can Prove Security Against Combined Attacks Siemen Dhooghe, Svetla Nikova
2019/614 (PDF ) Quantum Attacks without Superposition Queries: the Offline Simon's Algorithm Xavier Bonnetain, Akinori Hosoyamada, María Naya-Plasencia, Yu Sasaki, André Schrottenloher
2019/613 (PDF ) MeltdownDetector: A Runtime Approach for Detecting Meltdown Attacks Taha Atahan Akyildiz, Can Berk Guzgeren, Cemal Yilmaz, Erkay Savas
2019/612 (PDF ) Simulation-Extractable SNARKs Revisited Helger Lipmaa
2019/611 (PDF ) Utreexo: A dynamic hash-based accumulator optimized for the Bitcoin UTXO set Thaddeus Dryja
2019/610 (PDF ) Improved Cryptanalysis of the AJPS Mersenne Based Cryptosystem Jean-Sebastien Coron, Agnese Gini
2019/609 (PDF ) CPA-to-CCA Transformation for KDM Security Fuyuki Kitagawa, Takahiro Matsuda
2019/608 (PDF ) Symmetric Primitives with Structured Secrets Navid Alamati, Hart Montgomery, Sikhar Patranabis
2019/607 (PDF ) Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes Zhenzhen Bao, Lin Ding, Jian Guo, Haoyang Wang, Wenying Zhang
2019/606 (PDF ) An Efficient and Provable Masked Implementation of qTESLA François Gérard, Mélissa Rossi
2019/605 (PDF ) A note on different types of ransomware attacks Mihail Anghel, Andrei Racautanu
2019/604 (PDF ) New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator Jun Xu, Santanu Sarkar, Lei Hu, Huaxiong Wang, Yanbin Pan
2019/603 (PDF ) How to Delegate Computations Publicly Yael Kalai, Omer Paneth, Lisa Yang
2019/602 (PDF ) Continuously Non-Malleable Secret Sharing for General Access Structures Gianluca Brian, Antonio Faonio, Daniele Venturi
2019/601 (PDF ) AuroraLight: Improved prover efficiency and SRS size in a Sonic-like system Ariel Gabizon
2019/600 (PDF ) ZOCB and ZOTR: Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption Zhenzhen Bao, Jian Guo, Tetsu Iwata, Kazuhiko Minematsu
2019/599 (PDF ) New Primitives for Actively-Secure MPC over Rings with Applications to Private Machine Learning Ivan Damgård, Daniel Escudero, Tore Frederiksen, Marcel Keller, Peter Scholl, Nikolaj Volgushev
2019/597 (PDF ) A Candidate Access Structure for Super-polynomial Lower Bound on Information Ratio Shahram Khazaei
2019/596 (PDF ) Discretisation and Product Distributions in Ring-LWE Sean Murphy, Rachel Player
2019/595 (PDF ) DLSAG: Non-Interactive Refund Transactions For Interoperable Payment Channels in Monero Pedro Moreno-Sanchez, Arthur Blue, Duc V. Le, Sarang Noether, Brandon Goodell, Aniket Kate
2019/594 (PDF ) Computing Primitive Idempotents in Finite Commutative Rings and Applications Mugurel Barcau, Vicentiu Pasol
2019/593 (PDF ) On Noncommutative Cryptography and homomorphism of stable cubical multivariate transformation groups of infinite dimensional affine spaces V. Ustimenko, M. Klisowski
2019/592 (PDF ) Statistical Analysis and Anonymity of TOR's Path Selection Andrei Mogage, Emil Simion
2019/591 (PDF ) Simulating Homomorphic Evaluation of Deep Learning Predictions Christina Boura, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev
2019/590 (PDF ) Tighter proofs of CCA security in the quantum random oracle model Nina Bindel, Mike Hamburg, Kathrin Hövelmanns, Andreas Hülsing, Edoardo Persichetti
2019/589 (PDF ) A${^2}$L: Anonymous Atomic Locks for Scalability in Payment Channel Hubs Erkan Tairi, Pedro Moreno-Sanchez, Matteo Maffei
2019/588 (PDF ) Formal Notions of Security for Verifiable Homomorphic Encryption Jakub Klemsa, Ivana Trummová
2019/587 (PDF ) Polygraph: Accountable Byzantine Agreement Pierre Civit, Seth Gilbert, Vincent Gramoli
2019/586 (PDF ) Simulation-Extractable zk-SNARK with a Single Verification Jihye Kim, Jiwon Lee, Hyunok Oh
2019/585 (PDF ) On Misuse of Nonce-Misuse Resistance: Adapting Differential Fault Attacks on (few) CAESAR Winners Mustafa Khairallah, Shivam Bhasin, Anupam Chattopadhyay
2019/583 (PDF ) Atomic Multi-Channel Updates with Constant Collateral in Bitcoin-Compatible Payment-Channel Networks Christoph Egger, Pedro Moreno-Sanchez, Matteo Maffei
2019/582 (PDF ) EasyUC: Using EasyCrypt to Mechanize Proofs of Universally Composable Security Ran Canetti, Alley Stoughton, Mayank Varia
2019/580 (PDF ) Omniring: Scaling Up Private Payments Without Trusted Setup - Formal Foundations and Constructions of Ring Confidential Transactions with Log-size Proofs Russell W. F. Lai, Viktoria Ronge, Tim Ruffing, Dominique Schröder, Sri Aravinda Krishnan Thyagarajan, Jiafan Wang
2019/579 (PDF ) BlockQuick: Super-Light Client Protocol for Blockchain Validation on Constrained Devices Dominic Letz
2019/578 (PDF ) Deep Learning based Side Channel Attacks in Practice Houssem Maghrebi
2019/577 (PDF ) Improved Multiplication Triple Generation over Rings via RLWE-based AHE Deevashwer Rathee, Thomas Schneider, K. K. Shukla
2019/576 (PDF ) On Group-Characterizability of Homomorphic Secret Sharing Schemes Reza Kaboli, Shahram Khazaei, Maghsoud Parviz
2019/575 (PDF ) On Abelian and Homomorphic Secret Sharing Schemes Amir Jafari, Shahram Khazaei
2019/574 (PDF ) Subliminal channels in post-quantum digital signature schemes Herman Galteland, Kristian Gjøsteen
2019/573 (PDF ) Security of the Suffix Keyed Sponge Christoph Dobraunig, Bart Mennink
2019/572 (PDF ) On the Commitment Capacity of Unfair Noisy Channels Claude Crépeau, Rafael Dowsley, Anderson C. A. Nascimento
2019/571 (PDF ) Multi-Party Virtual State Channels Stefan Dziembowski, Lisa Eckey, Sebastian Faust, Julia Hesse, Kristina Hostáková
2019/570 (PDF ) Bias-variance Decomposition in Machine Learning-based Side-channel Analysis Daan van der Valk, Stjepan Picek
2019/569 (PDF ) Lattice RingCT v2.0 with Multiple Input and Output Wallets Wilson Alberto Torres, Veronika Kuchta, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Jacob Cheng
2019/568 (PDF ) Post Quantum ECC on FPGA Platform Debapriya Basu Roy, Debdeep Mukhopadhyay
2019/567 (PDF ) (Linkable) Ring Signature from Hash-Then-One-Way Signature Xingye Lu, Man Ho Au, Zhenfei Zhang
2019/566 (PDF ) Deep Learning based Model Building Attacks on Arbiter PUF Compositions Pranesh Santikellur, Aritra Bhattacharyay, Rajat Subhra Chakraborty
2019/565 (PDF ) Asymmetric Message Franking: Content Moderation for Metadata-Private End-to-End Encryption Nirvan Tyagi, Paul Grubbs, Julia Len, Ian Miers, Thomas Ristenpart
2019/564 (PDF ) Verification of Authenticated Firmware Load Sujit Kumar Muduli, Pramod Subramanyan, Sayak Ray
2019/563 (PDF ) ShareLock: Mixing for Cryptocurrencies from Multiparty ECDSA Omer Shlomovits, István András Seres
2019/562 (PDF ) Towards More Secure Constructions of Adjustable Join Schemes Shahram Khazaei, Mojtaba Rafiee
2019/561 (PDF ) Faster Bootstrapping of FHE over the integers with large prime message space Zhizhu Lian, Yupu Hu, Hu Chen, Baocang Wang
2019/560 (PDF ) Solutions of $x^{q^k}+\cdots+x^{q}+x=a$ in $GF(2^n)$ Kwang Ho Kim, Jong Hyok Choe, Dok Nam Lee, Dae Song Go, Sihem Mesnager
2019/559 (PDF ) Weights on affine subspaces and some other cryptographic characteristics of Boolean functions of 5 variables Evgeny K. Alekseev, Lyudmila A. Kushchinskaya
2019/558 (PDF ) How to not break SIDH Chloe Martindale, Lorenz Panny
2019/557 (PDF ) Extended Galbraith's Test on the Anonymity of IBEs from Higher Residuosity Xiaopeng Zhao, Zhenfu Cao, Xiaolei Dong, Jun Shao
2019/556 (PDF ) When Encryption is Not Enough -- Effective Concealment of Communication Pattern, even Existence (BitGrey, BitLoop) Gideon Samid
2019/555 (PDF ) Optimal TNFS-secure pairings on elliptic curves with composite embedding degree Georgios Fotiadis, Chloe Martindale
2019/554 (PDF ) How to Build Pseudorandom Functions From Public Random Permutations Yu Long Chen, Eran Lambooij, Bart Mennink
2019/553 (PDF ) Towards post-quantum symmetric cryptography John Gregory Underhill, Stiepan Aurélien Kovac, Xenia Bogomolec
2019/552 (PDF ) Continuous Space-Bounded Non-Malleable Codes from Stronger Proofs-of-Space Binyi Chen, Yilei Chen, Kristina Hostáková, Pratyay Mukherjee
2019/551 (PDF ) A note on the correlations between NIST cryptographic statistical tests suite Emil Simion, Paul Burciu
2019/550 (PDF ) Spartan: Efficient and general-purpose zkSNARKs without trusted setup Srinath Setty
2019/549 (PDF ) Finding a Nash Equilibrium Is No Easier Than Breaking Fiat-Shamir Arka Rai Choudhuri, Pavel Hubacek, Chethan Kamath, Krzysztof Pietrzak, Alon Rosen, Guy N. Rothblum
2019/548 (PDF ) About Wave Implementation and its Leakage Immunity Thomas Debris-Alazard, Nicolas Sendrier, Jean-Pierre Tillich
2019/547 (PDF ) Linearly-Homomorphic Signatures and Scalable Mix-Nets Chloé Hébant, Duong Hieu Phan, David Pointcheval
2019/546 (PDF ) Zero-Knowledge Proof-of-Identity: Sybil-Resistant, Anonymous Authentication on Permissionless Blockchains and Incentive Compatible, Strictly Dominant Cryptocurrencies David Cerezo Sánchez
2019/544 (PDF ) Evaluation of Code-based Signature Schemes Partha Sarathi Roy, Kirill Morozov, Kazuhide Fukushima, Shinsaku Kiyomoto
2019/543 (PDF ) TMPS: Ticket-Mediated Password Strengthening John Kelsey, Dana Dachman-Soled, Sweta Mishra, Meltem Sonmez Turan
2019/542 (PDF ) Formally Verified Cryptographic Web Applications in WebAssembly Jonathan Protzenko, Benjamin Beurdouche, Denis Merigoux, Karthikeyan Bhargavan
2019/541 (PDF ) A Smart Contract Refereed Data Retrieval Protocol with a Provably Low Collateral Requirement James Shook, Scott Simon, Peter Mell
2019/540 (PDF ) A chosen key attack against the secret S-boxes of GOST Markku-Juhani O. Saarinen
2019/539 (PDF ) Cryptanalysis of FlexAEAD Mostafizar Rahman, Dhiman Saha, Goutam Paul
2019/538 (PDF ) On Perfect Endomorphic Ciphers Nikolay Shenets
2019/537 (PDF ) Efficient Search for Optimal Diffusion Layers of Generalized Feistel Networks Patrick Derbez, Pierre-Alain Fouque, Baptiste Lambin, Victor Mollimard
2019/536 (PDF ) Protecting against Statistical Ineffective Fault Attacks Joan Daemen, Christoph Dobraunig, Maria Eichlseder, Hannes Gross, Florian Mendel, Robert Primas
2019/535 (PDF ) SIKE Round 2 Speed Record on ARM Cortex-M4 Hwajeong soe, Amir Jalali, Reza Azarderakhsh
2019/534 (PDF ) Theoretical and Practical Approaches for Hardness Amplification of PUFs Fatemeh Ganji, Shahin Tajik, Pascal Stauss, Jean-Pierre Seifert, Domenic Forte, Mark Tehranipoor
2019/533 (PDF ) Stopping time signatures for some algorithms in cryptography Percy Deift, Stephen D. Miller, Thomas Trogdon
2019/532 (PDF ) Concretely-Efficient Zero-Knowledge Arguments for Arithmetic Circuits and Their Application to Lattice-Based Cryptography Carsten Baum, Ariel Nof
2019/531 (PDF ) How to Correct Errors in Multi-Server PIR Kaoru Kurosawa
2019/530 (PDF ) Speed-up of SCA attacks on 32-bit multiplications Robert Nguyen, Adrien Facon, Sylvain Guilley, Guillaume Gautier, Safwan El Assad
2019/529 (PDF ) UC-Commitment Schemes with Phase-Adaptive Security from Trapdoor Functions Pedro Branco, Manuel Goulão, Paulo Mateus
2019/528 (PDF ) Anomalies and Vector Space Search: Tools for S-Box Analysis (Full Version) Xavier Bonnetain, Léo Perrin, Shizhu Tian
2019/527 (PDF ) Revisiting Privacy-aware Blockchain Public Key Infrastructure Olamide Omolola, Paul Plessing
2019/526 (PDF ) Prime, Order Please! Revisiting Small Subgroup and Invalid Curve Attacks on Protocols using Diffie-Hellman Cas Cremers, Dennis Jackson
2019/525 (PDF ) Misuse Attacks on Post-Quantum Cryptosystems Ciprian Băetu, F. Betül Durak, Loïs Huguenin-Dumittan, Abdullah Talayhan, Serge Vaudenay
2019/524 (PDF ) Efficient Multi-Key Homomorphic Encryption with Packed Ciphertexts with Application to Oblivious Neural Network Inference Hao Chen, Wei Dai, Miran Kim, Yongsoo Song
2019/523 (PDF ) Threshold ECDSA from ECDSA Assumptions: The Multiparty Case Jack Doerner, Yashvanth Kondi, Eysa Lee, abhi shelat
2019/522 (PDF ) Secret-Sharing from Robust Conditional Disclosure of Secrets Amos Beimel, Naty Peter
2019/521 (PDF ) Fully Homomorphic Encryption with k-bit Arithmetic Operations Benjamin M. Case, Shuhong Gao, Gengran Hu, Qiuxia Xu
2019/520 (PDF ) A Note on Sub-Gaussian Random Variables Benjamin M. Case, Colin Gallagher, Shuhong Gao
2019/519 (PDF ) Security in the Presence of Key Reuse: Context-Separable Interfaces and their Applications Christopher Patton, Thomas Shrimpton
2019/518 (PDF ) Fast Database Joins and PSI for Secret Shared Data Payman Mohassel, Peter Rindal, Mike Rosulek
2019/517 (PDF ) Mobile Private Contact Discovery at Scale Daniel Kales, Christian Rechberger, Thomas Schneider, Matthias Senker, Christian Weinert
2019/516 (PDF ) CellTree: A New Paradigm for Distributed Data Repositories Anasuya Acharya, Manoj Prabhakaran, Akash Trehan
2019/515 (PDF ) A Countermeasure Against Statistical Ineffective Fault Analysis Jakub Breier, Mustafa Khairallah, Xiaolu Hou, Yang Liu
2019/514 (PDF ) Pixel: Multi-signatures for Consensus Manu Drijvers, Sergey Gorbunov, Gregory Neven, Hoeteck Wee
2019/513 (PDF ) New Code-Based Privacy-Preserving Cryptographic Constructions Khoa Nguyen, Hanh Tang, Huaxiong Wang, Neng Zeng
2019/512 (PDF ) Tight Leakage-Resilient CCA-Security from Quasi-Adaptive Hash Proof System Shuai Han, Shengli Liu, Lin Lyu, Dawu Gu
2019/511 (PDF ) GALACTICS: Gaussian Sampling for Lattice-Based Constant-Time Implementation of Cryptographic Signatures, Revisited Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Mélissa Rossi, Mehdi Tibouchi
2019/510 (PDF ) Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices: KEMs and Signatures of Smaller Sizes Jiang Zhang, Yu Yu, Shuqin Fan, Zhenfeng Zhang, Kang Yang
2019/509 (PDF ) New Slide Attacks on Almost Self-Similar Ciphers Orr Dunkelman, Nathan Keller, Noam Lasry, Adi Shamir
2019/508 (PDF ) RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security Tsz Hon Yuen, Shi-feng Sun, Joseph K. Liu, Man Ho Au, Muhammed F. Esgin, Qingzhao Zhang, Dawu Gu
2019/507 (PDF ) Simple Schemes in the Bounded Storage Model Jiaxin Guan, Mark Zhandry
2019/506 (PDF ) Forward Integrity and Crash Recovery for Secure Logs Erik-Oliver Blass, Guevara Noubir
2019/505 (PDF ) DL-LA: Deep Learning Leakage Assessment: A modern roadmap for SCA evaluations Thorben Moos, Felix Wegener, Amir Moradi
2019/504 (PDF ) Afgjort: A Partially Synchronous Finality Layer for Blockchains Thomas Dinsdale-Young, Bernardo Magri, Christian Matt, Jesper Buus Nielsen, Daniel Tschudi
2019/503 (PDF ) Two-Party ECDSA from Hash Proof Systems and Efficient Instantiations Guilhem Castagnos, Dario Catalano, Fabien Laguillaumie, Federico Savasta, Ida Tucker
2019/502 (PDF ) A refined analysis of the cost for solving LWE via uSVP Shi Bai, Shaun Miller, Weiqiang Wen
2019/501 (PDF ) Optimal Merging in Quantum k-xor and k-sum Algorithms María Naya-Plasencia, André Schrottenloher
2019/500 (PDF ) An HPR variant of the FV scheme: Computationally Cheaper, Asymptotically Faster Jean-Claude Bajard, Julien Eynard, Paulo Martins, Leonel Sousa, Vincent Zucca
2019/499 (PDF ) Dual Isogenies and Their Application to Public-key Compression for Isogeny-based Cryptography Michael Naehrig, Joost Renes
2019/498 (PDF ) CSI-FiSh: Efficient Isogeny based Signatures through Class Group Computations Ward Beullens, Thorsten Kleinjung, Frederik Vercauteren
2019/497 (PDF ) Forward and Backward-Secure Range-Searchable Symmetric Encryption Jiafan Wang, Sherman S. M. Chow
2019/496 (PDF ) Non-malleability for quantum public-key encryption Christian Majenz, Christian Schaffner, Jeroen van Wier
2019/495 (PDF ) Protecting ECC Against Fault Attacks: The Ring Extension Method Revisited Marc Joye
2019/494 (PDF ) On the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle model Haodong Jiang, Zhenfeng Zhang, Zhi Ma
2019/493 (PDF ) Evaluating the effectiveness of heuristic worst-case noise analysis in FHE Anamaria Costache, Kim Laine, Rachel Player
2019/492 (PDF ) Decisional second-preimage resistance: When does SPR imply PRE? Daniel J. Bernstein, Andreas Hülsing
2019/491 (PDF ) Best Information is Most Successful Eloi de Cherisey, Sylvain Guilley, Olivier Rioul, Pablo Piantanida
2019/490 (PDF ) Sigma protocols for MQ, PKP and SIS, and fishy signature schemes Ward Beullens
2019/489 (PDF ) Memory-Efficient High-Speed Implementation of Kyber on Cortex-M4 Leon Botros, Matthias J. Kannwischer, Peter Schwabe
2019/488 (PDF ) Enigma 2000: An Authenticated Encryption Algorithm For Human-to-Human Communication Alan Kaminsky
2019/487 (PDF ) From Single-Input to Multi-Client Inner-Product Functional Encryption Michel Abdalla, Fabrice Benhamouda, Romain Gay
2019/486 (PDF ) Detective Mining: Selfish Mining Becomes Unrealistic under Mining Pool Environment Suhyeon Lee, Seungjoo Kim
2019/485 (PDF ) A taxonomy of pairings, their security, their complexity Razvan Barbulescu, Nadia El Mrabet, Loubna Ghammam
2019/484 (PDF ) New Number-Theoretic Cryptographic Primitives Eric Brier, Houda Ferradi, Marc Joye, David Naccache
2019/483 (PDF ) Improved Filter Permutators: Combining Symmetric Encryption Design, Boolean Functions, Low Complexity Cryptography, and Homomorphic Encryption, for Private Delegation of Computations Pierrick Méaux, Claude Carlet, Anthony Journault, François-Xavier Standaert
2019/482 (PDF ) Tiny WireGuard Tweak Jacob Appelbaum, Chloe Martindale, Peter Wu
2019/481 (PDF ) An Efficient and Compact Reformulation of NIST Collision Estimate Test Prasanna Raghaw Mishra, Bhartendu Nandan, Navneet Gaba
2019/480 (PDF ) On the Efficiency of Privacy-Preserving Smart Contract Systems Karim Baghery
2019/479 (PDF ) Extended 3-Party ACCE and Application to LoRaWAN 1.1 Sébastien Canard, Loïc Ferreira
2019/478 (PDF ) BEARZ Attack FALCON: Implementation Attacks with Countermeasures on the FALCON signature scheme Sarah McCarthy, James Howe, Neil Smyth, Seamus Brannigan, Máire O’Neill
2019/477 (PDF ) The Complexities of Healing in Secure Group Messaging: Why Cross-Group Effects Matter Cas Cremers, Britta Hale, Konrad Kohbrok
2019/476 (PDF ) On MILP-Based Automatic Search for Differential Trails Through Modular Additions with Application to Bel-T Muhammad ElSheikh, Ahmed Abdelkhalek, Amr M. Youssef
2019/475 (PDF ) Dual-Mode NIZKs from Obfuscation Dennis Hofheinz, Bogdan Ursu
2019/473 (PDF ) A Method to Reduce the Key Size of UOV Signature Scheme Chengdong Tao
2019/472 (PDF ) Defeating the Hart et al, Beullens-Blackburn, Kotov-Menshov-Ushakov, and Merz-Petit Attacks on WalnutDSA(TM) Iris Anshel, Derek Atkins, Dorian Goldfeld, Paul E Gunnells
2019/471 (PDF ) UC-Secure CRS Generation for SNARKs Behzad Abdolmaleki, Karim Baghery, Helger Lipmaa, Janno Siim, Michal Zajac
2019/470 (PDF ) A Practical Approach to the Secure Computation of the Moore-Penrose Pseudoinverse over the Rationals Niek J. Bouman, Niels de Vreede
2019/469 (PDF ) Security Analysis of Efficient Anonymous Authentication With Conditional Privacy Preserving Scheme for Vehicular Ad Hoc Networks Rui Qiao, Qinglong Wang, Zongtao Duan, Na Fan
2019/468 (PDF ) The Mersenne Low Hamming Combination Search Problem can be reduced to an ILP Problem Alessandro Budroni, Andrea Tenti
2019/467 (PDF ) Revisiting Location Privacy from a Side-Channel Analysis Viewpoint (Extended Version) Clément Massart, François-Xavier Standaert
2019/465 (PDF ) Towards a Practical Cluster Analysis over Encrypted Data Jung Hee Cheon, Duhyeong Kim, Jai Hyun Park
2019/464 (PDF ) The complexity of MinRank Alessio Caminata, Elisa Gorla
2019/463 (PDF ) In Pursuit of Clarity In Obfuscation Allison Bishop, Lucas Kowalczyk, Tal Malkin, Valerio Pastro, Mariana Raykova, Kevin Shi
2019/462 (PDF ) How to wrap it up - A formally verified proposal for the use of authenticated wrapping in PKCS\#11 Alexander Dax, Robert Künnemann, Sven Tangermann, Michael Backes
2019/461 (PDF ) Physical Security of Deep Learning on Edge Devices: Comprehensive Evaluation of Fault Injection Attack Vectors Xiaolu Hou, Jakub Breier, Dirmanto Jap, Lei Ma, Shivam Bhasin, Yang Liu
2019/460 (PDF ) Fast Keyed-Verification Anonymous Credentials on Standard Smart Cards Jan Camenisch, Manu Drijvers, Petr Dzurenda, Jan Hajny
2019/459 (PDF ) From Collisions to Chosen-Prefix Collisions - Application to Full SHA-1 Gaëtan Leurent, Thomas Peyrin
2019/458 (PDF ) Poseidon: A New Hash Function for Zero-Knowledge Proof Systems Lorenzo Grassi, Dmitry Khovratovich, Christian Rechberger, Arnab Roy, Markus Schofnegger
2019/457 (PDF ) Forgery Attack on mixFeed in the Nonce-Misuse Scenario Mustafa Khairallah
2019/456 (PDF ) UniqueChain: A Fast, Provably Secure Proof-of-Stake Based Blockchain Protocol in the Open Setting Peifang Ni, Hongda Li, Xianning Meng, Dongxue Pan
2019/455 (PDF ) FloodXMR: Low-cost transaction flooding attack with Monero’s bulletproof protocol João Otávio Massari Chervinski, Diego Kreutz, Jiangshan Yu
2019/454 (PDF ) Non-Interactive MPC with Trusted Hardware Secure Against Residual Function Attacks Ryan Karl, Timothy Burchfield, Jonathan Takeshita, Taeho Jung
2019/453 (PDF ) A New Approach to Modelling Centralised Reputation Systems Lydia Garms, Elizabeth A. Quaglia
2019/452 (PDF ) A Central Limit Framework for Ring-LWE Decryption Sean Murphy, Rachel Player
2019/451 (PDF ) Reducing the Cost of Authenticity with Leakages: a CIML2-Secure AE Scheme with One Call to a Strongly Protected Tweakable Block Cipher Francesco Berti, Olivier Pereira, François-Xavier Standaert
2019/450 (PDF ) HMAKE: Legacy-Compliant Multi-factor Authenticated Key Exchange from Historical Data Chenglu Jin, Zheng Yang, Sridhar Adepu, Jianying Zhou
2019/449 (PDF ) Limits to Non-Malleability Marshall Ball, Dana Dachman-Soled, Mukul Kulkarni, Tal Malkin
2019/448 (PDF ) Efficient Pseudorandom Correlation Generators: Silent OT Extension and More Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Scholl
2019/447 (PDF ) Practical Key-recovery Attacks on Round-Reduced Ketje Jr, Xoodoo-AE and Xoodyak Haibo Zhou, Zheng Li, Xiaoyang Dong, Keting Jia, Willi Meier
2019/446 (PDF ) Backward Private DSSE: Alternative Formulations of Information Leakage and Efficient Constructions Sanjit Chatterjee, Shravan Kumar Parshuram Puria, Akash Shah
2019/445 (PDF ) Lattice-based Zero-Knowledge Proofs: New Techniques for Shorter and Faster Constructions and Applications Muhammed F. Esgin, Ron Steinfeld, Joseph K. Liu, Dongxi Liu
2019/444 (PDF ) Symmetric-key Authenticated Key Exchange (SAKE) with Perfect Forward Secrecy Gildas Avoine, Sébastien Canard, Loïc Ferreira
2019/443 (PDF ) Contingent payments on a public ledger: models and reductions for automated verification Sergiu Bursuc, Steve Kremer
2019/442 (PDF ) K2SN-MSS: An Efficient Post-Quantum Signature (Full Version) Sabyasachi Karati, Reihaneh Safavi-Naini
2019/441 (PDF ) The State of the Uniform: Attacks on Encrypted Databases Beyond the Uniform Query Distribution Evgenios M. Kornaropoulos, Charalampos Papamanthou, Roberto Tamassia
2019/440 (PDF ) Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas Lopez, Mridul Nandi, Yu Sasaki
2019/439 (PDF ) A Comprehensive Study of Deep Learning for Side-Channel Analysis Loïc Masure, Cécile Dumas, Emmanuel Prouff
2019/438 (PDF ) Oblivious PRF on Committed Vector Inputs and Application to Deduplication of Encrypted Data Jan Camenisch, Angelo De Caro, Esha Ghosh, Alessandro Sorniotti
2019/437 (PDF ) Efficient coding for secure computing with additively-homomorphic encrypted data Thijs Veugen
2019/436 (PDF ) Flexible Authenticated and Confidential Channel Establishment (fACCE): Analyzing the Noise Protocol Framework Benjamin Dowling, Paul Rösler, Jörg Schwenk
2019/435 (PDF ) A Complete and Optimized Key Mismatch Attack on NIST Candidate NewHope Yue Qin, Chi Cheng, Jintai Ding
2019/434 (PDF ) Masking Fuzzy-Searchable Public Databases Alexandra Boldyreva, Tianxin Tang, Bogdan Warinschi
2019/433 (PDF ) Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) versus QUIC Shan Chen, Samuel Jero, Matthew Jagielski, Alexandra Boldyreva, Cristina Nita-Rotaru
2019/432 (PDF ) Cryptanalysis of a System Based on Twisted Reed-Solomon Codes Julien Lavauzelle, Julian Renner
2019/431 (PDF ) Cocks-Pinch curves of embedding degrees five to eight and optimal ate pairing computation Aurore Guillevic, Simon Masson, Emmanuel Thomé
2019/429 (PDF ) ASTRA: High Throughput 3PC over Rings with Application to Secure Prediction Harsh Chaudhari, Ashish Choudhury, Arpita Patra, Ajith Suresh
2019/428 (PDF ) Quantum Lazy Sampling and Game-Playing Proofs for Quantum Indifferentiability Jan Czajkowski, Christian Majenz, Christian Schaffner, Sebastian Zur
2019/427 (PDF ) Improved Secure Integer Comparison via Homomorphic Encryption Florian Bourse, Olivier Sanders, Jacques Traoré
2019/426 (PDF ) Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols Abdelrahaman Aly, Tomer Ashur, Eli Ben-Sasson, Siemen Dhooghe, Alan Szepieniec
2019/425 (PDF ) Homomorphic Training of 30,000 Logistic Regression Models Flavio Bergamaschi, Shai Halevi, Tzipora T. Halevi, Hamish Hunt
2019/423 (PDF ) Chaotic Compilation for Encrypted Computing: Obfuscation but Not in Name Peter T. Breuer
2019/422 (PDF ) Parallelizable MACs Based on the Sum of PRPs with Security Beyond the Birthday Bound Alexander Moch, Eik List
2019/421 (PDF ) Continuing to reflect on TLS 1.3 with external PSK Liliya Akhmetzyanova, Evgeny Alekseev, Ekaterina Smyshlyaeva, Alexandr Sokolov
2019/420 (PDF ) Improving Speed of Dilithium’s Signing Procedure Prasanna Ravi, Sourav Sen Gupta, Anupam Chattopadhyay, Shivam Bhasin
2019/419 (PDF ) Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC Martin R. Albrecht, Carlos Cid, Lorenzo Grassi, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger
2019/418 (PDF ) Sharing of Encrypted files in Blockchain Made Simpler S. Sharmila Deva Selvi, Arinjita Paul, Siva Dirisala, Saswata Basu, C. Pandu Rangan
2019/417 (PDF ) Numerical Method for Comparison on Homomorphically Encrypted Numbers Jung Hee Cheon, Dongwoo Kim, Duhyeong Kim, Hun Hee Lee, Keewoo Lee
2019/416 (PDF ) How many transactions per second can bitcoin really handle ? Theoretically. Evangelos Georgiadis
2019/415 (PDF ) Refinement and Verification of CBC Casper Ryuya Nakamura, Takayuki Jimba, Dominik Harz
2019/414 (PDF ) Two-Round Oblivious Transfer from CDH or LPN Nico Döttling, Sanjam Garg, Mohammad Hajiabadi, Daniel Masny, Daniel Wichs
2019/413 (PDF ) On the Streaming Indistinguishability of a Random Permutation and a Random Function Itai Dinur
2019/412 (PDF ) On the complexity of the Permuted Kernel Problem Eliane KOUSSA, Gilles MACARIO-RAT, Jacques PATARIN
2019/411 (PDF ) Exploring the Monero Peer-to-Peer Network Tong Cao, Jiangshan Yu, Jérémie Decouchant, Xiapu Luo, Paulo Verissimo
2019/410 (PDF ) Policy-Based Sanitizable Signatures Kai Samelin, Daniel Slamanig
2019/409 (PDF ) Post-Quantum Provably-Secure Authentication and MAC from Mersenne Primes Houda Ferradi, Keita Xagawa
2019/408 (PDF ) Forgery Attack on SNEIKEN Mustafa Khairallah
2019/407 (PDF ) Privacy-Preserving Network Path Validation Binanda Sengupta, Yingjiu Li, Kai Bu, Robert H. Deng
2019/406 (PDF ) Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based David Derler, Kai Samelin, Daniel Slamanig, Christoph Striecks
2019/405 (PDF ) A Novel FPGA Architecture and Protocol for the Self-attestation of Configurable Hardware Jo Vliegen, Md Masoom Rabbani, Mauro Conti, Nele Mentens
2019/404 (PDF ) Efficient Message Authentication Codes with Combinatorial Group Testing Kazuhiko Minematsu
2019/403 (PDF ) Fast and simple constant-time hashing to the BLS12-381 elliptic curve Riad S. Wahby, Dan Boneh
2019/402 (PDF ) ILC: A Calculus for Composable, Computational Cryptography Kevin Liao, Matthew A. Hammer, Andrew Miller
2019/401 (PDF ) Side-Channel assessment of Open Source Hardware Wallets Manuel San Pedro, Victor Servant, Charles Guillemet
2019/400 (PDF ) Degenerate Fault Attacks on Elliptic Curve Parameters in OpenSSL Akira Takahashi, Mehdi Tibouchi
2019/399 (PDF ) Inception makes non-malleable codes shorter as well! Divesh Aggarwal, Maciej Obremski
2019/398 (PDF ) Constant-Round Group Key Exchange from the Ring-LWE Assumption Daniel Apon, Dana Dachman-Soled, Huijing Gong, Jonathan Katz
2019/397 (PDF ) Feistel Structures for MPC, and More Martin R. Albrecht, Lorenzo Grassi, Leo Perrin, Sebastian Ramacher, Christian Rechberger, Dragos Rotaru, Arnab Roy, Markus Schofnegger
2019/396 (PDF ) Mitigation Techniques for Attacks on 1-Dimensional Databases that Support Range Queries Evangelia Anna Markatou, Roberto Tamassia
2019/395 (PDF ) Full Database Reconstruction with Access and Search Pattern Leakage Evangelia Anna Markatou, Roberto Tamassia
2019/394 (PDF ) Masking Dilithium: Efficient Implementation and Side-Channel Evaluation Vincent Migliore, Benoit Gérard, Mehdi Tibouchi, Pierre-Alain Fouque
2019/393 (PDF ) A Tight Parallel Repetition Theorem for Partially Simulatable Interactive Arguments via Smooth KL-Divergence Itay Berman, Iftach Haitner, Eliad Tsfadia
2019/392 (PDF ) New Conditional Cube Attack on Keccak Keyed Modes Zheng Li, Xiaoyang Dong, Wenquan Bi, Keting Jia, Xiaoyun Wang, Willi Meier
2019/391 (PDF ) Fooling the Sense of Cross-core Last-level Cache Eviction based Attacker by Prefetching Common Sense Biswabandan Panda
2019/390 (PDF ) KeyForge: Mitigating Email Breaches with Forward-Forgeable Signatures Michael Specter, Sunoo Park, Matthew Green
2019/389 (PDF ) Achieving secure and efficient lattice-based public-key encryption: the impact of the secret-key distribution Sauvik Bhattacharya, Oscar Garcia-Morchon, Rachel Player, Ludo Tolhuizen
2019/388 (PDF ) Towards Secret-Free Security Ulrich Rührmair
2019/387 (PDF ) SoK : On DFA Vulnerabilities of Substitution-Permutation Networks Mustafa Khairallah, Xiaolu Hou, Zakaria Najm, Jakub Breier, Shivam Bhasin, Thomas Peyrin
2019/386 (PDF ) Field Extension in Secret-Shared Form and Its Applications to Efficient Secure Computation Ryo Kikuchi, Nuttapong Attrapadung, Koki Hamada, Dai Ikarashi, Ai Ishida, Takahiro Matsuda, Yusuke Sakai, Jacob C. N. Schuldt
2019/385 (PDF ) Miller Inversion is Easy for the Reduced Tate Pairing on Supersingular Curves of Embedding Degree Two and Three Takakazu Satoh
2019/384 (PDF ) What Storage Access Privacy is Achievable with Small Overhead? Sarvar Patel, Giuseppe Persiano, Kevin Yeo
2019/383 (PDF ) Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd Mathy Vanhoef, Eyal Ronen
2019/382 (PDF ) Hierarchical Attribute-based Signatures: Short Keys and Optimal Signature Length Daniel Gardham, Mark Manulis
2019/380 (PDF ) A Single Shuffle Is Enough for Secure Card-Based Computation of Any Circuit Kazumasa Shinagawa, Koji Nuida
2019/379 (PDF ) Non-Malleable Codes for Decision Trees Marshall Ball, Siyao Guo, Daniel Wichs
2019/378 (PDF ) pRate: Anonymous Star Rating with Rating Secrecy Jia Liu, Mark Manulis
2019/377 (PDF ) Lower Bounds for Oblivious Near-Neighbor Search Kasper Green Larsen, Tal Malkin, Omri Weinstein, Kevin Yeo
2019/376 (PDF ) SELL v1.0: Searchable Encrypted Logging Library Amir Jalali, Neil Davenport
2019/375 (PDF ) Secure Trick-Taking Game Protocols: How to Play Online Spades with Cheaters Xavier Bultel, Pascal Lafourcade
2019/374 (PDF ) Probability 1 Iterated Differential in the SNEIK Permutation Léo Perrin
2019/373 (PDF ) Lelantus: A New Design for Anonymous and Confidential Cryptocurrencies Aram Jivanyan
2019/372 (PDF ) Privado: Privacy-Preserving Group-based Advertising using Multiple Independent Social Network Providers Sanaz Taheri Boshrooyeh, Alptekin Küpçü, Öznur Özkasap
2019/371 (PDF ) Adding Linkability to Ring Signatures with One-Time Signatures Xueli Wang, Yu Chen, Xuecheng Ma
2019/370 (PDF ) Indifferentiability for Public Key Cryptosystems Mark Zhandry, Cong Zhang
2019/369 (PDF ) On the EA-classes of known APN functions in small dimensions Marco Calderini
2019/368 (PDF ) Strong Post-Compromise Secure Proxy Re-Encryption Alex Davidson, Amit Deo, Ela Lee, Keith Martin
2019/367 (PDF ) SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated Ratcheting Olivier Blazy, Angèle Bossuat, Xavier Bultel, Pierre-Alain Fouque, Cristina Onete, Elena Pagnin
2019/366 (PDF ) Triggerflow: Regression Testing by Advanced Execution Path Inspection Iaroslav Gridin, Cesar Pereida García, Nicola Tuveri, Billy Bob Brumley
2019/365 (PDF ) Fully Secure Attribute-Based Encryption for $t$-CNF from LWE Rotem Tsabary
2019/364 (PDF ) Everybody's a Target: Scalability in Public-Key Encryption Benedikt Auerbach, Federico Giacon, Eike Kiltz
2019/363 (PDF ) Efficient Attribute-Based Signatures for Unbounded Arithmetic Branching Programs Pratish Datta, Tatsuaki Okamoto, Katsuyuki Takashima
2019/362 (PDF ) Game Channels: State Channels for the Gambling Industry with Built-In PRNG Alisa Cherniaeva, Ilia Shirobokov, Alexander Davydov
2019/361 (PDF ) On polynomial secret sharing schemes Anat Paskin-Chernivasky, Artiom Radune
2019/360 (PDF ) SoK: Layer-Two Blockchain Protocols Lewis Gudgeon, Pedro Moreno-Sanchez, Stefanie Roos, Patrick McCorry, Arthur Gervais
2019/359 (PDF ) SANNS: Scaling Up Secure Approximate k-Nearest Neighbors Search Hao Chen, Ilaria Chillotti, Yihe Dong, Oxana Poburinnaya, Ilya Razenshteyn, M. Sadegh Riazi
2019/358 (PDF ) One trace is all it takes: Machine Learning-based Side-channel Attack on EdDSA Leo Weissbart, Stjepan Picek, Lejla Batina
2019/357 (PDF ) Lattice-based proof of a shuffle Núria Costa, Ramiro Martínez, Paz Morillo
2019/356 (PDF ) Ad Hoc Multi-Input Functional Encryption Shweta Agrawal, Michael Clear, Ophir Frieder, Sanjam Garg, Adam O’Neill, Justin Thaler
2019/355 (PDF ) To Infect Or Not To Infect: A Critical Analysis Of Infective Countermeasures In Fault Attacks Anubhab Baksi, Dhiman Saha, Sumanta Sarkar
2019/354 (PDF ) Benchmarking Privacy Preserving Scientific Operations Abdelrahaman Aly, Nigel P. Smart
2019/353 (PDF ) A Faster Constant-time Algorithm of CSIDH keeping Two Points Hiroshi Onuki, Yusuke Aikawa, Tsutomu Yamazaki, Tsuyoshi Takagi
2019/352 (PDF ) SoK: A Taxonomy for Layer-2 Scalability Related Protocols for Cryptocurrencies Maxim Jourenko, Kanta Kurazumi, Mario Larangeira, Keisuke Tanaka
2019/351 (PDF ) Forward Secrecy of SPAKE2 Jose Becerra, Dimiter Ostrev, Marjan Skrobot
2019/350 (PDF ) nGraph-HE: A Graph Compiler for Deep Learning on Homomorphically Encrypted Data Fabian Boemer, Yixing Lao, Rosario Cammarota, Casimir Wierzynski
2019/349 (PDF ) Spin Me Right Round: Rotational Symmetry for FPGA-specific AES Felix Wegener, Lauren De Meyer, Amir Moradi
2019/348 (PDF ) Efficient and Scalable Universal Circuits Masaud Y. Alhassan, Daniel Günther, Ágnes Kiss, Thomas Schneider
2019/347 (PDF ) Selfie: reflections on TLS 1.3 with PSK Nir Drucker, Shay Gueron
2019/346 (PDF ) Yet Another Side Channel Cryptanalysis on SM3 Hash Algorithm Christophe Clavier, Leo Reynaud, Antoine Wurcker
2019/345 (PDF ) Second-order Scatter Attack Hugues Thiebeauld, Aurélien Vasselle, Antoine Wurcker
2019/344 (PDF ) Cryptanalysis of Curl-P and Other Attacks on the IOTA Cryptocurrency Ethan Heilman, Neha Narula, Garrett Tanzer, James Lovejoy, Michael Colavita, Madars Virza, Tadge Dryja
2019/343 (PDF ) Optimizations of Side-Channel Attack on AES MixColumns Using Chosen Input Aurelien Vasselle, Antoine Wurcker
2019/342 (PDF ) LightChain: A DHT-based Blockchain for Resource Constrained Environments Yahya Hassanzadeh-Nazarabadi, Alptekin Küpçü, Öznur Özkasap
2019/341 (PDF ) MixEth: efficient, trustless coin mixing service for Ethereum István András Seres, Dániel A. Nagy, Chris Buckland, Péter Burcsi
2019/340 (PDF ) Ease of Side-Channel Attacks on AES-192/256 by Targeting Extreme Keys Antoine Wurcker
2019/339 (PDF ) Lightweight Authenticated Encryption Mode of Operation for Tweakable Block Ciphers Yusuke Naito, Takeshi Sugawara
2019/338 (PDF ) Garbled Neural Networks are Practical Marshall Ball, Brent Carmer, Tal Malkin, Mike Rosulek, Nichole Schimanski
2019/337 (PDF ) Anonymous Deniable Identification in Ephemeral Setup & Leakage Scenarios Łukasz Krzywiecki, Mirosław Kutyłowski, Jakub Pezda, Marcin Słowik
2019/336 (PDF ) DEEP-FRI: Sampling Outside the Box Improves Soundness Eli Ben-Sasson, Lior Goldberg, Swastik Kopparty, Shubhangi Saraf
2019/335 (PDF ) Examining the Practical Side Channel Resilience of ARX-boxes Yan Yan, Elisabeth Oswald
2019/334 (PDF ) Practically Efficient Secure Distributed Exponentiation without Bit-Decomposition Abdelrahaman Aly, Aysajan Abidin, Svetla Nikova
2019/333 (PDF ) Key-and-Argument-Updatable QA-NIZKs Helger Lipmaa
2019/332 (PDF ) Efficient Private Comparison Queries over Encrypted Databases using Fully Homomorphic Encryption with Finite Fields Benjamin Hong Meng Tan, Hyung Tae Lee, Huaxiong Wang, Shu Qin Ren, Khin Mi Mi Aung
2019/331 (PDF ) Optimized Supersingular Isogeny Key Encapsulation on ARMv8 Processors Amir Jalali, Reza Azarderakhsh, Mehran Mozaffari Kermani, Matthew Campagna, David Jao
2019/330 (PDF ) Practical Supersingular Isogeny Group Key Agreement Reza Azarderakhsh, Amir Jalali, David Jao, Vladimir Soukharev
2019/329 (PDF ) Doubly half-injective PRGs for incompressible white-box cryptography Estuardo Alpirez Bock, Alessandro Amadori, Joppe W. Bos, Chris Brzuska, Wil Michiels
2019/328 (PDF ) On the Difficulty of Hiding the Balance of Lightning Network Channels Jordi Herrera-Joancomartí, Guillermo Navarro-Arribas, Alejandro Ranchal-Pedrosa, Cristina Pérez-Solà, Joaquin Garcia-Alfaro
2019/327 (PDF ) Quantum Distinguishing Attacks against Type-1 Generalized Feistel Ciphers Gembu Ito, Tetsu Iwata
2019/326 (PDF ) Shorter Pairing-based Arguments under Standard Assumptions Alonso Gonzalez, Carla Rafols
2019/325 (PDF ) An Efficient Private Evaluation of a Decision Graph Hiroki Sudo, Koji Nuida, Kana Shimizu
2019/324 (PDF ) A Traceable Ring Signature Scheme based on Coding Theory Pedro Branco, Paulo Mateus
2019/323 (PDF ) Theory and application of computationally independent one-way functions: Interactive proof of ability - Revisited Sabyasachi Dutta, Kouichi Sakurai
2019/322 (PDF ) A High-Speed Constant-Time Hardware Implementation of NTRUEncrypt SVES Farnoud Farahmand, Malik Umar Sharif, Kevin Briggs, Kris Gaj
2019/321 (PDF ) Horizontal Collision Correlation Attack on Elliptic Curves Aurélie Bauer, Eliane Jaulmes, Emmanuel Prouff, Jean-René Reinhard, Justine Wild
2019/320 (PDF ) Integral Matrix Gram Root and Lattice Gaussian Sampling without Floats Léo Ducas, Steven Galbraith, Thomas Prest, Yang Yu
2019/319 (PDF ) PGC: Pretty Good Decentralized Confidential Payment System with Auditability Yu Chen, Xuecheng Ma, Cong Tang, Man Ho Au
2019/318 (PDF ) Improved quantum attack on Type-1 Generalized Feistel Schemes and Its application to CAST-256 Boyu Ni, Xiaoyang Dong
2019/317 (PDF ) Libra: Succinct Zero-Knowledge Proofs with Optimal Prover Computation Tiancheng Xie, Jiaheng Zhang, Yupeng Zhang, Charalampos Papamanthou, Dawn Song
2019/316 (PDF ) Extended Affine and CCZ Equivalence up to Dimension 4 Marcus Brinkmann
2019/315 (PDF ) Blockchains from Non-Idealized Hash Functions Juan A. Garay, Aggelos Kiayias, Giorgos Panagiotakos
2019/314 (PDF ) Optimal Bounded-Collusion Secure Functional Encryption Prabhanjan Ananth, Vinod Vaikuntanathan
2019/313 (PDF ) A SAT-based approach for index calculus on binary elliptic curves Monika Trimoska, Sorina Ionica, Gilles Dequen
2019/312 (PDF ) Side-Channel Analysis of the TERO PUF Lars Tebelmann, Michael Pehl, Vincent Immler
2019/311 (PDF ) Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu, Bertram Poettering
2019/310 (PDF ) A Formal Approach to Secure Speculation Kevin Cheang, Cameron Rasmussen, Sanjit Seshia, Pramod Subramanyan
2019/309 (PDF ) Cryptanalysis of CLT13 Multilinear Maps with Independent Slots Jean-Sebastien Coron, Luca Notarnicola
2019/308 (PDF ) Obfuscation from Polynomial Hardness: Beyond Decomposable Obfuscation Yuan Kang, Chengyu Lin, Tal Malkin, Mariana Raykova
2019/307 (PDF ) Solving $x^{2^k+1}+x+a=0$ in $\mathbb{F}_{2^n}$ with $\gcd(n,k)=1$ Kwang Ho Kim, Sihem Mesnager
2019/306 (PDF ) Faster Initial Splitting for Small Characteristic Composite Extension Degree Fields Madhurima Mukhopadhyay, Palash Sarkar
2019/305 (PDF ) Practical Algebraic Side-Channel Attacks Against ACORN Alexandre Adomnicai, Laurent Masson, Jacques J. A. Fournier
2019/304 (PDF ) Ternary Syndrome Decoding with Large Weight Rémi Bricout, André Chailloux, Thomas Debris-Alazard, Matthieu Lequesne
2019/303 (PDF ) Analysis of TPL Signature Scheme Terry Shue Chien Lau, Chik How Tan, Theo Fanuela Prabowo
2019/302 (PDF ) A Survey of Leakage-Resilient Cryptography Yael Tauman Kalai, Leonid Reyzin
2019/301 (PDF ) Safe Compilation for Encrypted Computing Peter T. Breuer, Simon Pickin
2019/300 (PDF ) Transient Effect Ring Oscillators Leak Too Ugo Mureddu, Brice Colombier, Nathalie Bochard, Lilian Bossuet, Viktor Fischer
2019/299 (PDF ) A Generic Construction of Revocable Identity-Based Encryption Xuecheng Ma, Dongdai Lin
2019/298 (PDF ) Improved Classical Cryptanalysis of SIKE in Practice Craig Costello, Patrick Longa, Michael Naehrig, Joost Renes, Fernando Virdia
2019/297 (PDF ) Towards Optimized and Constant-Time CSIDH on Embedded Devices Amir Jalali, Reza Azarderakhsh, Mehran Mozaffari Kermani, David Jao
2019/296 (PDF ) Hash functions from superspecial genus-2 curves using Richelot isogenies Wouter Castryck, Thomas Decru, Benjamin Smith
2019/295 (PDF ) Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption Kimia Tajik, Akshith Gunasekaran, Rhea Dutta, Brandon Ellis, Rakesh B. Bobba, Mike Rosulek, Charles V. Wright, Wu-chi Feng
2019/294 (PDF ) Semi-parallel Logistic Regression for GWAS on Encrypted Data Miran Kim, Yongsoo Song, Baiyu Li, Daniele Micciancio
2019/293 (PDF ) Impossibility of Strong KDM Security with Auxiliary Input Cody Freitag, Ilan Komargodski, Rafael Pass
2019/292 (PDF ) Timing attacks on Error Correcting Codes in Post-Quantum Schemes Jan-Pieter D'Anvers, Marcel Tiepelt, Frederik Vercauteren, Ingrid Verbauwhede
2019/291 (PDF ) CCA Security and Trapdoor Functions via Key-Dependent-Message Security Fuyuki Kitagawa, Takahiro Matsuda, Keisuke Tanaka
2019/290 (PDF ) Cost effective techniques for chip delayering and in-situ depackaging Philippe Loubet Moundi
2019/289 (PDF ) Cryptanalysis of ForkAES Subhadeep Banik, Jannis Bossert, Amit Jana, Eik List, Stefan Lucks, Willi Meier, Mostafizar Rahman, Dhiman Saha, Yu Sasaki
2019/288 (PDF ) On the construction of S-boxes using the leaders and followers metaheuristic Alejandro Freyre-Echevarría, Ismel Martínez-Díaz
2019/287 (PDF ) Security Evaluation for Snow 2.0-like Stream Ciphers Against Correlation Attacks over Extension Fields A. N. Alekseychuk, S. M. Koniushok, M. V. Poremskyi
2019/286 (PDF ) Fast Algebraic Immunity of $2^m+2$ & $2^m+3$ variables Majority Function Yindong Chen, Fei Guo, Liu Zhang
2019/285 (PDF ) SpaceFlip : Unbound Geometry Cryptography Gideon Samid
2019/284 (PDF ) Proper Usage of the Group Signature Scheme in ISO/IEC 20008-2 Ai Ishida, Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Keisuke Tanaka
2019/283 (PDF ) An Attack on Small Private Keys of RSA Based on Euclidean Algorithm Dimitrios Poulakis
2019/282 (PDF ) A Framework for Cryptographic Problems from Linear Algebra Carl Bootland, Wouter Castryck, Alan Szepieniec, Frederik Vercauteren
2019/281 (PDF ) Make Some ROOM for the Zeros: Data Sparsity in Secure Distributed Machine Learning Phillipp Schoppmann, Adria Gascon, Mariana Raykova, Benny Pinkas
2019/280 (PDF ) Multi-Authority Attribute-Based Encryption from LWE in the OT Model Sam Kim
2019/279 (PDF ) A Note on Key Agreement and Non-Interactive Commitments Alex Lombardi, Luke Schaeffer
2019/278 (PDF ) Uncovering Algebraic Structures in the MPC Landscape Navneet Agarwal, Sanat Anand, Manoj Prabhakaran
2019/277 (PDF ) On the boomerang uniformity of quadratic permutations Sihem Mesnager, Chunming Tang, Maosheng Xiong
2019/276 (PDF ) BOREALIS: Building Block for Sealed Bid Auctions on Blockchains Erik-Oliver Blass, Florian Kerschbaum
2019/275 (PDF ) MPCircuits: Optimized Circuit Generation for Secure Multi-Party Computation M. Sadegh Riazi, Mojan Javaheripi, Siam U. Hussain, Farinaz Koushanfar
2019/274 (PDF ) Path Oblivious Heap: Optimal and Practical Oblivious Priority Queue Elaine Shi
2019/273 (PDF ) Compressing Vector OLE Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai
2019/272 (PDF ) Quantum Security Analysis of AES Xavier Bonnetain, María Naya-Plasencia, André Schrottenloher
2019/271 (PDF ) A Simple Key Reuse Attack on LWE and Ring LWE Encryption Schemes as Key Encapsulation Mechanisms (KEMs) Jintai Ding, Chi Cheng, Yue Qin
2019/270 (PDF ) Sync HotStuff: Simple and Practical Synchronous State Machine Replication Ittai Abraham, Dahlia Malkhi, Kartik Nayak, Ling Ren, Maofan Yin
2019/269 (PDF ) Digital Signatures for Consensus Sergey Gorbunov, Hoeteck Wee
2019/268 (PDF ) Lightweight Authentication for Low-End Control Units with Hardware Based Individual Keys* Sergei Bauer, Martin Brunner, Peter Schartner
2019/267 (PDF ) Pushing the speed limit of constant-time discrete Gaussian sampling. A case study on Falcon. Angshuman Karmakar, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede
2019/266 (PDF ) Fast constant-time gcd computation and modular inversion Daniel J. Bernstein, Bo-Yin Yang
2019/265 (PDF ) TEX - A Securely Scalable Trustless Exchange Rami Khalil, Arthur Gervais, Guillaume Felley
2019/264 (PDF ) Unifying computational entropies via Kullback-Leibler divergence Rohit Agrawal, Yi-Hsiu Chen, Thibaut Horel, Salil Vadhan
2019/263 (PDF ) Monoxide: Scale Out Blockchain with Asynchronous Consensus Zones Jiaping Wang, Hao Wang
2019/262 (PDF ) Revisiting Post-Quantum Fiat-Shamir Qipeng Liu, Mark Zhandry
2019/261 (PDF ) Forward-Secure Multi-Signatures Manu Drijvers, Gregory Neven
2019/260 (PDF ) A Modular Treatment of Blind Signatures from Identification Schemes Eduard Hauck, Eike Kiltz, Julian Loss
2019/259 (PDF ) A Practical Method to Recover Exact Superpoly in Cube Attack SenPeng Wang, Bin Hu, Jie Guan, Kai Zhang, TaiRong Shi
2019/258 (PDF ) Tight Time-Memory Trade-offs for Symmetric Encryption Joseph Jaeger, Stefano Tessaro
2019/257 (PDF ) Uncloneable Quantum Encryption via Oracles Anne Broadbent, Sébastien Lord
2019/256 (PDF ) DLCT: A New Tool for Differential-Linear Cryptanalysis Achiya Bar-On, Orr Dunkelman, Nathan Keller, Ariel Weizman
2019/255 (PDF ) Designated Verifier/Prover and Preprocessing NIZKs from Diffie-Hellman Assumptions Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
2019/254 (PDF ) A Quantum-Proof Non-Malleable Extractor With Application to Privacy Amplification against Active Quantum Adversaries Divesh Aggarwal, Kai-Min Chung, Han-Hsuan Lin, Thomas Vidick
2019/253 (PDF ) Founding Secure Computation on Blockchains Arka Rai Choudhuri, Vipul Goyal, Abhishek Jain
2019/252 (PDF ) Reversible Proofs of Sequential Work Hamza Abusalah, Chethan Kamath, Karen Klein, Krzysztof Pietrzak, Michael Walter
2019/251 (PDF ) Consensus through Herding T-H. Hubert Chan, Rafael Pass, Elaine Shi
2019/250 (PDF ) Function-Dependent Commitments from Homomorphic Authenticators Lucas Schabhüser, Denis Butin, Johannes Buchmann
2019/249 (PDF ) Revisiting Variable Output Length XOR Pseudorandom Function Srimanta Bhattacharya, Mridul Nandi
2019/248 (PDF ) Preimage Attacks on Round-reduced Keccak-224/256 via an Allocating Approach Ting Li, Yao Sun
2019/247 (PDF ) Verifier-on-a-Leash: new schemes for verifiable delegated quantum computation, with quasilinear resources Andrea Coladangelo, Alex B. Grilo, Stacey Jeffery, Thomas Vidick
2019/246 (PDF ) Towards optimal robust secret sharing with security against a rushing adversary Serge Fehr, Chen Yuan
2019/245 (PDF ) Distributed Differential Privacy via Shuffling Albert Cheu, Adam Smith, Jonathan Ullman, David Zeber, Maxim Zhilyaev
2019/244 (PDF ) Attacks Only Get Better: How to Break FF3 on Large Domains Viet Tung Hoang, David Miller, Ni Trieu
2019/243 (PDF ) 4-Round Luby-Rackoff Construction is a qPRP: Tight Quantum Security Bound Akinori Hosoyamada, Tetsu Iwata
2019/242 (PDF ) New Constructions of Reusable Designated-Verifier NIZKs Alex Lombardi, Willy Quach, Ron D. Rothblum, Daniel Wichs, David J. Wu
2019/241 (PDF ) Efficient Circuit-based PSI with Linear Communication Benny Pinkas, Thomas Schneider, Oleksandr Tkachenko, Avishay Yanai
2019/240 (PDF ) Correlated-Source Extractors and Cryptography with Correlated-Random Tapes Vipul Goyal, Yifan Song
2019/239 (PDF ) Cheaper Private Set Intersection via Differentially Private Leakage Adam Groce, Peter Rindal, Mike Rosulek
2019/238 (PDF ) Robust Encryption, Extended Rémi Géraud, David Naccache, Răzvan Roşie
2019/237 (PDF ) Optimal Oblivious Priority Queues Zahra Jafargholi, Kasper Green Larsen, Mark Simkin
2019/236 (PDF ) Designated-verifier pseudorandom generators, and their applications Geoffroy Couteau, Dennis Hofheinz
2019/235 (PDF ) Reusable Designated-Verifier NIZKs for all NP from CDH Willy Quach, Ron D. Rothblum, Daniel Wichs
2019/234 (PDF ) On the Shortness of Vectors to be found by the Ideal-SVP Quantum Algorithm Léo Ducas, Maxime Plançon, Benjamin Wesolowski
2019/233 (PDF ) Unbounded Dynamic Predicate Compositions in Attribute-Based Encryption Nuttapong Attrapadung
2019/232 (PDF ) On Quantum Advantage in Information Theoretic Single-Server PIR Dorit Aharonov, Zvika Brakerski, Kai-Min Chung, Ayal Green, Ching-Yi Lai, Or Sattath
2019/231 (PDF ) Secret-Sharing Schemes for General and Uniform Access Structures Benny Applebaum, Amos Beimel, Oriol Farràs, Oded Nir, Naty Peter
2019/230 (PDF ) Location, location, location: Revisiting modeling and exploitation for location-based side channel leakages Christos Andrikos, Lejla Batina, Lukasz Chmielewski, Liran Lerman, Vasilios Mavroudis, Kostas Papagiannopoulos, Guilherme Perin, Giorgos Rassias, Alberto Sonnino
2019/229 (PDF ) XOR-counts and lightweight multiplication with fixed elements in binary finite fields Lukas Kölsch
2019/228 (PDF ) Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT Nimrod Aviram, Kai Gellert, Tibor Jager
2019/227 (PDF ) Securing Update Propagation with Homomorphic Hashing Kevin Lewi, Wonho Kim, Ilya Maykov, Stephen Weis
2019/226 (PDF ) Flyclient: Super-Light Clients for Cryptocurrencies Benedikt Bünz, Lucianna Kiffer, Loi Luu, Mahdi Zamani
2019/225 (PDF ) Leakage Resilience of the Duplex Construction Christoph Dobraunig, Bart Mennink
2019/224 (PDF ) Compact Adaptively Secure ABE for NC1 from k-Lin Lucas Kowalczyk, Hoeteck Wee
2019/223 (PDF ) Optimized Homomorphic Encryption Solution for Secure Genome-Wide Association Studies Marcelo Blatt, Alexander Gusev, Yuriy Polyakov, Kurt Rohloff, Vinod Vaikuntanathan
2019/222 (PDF ) (R)CCA Secure Updatable Encryption with Integrity Protection Michael Klooß, Anja Lehmann, Andy Rupp
2019/221 (PDF ) Group Signatures without NIZK: From Lattices in the Standard Model Shuichi Katsumata, Shota Yamada
2019/220 (PDF ) Communication Lower Bounds for Statistically Secure MPC, with or without Preprocessing Ivan Damgård, Kasper Green Larsen, Jesper Buus Nielsen
2019/219 (PDF ) Nitro Protocol Tom Close
2019/218 (PDF ) Computational Limitations in Robust Classification and Win-Win Results Akshay Degwekar, Vinod Vaikuntanathan
2019/217 (PDF ) A family of boolean functions with good cryptographic properties Guillermo Sosa Gómez, Octavio Paez Osuna
2019/216 (PDF ) Round Optimal Secure Multiparty Computation from Minimal Assumptions Arka Rai Choudhuri, Michele Ciampi, Vipul Goyal, Abhishek Jain, Rafail Ostrovsky
2019/215 (PDF ) Approx-SVP in Ideal Lattices with Pre-processing Alice Pellet-Mary, Guillaume Hanrot, Damien Stehlé
2019/214 (PDF ) Four-Round Secure Multiparty Computation from General Assumptions Michele Ciampi, Rafail Ostrovsky
2019/213 (PDF ) On ELFs, Deterministic Encryption, and Correlated-Input Security Mark Zhandry
2019/212 (PDF ) A New Variant of the Winternitz One Time Signature Scheme Based on Graded Encoding Schemes Hossein Oraei, Massoud Hadian Dehkordi
2019/211 (PDF ) MonZa: Fast Maliciously Secure Two Party Computation on Z_{2^k} Dario Catalano, Mario Di Raimondo, Dario Fiore, Irene Giacomelli
2019/210 (PDF ) CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks Christof Beierle, Gregor Leander, Amir Moradi, Shahram Rasoolzadeh
2019/209 (PDF ) SoK: Peigen -- a Platform for Evaluation, Implementation, and Generation of S-boxes Zhenzhen Bao, Jian Guo, San Ling, Yu Sasaki
2019/208 (PDF ) Related-Tweak Statistical Saturation Cryptanalysis and Its Application on QARMA Muzhou Li, Kai Hu, Meiqin Wang
2019/207 (PDF ) MArBled Circuits: Mixing Arithmetic and Boolean Circuits with Active Security Dragos Rotaru, Tim Wood
2019/206 (PDF ) Fault Attack Countermeasures for Error Samplers in Lattice-Based Cryptography James Howe, Ayesha Khalid, Marco Martinoli, Francesco Regazzoni, Elisabeth Oswald
2019/205 (PDF ) A note on isogeny-based hybrid verifiable delay functions Barak Shani
2019/204 (PDF ) The Security of All Private-key Bits in Isogeny-based Schemes Barak Shani
2019/203 (PDF ) Versatile ABS: Usage Limited, Revocable, Threshold Traceable, Authority Hiding, Decentralized Attribute Based Signatures Osman Bicer, Alptekin Kupcu
2019/202 (PDF ) The Distinction Between Fixed and Random Generators in Group-Based Assumptions James Bartusek, Fermi Ma, Mark Zhandry
2019/201 (PDF ) DL-Extractable UC-Commitment Schemes Behzad Abdolmaleki, Karim Baghery, Helger Lipmaa, Janno Siim, Michał Zając
2019/200 (PDF ) Degree 2 is Complete for the Round-Complexity of Malicious MPC Benny Applebaum, Zvika Brakerski, Rotem Tsabary
2019/199 (PDF ) Password-Authenticated Public-Key Encryption Tatiana Bradley, Jan Camenisch, Stanislaw Jarecki, Anja Lehmann, Gregory Neven, Jiayu Xu
2019/198 (PDF ) Seedless Fruit is the Sweetest: Random Number Generation, Revisited Sandro Coretti, Yevgeniy Dodis, Harish Karthikeyan, Stefano Tessaro
2019/197 (PDF ) Non-interactive Cryptographic Timestamping based on Verifiable Delay Functions Esteban Landerreche, Marc Stevens, Christian Schaffner
2019/196 (PDF ) Ring Signatures: Logarithmic-Size, No Setup --- from Standard Assumptions Michael Backes, Nico Döttling, Lucjan Hanzlik, Kamil Kluczniak, Jonas Schneider
2019/195 (PDF ) Algorithms for CRT-variant of Approximate Greatest Common Divisor Problem Jung Hee Cheon, Wonhee Cho, Minki Hhan, Minsik Kang, Jiseung Kim, Changmin Lee
2019/194 (PDF ) Classical zero-knowledge arguments for quantum computations Thomas Vidick, Tina Zhang
2019/193 (PDF ) Towards Low-Energy Leakage-Resistant Authenticated Encryption from the Duplex Sponge Construction Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert
2019/192 (PDF ) An Omission-Tolerant Cryptographic Checksum Francisco Corella, Karen Lewison
2019/191 (PDF ) Zether: Towards Privacy in a Smart Contract World Benedikt Bünz, Shashank Agrawal, Mahdi Zamani, Dan Boneh
2019/190 (PDF ) Security of the Fiat-Shamir Transformation in the Quantum Random-Oracle Model Jelle Don, Serge Fehr, Christian Majenz, Christian Schaffner
2019/189 (PDF ) An Intelligent Multiple Sieve Method Based on Genetic Algorithm and Correlation Power Analysis Yaoling Ding, An Wang, Siu Ming YIU
2019/188 (PDF ) Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, Yuval Ishai
2019/187 (PDF ) Fully homomorphic encryption modulo Fermat numbers Antoine Joux
2019/186 (PDF ) Re-thinking untraceability in the CryptoNote-style blockchain Jiangshan Yu, Man Ho Allen Au, Paulo Esteves-Verissimo
2019/185 (PDF ) Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion Ralph Ankele, Christoph Dobraunig, Jian Guo, Eran Lambooij, Gregor Leander, Yosuke Todo
2019/184 (PDF ) Face-off between the CAESAR Lightweight Finalists: ACORN vs. Ascon William Diehl, Farnoud Farahmand, Abubakr Abdulgadir, Jens-Peter Kaps, Kris Gaj
2019/183 (PDF ) Algebraic aspects of solving Ring-LWE, including ring-based improvements in the Blum-Kalai-Wasserman algorithm Katherine E. Stange
2019/182 (PDF ) Security is an Architectural Design Constraint Prasanna Ravi, Sourav Sen Gupta, Anupam Chattopadhyay, Mustafa Khairallah, Zakaria Najm, Shivam Bhasin
2019/181 (PDF ) Lower Bounds for Leakage-Resilient Secret Sharing Jesper Buus Nielsen, Mark Simkin
2019/180 (PDF ) Disco: Modern Session Encryption David Wong
2019/179 (PDF ) Synchronous, with a Chance of Partition Tolerance Yue Guo, Rafael Pass, Elaine Shi
2019/178 (PDF ) LucidiTEE: A TEE-Blockchain System for Policy-Compliant Multiparty Computation with Fairness Rohit Sinha, Sivanarayana Gaddam, Ranjit Kumaresan
2019/177 (PDF ) Genus Two Isogeny Cryptography E. V. Flynn, Yan Bo Ti
2019/176 (PDF ) Homomorphic Encryption for Finite Automata Nicholas Genise, Craig Gentry, Shai Halevi, Baiyu Li, Daniele Micciancio
2019/175 (PDF ) The Communication Complexity of Threshold Private Set Intersection Satrajit Ghosh, Mark Simkin
2019/174 (PDF ) Towards an Exponential Lower Bound for Secret Sharing Kasper Green Larsen, Mark Simkin
2019/173 (PDF ) Shorter Quadratic QA-NIZK Proofs Vanesa Daza, Alonso González, Zaira Pindado, Carla Ràfols, Javier Silva
2019/172 (PDF ) Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS Danping Shi, Siwei Sun, Yu Sasaki, Chaoyun Li, Lei Hu
2019/171 (PDF ) XONN: XNOR-based Oblivious Deep Neural Network Inference M. Sadegh Riazi, Mohammad Samragh, Hao Chen, Kim Laine, Kristin Lauter, Farinaz Koushanfar
2019/170 (PDF ) Key-dependent cube attack on reduced Frit permutation in Duplex-AE modes Lingyue Qin, Xiaoyang Dong, Keting Jia, Rui Zong
2019/169 (PDF ) Updatable Anonymous Credentials and Applications to Incentive Systems Johannes Blömer, Jan Bobolz, Denis Diemert, Fabian Eidens
2019/168 (PDF ) Profiling Side-channel Analysis in the Efficient Attacker Framework Stjepan Picek, Annelie Heuser, Guilherme Perin, Sylvain Guilley
2019/167 (PDF ) Analysis of Secure Caches using a Three-Step Model for Timing-Based Attacks Shuwen Deng, Wenjie Xiong, Jakub Szefer
2019/166 (PDF ) Verifiable Delay Functions from Supersingular Isogenies and Pairings Luca De Feo, Simon Masson, Christophe Petit, Antonio Sanso
2019/165 (PDF ) libInterMAC: Beyond Confidentiality and Integrity in Practice Martin R. Albrecht, Torben Brandt Hansen, Kenneth G. Paterson
2019/164 (PDF ) Use your Brain! Arithmetic 3PC For Any Modulus with Active Security Hendrik Eerikson, Marcel Keller, Claudio Orlandi, Pille Pullonen, Joonas Puura, Mark Simkin
2019/163 (PDF ) Fast Side-Channel Security Evaluation of ECC Implementations: Shortcut Formulas for Horizontal Side-channel Attacks against ECSM with the Montgomery ladder Melissa Azouaoui, Romain Poussier, François-Xavier Standaert
2019/162 (PDF ) A New Blockchain Proposal Supporting Multi-Stage Proof-of-Work Palash Sarkar
2019/161 (PDF ) Understanding Optimizations and Measuring Performances of PBKDF2 Andrea Francesco Iuorio, Andrea Visconti
2019/160 (PDF ) FPGA-based High-Performance Parallel Architecture for Homomorphic Computing on Encrypted Data Sujoy Sinha Roy, Furkan Turan, Kimmo Jarvinen, Frederik Vercauteren, Ingrid Verbauwhede
2019/159 (PDF ) MPC with Synchronous Security and Asynchronous Responsiveness Chen-Da Liu-Zhang, Julian Loss, Ueli Maurer, Tal Moran, Daniel Tschudi
2019/158 (PDF ) Noninteractive Zero Knowledge for NP from (Plain) Learning With Errors Chris Peikert, Sina Shiehian
2019/157 (PDF ) Schnorr-based implicit certification: improving the security and efficiency of V2X communications Paulo S. L. M. Barreto, Marcos A. Simplicio Jr., Jefferson E. Ricardini, Harsh Kupwade Patil
2019/156 (PDF ) Efficient Constructions for Almost-everywhere Secure Computation Siddhartha Jayanti, Srinivasan Raghuraman, Nikhil Vyas
2019/155 (PDF ) Constant-time BCH Error-Correcting Code Matthew Walters, Sujoy Sinha Roy
2019/154 (PDF ) FastKitten: Practical Smart Contracts on Bitcoin Poulami Das, Lisa Eckey, Tommaso Frassetto, David Gens, Kristina Hostáková, Patrick Jauernig, Sebastian Faust, Ahmad-Reza Sadeghi
2019/153 (PDF ) Overdrive2k: Efficient Secure MPC over $Z_{2^k}$ from Somewhat Homomorphic Encryption Emmanuela Orsini, Nigel P. Smart, Frederik Vercauteren
2019/152 (PDF ) Privacy-preserving Approximate GWAS computation based on Homomorphic Encryption Duhyeong Kim, Yongha Son, Dongwoo Kim, Andrey Kim, Seungwan Hong, Jung Hee Cheon
2019/151 (PDF ) Solving binary MQ with Grover's algorithm Peter Schwabe, Bas Westerbaan
2019/150 (PDF ) QcBits: Constant-Time Small-Key Code-Based Cryptography Tung Chou
2019/149 (PDF ) Improved Lattice-based CCA2-Secure PKE in the Standard Model Jiang Zhang, Yu Yu, Shuqin Fan, Zhenfeng Zhang
2019/148 (PDF ) On the efficiency of pairing-based proofs under the d-PKE Ariel Gabizon
2019/147 (PDF ) Practical Collision Attacks against Round-Reduced SHA-3 Jian Guo, Guohong Liao, Guozhen Liu, Meicheng Liu, Kexin Qiao, Ling Song
2019/146 (PDF ) Boomerang Connectivity Table Revisited Ling Song, Xianrui Qin, Lei Hu
2019/145 (PDF ) Achieving GWAS with Homomorphic Encryption Jun Jie Sim, Fook Mun Chan, Shibin Chen, Benjamin Hong Meng Tan, Khin Mi Mi Aung
2019/144 (PDF ) Modeling Power Efficiency of S-boxes Using Machine Learning Rajat Sadhukhan, Nilanjan Datta, Debdeep Mukhopadhyay
2019/143 (PDF ) Deep Neural Network Attribution Methods for Leakage Analysis and Symmetric Key Recovery Benjamin Hettwer, Stefan Gehrer, Tim Güneysu
2019/142 (PDF ) LegoSNARK: Modular Design and Composition of Succinct Zero-Knowledge Proofs Matteo Campanelli, Dario Fiore, Anaïs Querol
2019/141 (PDF ) A General Proof Framework for Recent AES Distinguishers Christina Boura, Anne Canteaut, Daniel Coggia
2019/140 (PDF ) CodedPrivateML: A Fast and Privacy-Preserving Framework for Distributed Machine Learning Jinhyun So, Basak Guler, A. Salman Avestimehr, Payman Mohassel
2019/139 (PDF ) Vulnerability and Remedy of Stripped Function Logic Locking Hai Zhou, Yuanqi Shen, Amin Rezaei
2019/138 (PDF ) Unifying Leakage Models on a Rényi Day Thomas Prest, Dahmun Goudarzi, Ange Martinelli, Alain Passelègue
2019/137 (PDF ) TEDT, a Leakage-Resilient AEAD mode for High (Physical) Security Applications Francesco Berti, Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert
2019/136 (PDF ) Divisible E-Cash from Constrained Pseudo-Random Functions Florian Bourse, David Pointcheval, Olivier Sanders
2019/135 (PDF ) It wasn't me! Repudiability and Unclaimability of Ring Signatures Sunoo Park, Adam Sealfon
2019/134 (PDF ) Tighter security proofs for generic key encapsulation mechanism in the quantum random oracle model Haodong Jiang, Zhenfeng Zhang, Zhi Ma
2019/133 (PDF ) On semigroups of multiplicative Cremona transformations and new solutions of Post Quantum Cryptography. Vasyl Ustimenko
2019/132 (PDF ) Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations Olivier Bronchain, Julien M. Hendrickx, Clément Massart, Alex Olshevsky, François-Xavier Standaert
2019/131 (PDF ) Secure Evaluation of Quantized Neural Networks Anders Dalskov, Daniel Escudero, Marcel Keller
2019/130 (PDF ) Are Certificate Thumbprints Unique? Greg Zaverucha, Dan Shumow
2019/129 (PDF ) Homomorphic Secret Sharing from Lattices Without FHE Elette Boyle, Lisa Kohl, Peter Scholl
2019/128 (PDF ) Tightly Secure Inner Product Functional Encryption: Multi-Input and Function-Hiding Constructions Junichi Tomida
2019/127 (PDF ) Beyond Birthday Bound Secure MAC in Faulty Nonce Model Avijit Dutta, Mridul Nandi, Suprita Talnikar
2019/126 (PDF ) New Automatic search method for Truncated-differential characteristics: Application to Midori, SKINNY and CRAFT AmirHossein E. Moghaddam, Zahra Ahmadian
2019/124 (PDF ) Anomalous Look at Provable Security Douglas Wikström
2019/123 (PDF ) Security of Multilinear Galois Mode (MGM) Liliya Akhmetzyanova, Evgeny Alekseev, Grigory Karpunin, Vladislav Nozdrunov
2019/122 (PDF ) Lightweight Post-Quantum-Secure Digital Signature Approach for IoT Motes Santosh Ghosh, Rafael Misoczki, Manoj R. Sastry
2019/121 (PDF ) Anonymous Attestation for IoT Santosh Ghosh, Andrew H. Reinders, Rafael Misoczki, Manoj R. Sastry
2019/120 (PDF ) Cryptanalysis of a New Code-based Signature Scheme with Shorter Public Key in PKC 2019 Keita Xagawa
2019/119 (PDF ) On the security of the BCTV Pinocchio zk-SNARK variant Ariel Gabizon
2019/117 (PDF ) Non-Interactive Keyed-Verification Anonymous Credentials Geoffroy Couteau, Michael Reichle
2019/116 (PDF ) Multi-Key Homomophic Encryption from TFHE Hao Chen, Ilaria Chillotti, Yongsoo Song
2019/115 (PDF ) Distributional Collision Resistance Beyond One-Way Functions Nir Bitansky, Iftach Haitner, Ilan Komargodski, Eylon Yogev
2019/114 (PDF ) Fast Multiparty Threshold ECDSA with Fast Trustless Setup Rosario Gennaro, Steven Goldfeder
2019/113 (PDF ) Privacy and Reader-first Authentication in Vaudenay's RFID Model with Temporary State Disclosure Ferucio Laurentiu Tiplea, Cristian Hristea
2019/112 (PDF ) Variable Elimination - a Tool for Algebraic Cryptanalysis Bjørn Greve, Øyvind Ytrehus, Håvard Raddum
2019/111 (PDF ) On the Complexity of non-recursive $n$-term Karatsuba Multiplier for Trinomials Yin Li, Shantanu Sharma, Yu Zhang, Xingpo Ma, Chuanda Qi
2019/110 (PDF ) Optimized Method for Computing Odd-Degree Isogenies on Edwards Curves Suhri Kim, Kisoon Yoon, Young-Ho Park, Seokhie Hong
2019/109 (PDF ) Design and Implementation of a Fast and Scalable NTT-Based Polynomial Multiplier Architecture Ahmet Can Mert, Erdinc Ozturk, Erkay Savas
2019/108 (PDF ) Minicrypt Primitives with Algebraic Structure and Applications Navid Alamati, Hart Montgomery, Sikhar Patranabis, Arnab Roy
2019/107 (PDF ) Constructing Low-latency Involutory MDS Matrices with Lightweight Circuit Shun Li, Siwei Sun, Chaoyun Li, Zihao Wei, Lei Hu
2019/106 (PDF ) Identity-Based Higncryption Hongbing Wang, Yunlei Zhao
2019/105 (PDF ) Non-Malleable Secret Sharing in the Computational Setting: Adaptive Tampering, Noisy-Leakage Resilience, and Improved Rate Antonio Faonio, Daniele Venturi
2019/104 (PDF ) BADGER - Blockchain Auditable Distributed (RSA) key GEneRation Naomi Farley, Robert Fitzpatrick, Duncan Jones
2019/103 (PDF ) Quantum cryptanalysis in the RAM model: Claw-finding attacks on SIKE Samuel Jaques, John M. Schanck
2019/102 (PDF ) Trustee: Full Privacy Preserving Vickrey Auction on top of Ethereum Hisham S. Galal, Amr M. Youssef
2019/101 (PDF ) Privacy-preserving semi-parallel logistic regression training with Fully Homomorphic Encryption Sergiu Carpov, Nicolas Gama, Mariya Georgieva, Juan Ramon Troncoso-Pastoriza
2019/100 (PDF ) Power Analysis on NTRU Prime Wei-Lun Huang, Jiun-Peng Chen, Bo-Yin Yang
2019/099 (PDF ) Sonic: Zero-Knowledge SNARKs from Linear-Size Universal and Updateable Structured Reference Strings Mary Maller, Sean Bowe, Markulf Kohlweiss, Sarah Meiklejohn
2019/098 (PDF ) A Post-Quantum UC-Commitment Scheme in the Global Random Oracle Model from Code-Based Assumptions Pedro Branco
2019/097 (PDF ) Linearly equivalent S-boxes and the Division Property Patrick Derbez, Pierre-Alain Fouque, Baptiste Lambin
2019/096 (PDF ) On Recovering Affine Encodings in White-Box Implementations Patrick Derbez, Pierre-Alain Fouque, Baptiste Lambin, Brice Minaud
2019/095 (PDF ) Variants of the AES Key Schedule for Better Truncated Differential Bounds Patrick Derbez, Pierre-Alain Fouque, Jérémy Jean, Baptiste Lambin
2019/094 (PDF ) CHES 2018 Side Channel Contest CTF - Solution of the AES Challenges Aron Gohr, Sven Jacob, Werner Schindler
2019/092 (PDF ) Partitions in the S-Box of Streebog and Kuznyechik Léo Perrin
2019/091 (PDF ) Efficient Zero-Knowledge for NP from Secure Two-Party Computation Li Hongda, Pan Dongxue, Ni Peifang
2019/090 (PDF ) Round5: Compact and Fast Post-Quantum Public-Key Encryption Hayo Baan, Sauvik Bhattacharya, Scott Fluhrer, Oscar Garcia-Morchon, Thijs Laarhoven, Ronald Rietman, Markku-Juhani O. Saarinen, Ludo Tolhuizen, Zhenfei Zhang
2019/089 (PDF ) The General Sieve Kernel and New Records in Lattice Reduction Martin R. Albrecht, Léo Ducas, Gottfried Herold, Elena Kirshanova, Eamonn W. Postlethwaite, Marc Stevens
2019/088 (PDF ) Continuous Key Agreement with Reduced Bandwidth Nir Drucker, Shay Gueron
2019/087 (PDF ) The Secure Link Prediction Problem Laltu Sardar, Sushmita Ruj
2019/086 (PDF ) Reinterpreting and Improving the Cryptanalysis of the Flash Player PRNG George Teseleanu
2019/085 (PDF ) The Lattice-Based Digital Signature Scheme qTESLA Erdem Alkim, Paulo S. L. M. Barreto, Nina Bindel, Juliane Kramer, Patrick Longa, Jefferson E. Ricardini
2019/084 (PDF ) An Information Obfuscation Calculus for Encrypted Computing Peter T. Breuer
2019/083 (PDF ) Cryptanalysis of an NTRU-based Proxy Encryption Scheme from ASIACCS'15 Zhen Liu, Yanbin Pan, Zhenfei Zhang
2019/082 (PDF ) Arithmetic Garbling from Bilinear Maps Nils Fleischhacker, Giulio Malavolta, Dominique Schröder
2019/081 (PDF ) Practical Group-Signatures with Privacy-Friendly Openings Stephan Krenn, Kai Samelin, Christoph Striecks
2019/080 (PDF ) Turbospeedz: Double Your Online SPDZ! Improving SPDZ using Function Dependent Preprocessing Aner Ben Efraim, Michael Nielsen, Eran Omri
2019/079 (PDF ) New Results about the Boomerang Uniformity of Permutation Polynomials Kangquan Li, Longjiang Qu, Bing Sun, Chao Li
2019/078 (PDF ) Testing the Randomness of Cryptographic Function Mappings Alan Kaminsky
2019/077 (PDF ) Pairing Implementation Revisited Michael Scott
2019/076 (PDF ) Analysis and Improvement of Differential Computation Attacks against Internally-Encoded White-Box Implementations Matthieu Rivain, Junwei Wang
2019/075 (PDF ) Assessment of the Key-Reuse Resilience of NewHope Aurélie Bauer, Henri Gilbert, Guénaël Renault, Mélissa Rossi
2019/074 (PDF ) Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers Chun Guo, Jonathan Katz, Xiao Wang, Yu Yu
2019/073 (PDF ) Destructive Privacy and Mutual Authentication in Vaudenay's RFID Model Cristian Hristea, Ferucio Laurentiu Tiplea
2019/072 (PDF ) ZeroCT: Improving ZeroCoin with Confidential Transactions and more Alex Vazquez
2019/071 (PDF ) Repeatable Oblivious Shuffling of Large Outsourced Data Blocks Zhilin Zhang, Ke Wang, Weipeng Lin, Ada Wai-Chee Fu, Raymond Chi-Wing Wong
2019/070 (PDF ) Uncle Traps: Harvesting Rewards in a Queue-based Ethereum Mining Pool Sam M. Werner, Paul J. Pritz, Alexei Zamyatin, William J. Knottenbelt
2019/069 (PDF ) Quantum Indistinguishability of Random Sponges Jan Czajkowski, Andreas Hülsing, Christian Schaffner
2019/068 (PDF ) Sampling the Integers with Low Relative Error Michael Walter
2019/067 (PDF ) Managing Your Kleptographic Subscription Plan George Teseleanu
2019/066 (PDF ) Publicly Verifiable Proofs from Blockchains Alessandra Scafuro, Luisa Siniscalchi, Ivan Visconti
2019/065 (PDF ) Multi-Protocol UC and its Use for Building Modular and Efficient Protocols Jan Camenisch, Manu Drijvers, Björn Tackmann
2019/064 (PDF ) A Revocable Group Signature Scheme with Scalability from Simple Assumptions and Its Application to Identity Management Keita Emura, Takuya Hayashi
2019/063 (PDF ) Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains without Trusted Setup Michael Backes, Lucjan Hanzlik, Amir Herzberg, Aniket Kate, Ivan Pryvalov
2019/062 (PDF ) Additively Homomorphic IBE from Higher Residuosity Michael Clear, Ciaran McGoldrick
2019/061 (PDF ) SigAttack: New High-level SAT-based Attack on Logic Encryptions Yuanqi Shen, You Li, Shuyu Kong, Amin Rezaei, Hai Zhou
2019/060 (PDF ) CycSAT-Unresolvable Cyclic Logic Encryption Using Unreachable States Amin Rezaei, You Li, Yuanqi Shen, Shuyu Kong, Hai Zhou
2019/059 (PDF ) BeSAT: Behavioral SAT-based Attack on Cyclic Logic Encryption Yuanqi Shen, You Li, Amin Rezaei, Shuyu Kong, David Dlott, Hai Zhou
2019/058 (PDF ) Tightly secure hierarchical identity-based encryption Roman Langrehr, Jiaxin Pan
2019/057 (PDF ) Short Discrete Log Proofs for FHE and Ring-LWE Ciphertexts Rafael del Pino, Vadim Lyubashevsky, Gregor Seiler
2019/056 (PDF ) Obfuscating simple functionalities from knowledge assumptions Ward Beullens, Hoeteck Wee
2019/055 (PDF ) Rate-Optimizing Compilers for Continuously Non-Malleable Codes Sandro Coretti, Antonio Faonio, Daniele Venturi
2019/054 (PDF ) Deep Learning to Evaluate Secure RSA Implementations Mathieu Carbone, Vincent Conin, Marie-Angela Cornelie, Francois Dassance, Guillaume Dufresne, Cecile Dumas, Emmanuel Prouff, Alexandre Venelli
2019/052 (PDF ) Key Encapsulation Mechanism with Explicit Rejection in the Quantum Random Oracle Model Haodong Jiang, Zhenfeng Zhang, Zhi Ma
2019/051 (PDF ) Deterministic Identity-Based Encryption from Lattice-Based Programmable Hash Functions with High Min-Entropy Daode Zhang, Jie Li, Bao Li, Xianhui Lu, Haiyang Xue, Dingding Jia, Yamin Liu
2019/050 (PDF ) Improved Security Evaluation Techniques for Imperfect Randomness from Arbitrary Distributions Takahiro Matsuda, Kenta Takahashi, Takao Murakami, Goichiro Hanaoka
2019/049 (PDF ) The Relationship between the Construction and Solution of the MILP Models and Applications Lingchen Li, Wenling Wu, Yafei Zheng, Lei Zhang
2019/048 (PDF ) Sub-logarithmic Distributed Oblivious RAM with Small Block Size Eyal Kushilevitz, Tamer Mour
2019/047 (PDF ) NIST Post-Quantum Cryptography- A Hardware Evaluation Study Kanad Basu, Deepraj Soni, Mohammed Nabeel, Ramesh Karri
2019/046 (PDF ) Block-Anti-Circulant Unbalanced Oil and Vinegar Alan Szepieniec, Bart Preneel
2019/045 (PDF ) Leakage-resilient Identity-based Encryption in Bounded Retrieval Model with Nearly Optimal Leakage-Ratio Ryo Nishimaki, Takashi Yamakawa
2019/044 (PDF ) Toha Key Hardened Function Ahmad Almorabea
2019/043 (PDF ) A Generic Attack on Lattice-based Schemes using Decryption Errors with Application to ss-ntru-pke Qian Guo, Thomas Johansson, Alexander Nilsson
2019/042 (PDF ) Hunting and Gathering - Verifiable Random Functions from Standard Assumptions with Short Proofs Lisa Kohl
2019/041 (PDF ) Message Authentication (MAC) Algorithm For The VMPC-R (RC4-like) Stream Cipher Bartosz Zoltak
2019/040 (PDF ) NTTRU: Truly Fast NTRU Using NTT Vadim Lyubashevsky, Gregor Seiler
2019/039 (PDF ) Fully Invisible Protean Signatures Schemes Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
2019/038 (PDF ) Identity-based Broadcast Encryption with Efficient Revocation Aijun Ge, Puwen Wei
2019/037 (PDF ) Improving Attacks on Round-Reduced Speck32/64 using Deep Learning Aron Gohr
2019/036 (PDF ) Non-Zero Inner Product Encryption Schemes from Various Assumptions: LWE, DDH and DCR Shuichi Katsumata, Shota Yamada
2019/035 (PDF ) Using TopGear in Overdrive: A more efficient ZKPoK for SPDZ Carsten Baum, Daniele Cozzo, Nigel P. Smart
2019/034 (PDF ) A Formal Treatment of Hardware Wallets Myrto Arapinis, Andriana Gkaniatsou, Dimitris Karakostas, Aggelos Kiayias
2019/033 (PDF ) FE for Inner Products and Its Application to Decentralized ABE Zhedong Wang, Xiong Fan, Feng-Hao Liu
2019/032 (PDF ) Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation Steven Galbraith, Jake Massimo, Kenneth G. Paterson
2019/031 (PDF ) Collusion Resistant Broadcast and Trace from Positional Witness Encryption Rishab Goyal, Satyanarayana Vusirikala, Brent Waters
2019/028 (PDF ) nQUIC: Noise-Based QUIC Packet Protection Mathias Hall-Andersen, David Wong, Nick Sullivan, Alishah Chator
2019/027 (PDF ) Group Signatures with Selective Linkability Lydia Garms, Anja Lehmann
2019/026 (PDF ) Non-malleable encryption with proofs of plaintext knowledge and applications to voting Ben Smyth, Yoshikazu Hanatani
2019/025 (PDF ) STP Models of Optimal Differential and Linear Trail for S-box Based Ciphers Yu Liu, Huicong Liang, Muzhou Li, Luning Huang, Kai Hu, Chenhe Yang, Meiqin Wang
2019/024 (PDF ) A publicly verifiable quantum signature scheme based on asymmetric quantum cryptography Yalin Chen, Jue-Sam Chou, Fang-Qi Zhou, Shu-Mei Hsu
2019/023 (PDF ) Biased Nonce Sense: Lattice Attacks against Weak ECDSA Signatures in Cryptocurrencies Joachim Breitner, Nadia Heninger
2019/022 (PDF ) The BIG Cipher: Design, Security Analysis, and Hardware-Software Optimization Techniques Anthony Demeri, Thomas Conroy, Alex Nolan, William Diehl
2019/021 (PDF ) CryptoNote+ Ilya Aldanov
2019/020 (PDF ) Decentralizing Inner-Product Functional Encryption Michel Abdalla, Fabrice Benhamouda, Markulf Kolhweiss, Hendrik Waldner
2019/019 (PDF ) Improving the MILP-based Security Evaluation Algorithm against Differential/Linear Cryptanalysis Using A Divide-and-Conquer Approach Chunning Zhou, Wentao Zhang, Tianyou Ding, Zejun Xiang
2019/018 (PDF ) Generic Constructions of Robustly Reusable Fuzzy Extractor Yunhua Wen, Shengli Liu, Dawu Gu
2019/017 (PDF ) CHURP: Dynamic-Committee Proactive Secret Sharing Sai Krishna Deepak Maram, Fan Zhang, Lun Wang, Andrew Low, Yupeng Zhang, Ari Juels, Dawn Song
2019/016 (PDF ) Fast Message Franking: From Invisible Salamanders to Encryptment Yevgeniy Dodis, Paul Grubbs, Thomas Ristenpart, Joanne Woodage
2019/015 (PDF ) More Efficient Algorithms for the NTRU Key Generation using the Field Norm Thomas Pornin, Thomas Prest
2019/014 (PDF ) BlAnC: Blockchain-based Anonymous and Decentralized Credit Networks Gaurav Panwar, Satyajayant Misra, Roopa Vishwanathan
2019/013 (PDF ) The Science of Guessing in Collision Optimized Divide-and-Conquer Attacks Changhai Ou, Siew-Kei Lam, Guiyuan Jiang
2019/012 (PDF ) A Proof of the Beierle-Kranz-Leander’s Conjecture related to Lightweight Multiplication in $F_{2^n}$ Sihem Mesnager, Kwang Ho Kim, Dujin Jo, Junyop Choe, Munhyon Han, Dok Nam Lee
2019/011 (PDF ) Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks Paul Grubbs, Marie-Sarah Lacharité, Brice Minaud, Kenneth G. Paterson
2019/010 (PDF ) Survey for Performance & Security Problems of Passive Side-channel Attacks Countermeasures in ECC Rodrigo Abarzúa, Claudio Valencia, Julio López
2019/009 (PDF ) On the Asymptotics of Solving the LWE Problem Using Coded-BKW with Sieving Qian Guo, Thomas Johansson, Erik Mårtensson, Paul Stankovski Wagner
2019/008 (PDF ) One Fault is All it Needs: Breaking Higher-Order Masking with Persistent Fault Analysis Jingyu Pan, Shivam Bhasin, Fan Zhang, Kui Ren
2019/007 (PDF ) Tight Security Bounds for Generic Stream Cipher Constructions Matthias Hamann, Matthias Krause
2019/006 (PDF ) Minimizing Trust in Hardware Wallets with Two Factor Signatures Antonio Marcedone, Rafael Pass, abhi shelat
2019/005 (PDF ) ScanSAT: Unlocking Obfuscated Scan Chains Lilas Alrahis, Muhammad Yasin, Hani Saleh, Baker Mohammad, Mahmoud Al-Qutayri, Ozgur Sinanoglu
2019/004 (PDF ) On the Bright Side of Darkness: Side-Channel Based Authentication Protocol Against Relay Attacks Guillaume Dabosville, Houssem Maghrebi, Alexis Lhuillery, Julien Bringer, Thanh-Ha Le
2019/002 (PDF ) Leakage-Resilient Group Signature: Definitions and Constructions Jianye Huang, Qiong Huang
2019/001 (PDF ) Sanctorum: A lightweight security monitor for secure enclaves Ilia Lebedev, Kyle Hogan, Jules Drean, David Kohlbrenner, Dayeol Lee, Krste Asanović, Dawn Song, Srinivas Devadas
2018/1251 (PDF ) Accountable Tracing Signatures from Lattices San Ling, Khoa Nguyen, Huaxiong Wang, Yanhong Xu
2018/1250 (PDF ) Function Private Predicate Encryption for Low Min-Entropy Predicates Sikhar Patranabis, Debdeep Mukhopadhyay, Somindu C. Ramanna
2018/1249 (PDF ) Two round multiparty computation via Multi-key fully homomorphic encryption with faster homomorphic evaluations NingBo Li, TanPing Zhou, XiaoYuan Yang, YiLiang Han, Longfei Liu, WenChao Liu
2018/1248 (PDF ) Fiat-Shamir: From Practice to Theory, Part II (NIZK and Correlation Intractability from Circular-Secure FHE) Ran Canetti, Alex Lombardi, Daniel Wichs
2018/1247 (PDF ) qSCMS: Post-quantum certificate provisioning process for V2X Paulo S. L. M. Barreto, Jefferson E. Ricardini, Marcos A. Simplicio Jr., Harsh Kupwade Patil
2018/1246 (PDF ) Senopra: Reconciling Data Privacy and Utility via Attested Smart Contract Execution Dat Le Tien, Frank Eliassen
2018/1245 (PDF ) Multi-dimensional Packing for HEAAN for Approximate Matrix Arithmetics Jung Hee Cheon, Andrey Kim, Donggeon Yhee
2018/1244 (PDF ) Fully Deniable Interactive Encryption Ran Canetti, Sunoo Park, Oxana Poburinnaya
2018/1242 (PDF ) Structural Nonlinear Invariant Attacks on T-310: Attacking Arbitrary Boolean Functions Nicolas T. Courtois
2018/1241 (PDF ) Universally Composable Accumulators Foteini Baldimtsi, Ran Canetti, Sophia Yakoubov
2018/1239 (PDF ) Proof-of-Stake Sidechains Peter Gaži, Aggelos Kiayias, Dionysis Zindros
2018/1238 (PDF ) Memory-Constrained Implementation of Lattice-based Encryption Scheme on the Standard Java Card Platform Ye Yuan, Kazuhide Fukushima, Junting Xiao, Shinsaku Kiyomoto, Tsuyoshi Takagi
2018/1237 (PDF ) Sum-of-Squares Meets Program Obfuscation, Revisited Boaz Barak, Samuel B. Hopkins, Aayush Jain, Pravesh Kothari, Amit Sahai
2018/1236 (PDF ) Fast Secure Comparison for Medium-Sized Integers and Its Application in Binarized Neural Networks Mark Abspoel, Niek J. Bouman, Berry Schoenmakers, Niels de Vreede
2018/1235 (PDF ) Setup-Free Secure Search on Encrypted Data: Faster and Post-Processing Free Adi Akavia, Craig Gentry, Shai Halevi, Max Leibovich
2018/1234 (PDF ) FACCT: FAst, Compact, and Constant-Time Discrete Gaussian Sampler over Integers Raymond K. Zhao, Ron Steinfeld, Amin Sakzad
2018/1233 (PDF ) Key Assignment Scheme with Authenticated Encryption Suyash Kandele, Souradyuti Paul
2018/1232 (PDF ) Certificate Transparency Using Blockchain D S V Madala, Mahabir Prasad Jhanwar, Anupam Chattopadhyay
2018/1231 (PDF ) Post-quantum verifiable random functions from ring signatures Endre Abraham
2018/1230 (PDF ) Pooled Mining Makes Selfish Mining Tricky Suhyeon Lee, Seungjoo Kim
2018/1229 (PDF ) On Some Computational Problems in Local Fields Yingpu Deng, Lixia Luo, Guanju Xiao
2018/1227 (PDF ) Efficient Information Theoretic Multi-Party Computation from Oblivious Linear Evaluation Louis Cianciullo, Hossein Ghodosi
2018/1226 (PDF ) Boolean Exponent Splitting Michael Tunstall, Louiza Papachristodoulou, Kostas Papagiannopoulos
2018/1225 (PDF ) XMSS and Embedded Systems - XMSS Hardware Accelerators for RISC-V Wen Wang, Bernhard Jungk, Julian Wälde, Shuwen Deng, Naina Gupta, Jakub Szefer, Ruben Niederhagen
2018/1224 (PDF ) Further Lower Bounds for Structure-Preserving Signatures in Asymmetric Bilinear Groups Essam Ghadafi
2018/1223 (PDF ) Error Amplification in Code-based Cryptography Alexander Nilsson, Thomas Johansson, Paul Stankovski Wagner
2018/1222 (PDF ) Implementing Token-Based Obfuscation under (Ring) LWE Cheng Chen, Nicholas Genise, Daniele Micciancio, Yuriy Polyakov, Kurt Rohloff
2018/1221 (PDF ) Using the Cloud to Determine Key Strengths -- Triennial Update M. Delcourt, T. Kleinjung, A. K. Lenstra, S. Nath, D. Page, N. Smart
2018/1220 (PDF ) Tight Reductions for Diffie-Hellman Variants in the Algebraic Group Model Taiga Mizuide, Atsushi Takayasu, Tsuyoshi Takagi
2018/1219 (PDF ) Cryptanalysis of the Full DES and the Full 3DES Using a New Linear Property Tomer Ashur, Raluca Posteuca
2018/1218 (PDF ) Exploring Crypto Dark Matter: New Simple PRF Candidates and Their Applications Dan Boneh, Yuval Ishai, Alain Passelègue, Amit Sahai, David J. Wu
2018/1217 (PDF ) Changing Points in APN Functions Lilya Budaghyan, Claude Carlet, Tor Helleseth, Nikolay Kaleyski
2018/1216 (PDF ) This is Not an Attack on Wave Thomas Debris-Alazard, Nicolas Sendrier, Jean-Pierre Tillich
2018/1215 (PDF ) New Hybrid Method for Isogeny-based Cryptosystems using Edwards Curves Suhri Kim, Kisoon Yoon, Jihoon Kwon, Young-Ho Park, Seokhie Hong
2018/1214 (PDF ) Instant Privacy-Preserving Biometric Authentication for Hamming Distance Joohee Lee, Dongwoo Kim, Duhyeong Kim, Yongsoo Song, Junbum Shin, Jung Hee Cheon
2018/1213 (PDF ) Deep Learning vs Template Attacks in front of fundamental targets: experimental study Yevhenii ZOTKIN, Francis OLIVIER, Eric BOURBAO
2018/1212 (PDF ) Multi-Target Attacks on the Picnic Signature Scheme and Related Protocols Itai Dinur, Niv Nadler
2018/1211 (PDF ) Countering Block Withholding Attack Effciently Suhyeon Lee, Seungjoo Kim
2018/1210 (PDF ) MProve: A Proof of Reserves Protocol for Monero Exchanges Arijit Dutta, Saravanan Vijayakumaran
2018/1209 (PDF ) Teleportation-based quantum homomorphic encryption scheme with quasi-compactness and perfect security Min Liang
2018/1208 (PDF ) Revisiting Orthogonal Lattice Attacks on Approximate Common Divisor Problems and their Applications Jun Xu, Santanu Sarkar, Lei Hu
2018/1207 (PDF ) On the Decoding Failure Rate of QC-MDPC Bit-Flipping Decoders Nicolas Sendrier, Valentin Vasseur
2018/1206 (PDF ) ARPA Whitepaper Derek Zhang, Alex Su, Felix Xu, Jiang Chen
2018/1205 (PDF ) Cryptanalysis of a code-based one-time signature Jean-Christophe Deneuville, Philippe Gaborit
2018/1204 (PDF ) The Lord of the Shares: Combining Attribute-Based Encryption and Searchable Encryption for Flexible Data Sharing Antonis Michalas
2018/1203 (PDF ) DAGS: Reloaded Revisiting Dyadic Key Encapsulation Gustavo Banegas, Paulo S. L. M. Barreto, Brice Odilon Boidje, Pierre-Louis Cayrel, Gilbert Ndollane Dione, Kris Gaj, Cheikh Thiecoumba Gueye, Richard Haeussler, Jean Belo Klamti, Ousmane N'diaye, Duc Tri Nguyen, Edoardo Persichetti, Jefferson E. Ricardini
2018/1202 (PDF ) AuthCropper: Authenticated Image Cropper for Privacy Preserving Surveillance Systems Jihye Kim, Jiwon Lee, Hankyung Ko, Donghwan Oh, Semin Han, Kwonho Jeong, Hyunok Oh
2018/1201 (PDF ) Subversion in Practice: How to Efficiently Undermine Signatures Joonsang Baek, Willy Susilo, Jongkil Kim, Yang-Wai Chow
2018/1200 (PDF ) On a Rank-Metric Code-Based Cryptosystem with Small Key Size Julian Renner, Sven Puchinger, Antonia Wachter-Zeh
2018/1199 (PDF ) Quantum Equivalence of the DLP and CDHP for Group Actions Steven Galbraith, Lorenz Panny, Benjamin Smith, Frederik Vercauteren
2018/1198 (PDF ) On Lions and Elligators: An efficient constant-time implementation of CSIDH Michael Meyer, Fabio Campos, Steffen Reith
2018/1197 (PDF ) Automated software protection for the masses against side-channel attacks NICOLAS BELLEVILLE, DAMIEN COUROUSSÉ, KARINE HEYDEMANN, HENRI-PIERRE CHARLES
2018/1196 (PDF ) Gradient Visualization for General Characterization in Profiling Attacks Loïc Masure, Cécile Dumas, Emmanuel Prouff
2018/1195 (PDF ) M&M: Masks and Macs against Physical Attacks Lauren De Meyer, Victor Arribas, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen
2018/1194 (PDF ) On Degree-d Zero-Sum Sets of Full Rank Christof Beierle, Alex Biryukov, Aleksei Udovenko
2018/1193 (PDF ) Quantum Chosen-Ciphertext Attacks against Feistel Ciphers Gembu Ito, Akinori Hosoyamada, Ryutaroh Matsumoto, Yu Sasaki, Tetsu Iwata
2018/1192 (PDF ) Durandal: a rank metric based signature scheme Nicolas Aragon, Olivier Blazy, Philippe Gaborit, Adrien Hauteville, Gilles Zémor
2018/1191 (PDF ) Cryptanalysis of 2-round KECCAK-384 Rajendra Kumar, Nikhil Mittal, Shashank Singh
2018/1190 (PDF ) Large Universe Subset Predicate Encryption Based on Static Assumption (without Random Oracle) Sanjit Chatterjee, Sayantan Mukherjee
2018/1189 (PDF ) The Role of the Adversary Model in Applied Security Research Quang Do, Ben Martini, Kim-Kwang Raymond Choo
2018/1188 (PDF ) Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains Dan Boneh, Benedikt Bünz, Ben Fisch
2018/1187 (PDF ) Automatic Search for A Variant of Division Property Using Three Subsets (Full Version) Kai Hu, Meiqin Wang
2018/1186 (PDF ) MILP Method of Searching Integral Distinguishers Based on Division Property Using Three Subsets Senpeng Wang, Bin Hu, Jie Guan, Kai Zhang, Tairong Shi
2018/1185 (PDF ) On Quantum Chosen-Ciphertext Attacks and Learning with Errors Gorjan Alagic, Stacey Jeffery, Maris Ozols, Alexander Poremba
2018/1184 (PDF ) Uncontrolled Randomness in Blockchains: Covert Bulletin Board for Illicit Activity Nasser Alsalami, Bingsheng Zhang
2018/1183 (PDF ) Lossy Trapdoor Permutations with Improved Lossiness Benedikt Auerbach, Eike Kiltz, Bertram Poettering, Stefan Schoenen
2018/1181 (PDF ) Horizontal DEMA Attack as the Criterion to Select the Best Suitable EM Probe Christian Wittke, Ievgen Kabin, Dan Klann, Zoya Dyka, Anton Datsuk, Peter Langendoerfer
2018/1180 (PDF ) Lattice-Based Signature from Key Consensus Leixiao Cheng, Boru Gong, Yunlei Zhao
2018/1179 (PDF ) Elliptic Curves in Generalized Huff's Model Ronal Pranil Chand, Maheswara Rao Valluri
2018/1178 (PDF ) Pseudo-Free Families of Computational Universal Algebras Mikhail Anokhin
2018/1177 (PDF ) Excalibur Key-Generation Protocols For DAG Hierarchic Decryption Louis Goubin, Geraldine Monsalve, Juan Reutter, Francisco Vial Prado
2018/1176 (PDF ) Downgradable Identity-based Encryption and Applications Olivier Blazy, Paul Germouty, Duong Hieu Phan
2018/1175 (PDF ) New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols Ravishankar Borgaonkar, Lucca Hirschi, Shinjo Park, Altaf Shaik
2018/1174 (PDF ) A Comparison of NTRU Variants John M. Schanck
2018/1173 (PDF ) The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations Eyal Ronen, Robert Gillham, Daniel Genkin, Adi Shamir, David Wong, Yuval Yarom
2018/1172 (PDF ) The impact of error dependencies on Ring/Mod-LWE/LWR based schemes Jan-Pieter D'Anvers, Frederik Vercauteren, Ingrid Verbauwhede
2018/1171 (PDF ) PwoP: Intrusion-Tolerant and Privacy-Preserving Sensor Fusion Chenglu Jin, Marten van Dijk, Michael K. Reiter, Haibin Zhang
2018/1170 (PDF ) Toward RSA-OAEP without Random Oracles Nairen Cao, Adam O'Neill, Mohammad Zaheri
2018/1169 (PDF ) Placing Conditional Disclosure of Secrets in the Communication Complexity Universe Benny Applebaum, Prashant Nalini Vasudevan
2018/1168 (PDF ) Result Pattern Hiding Searchable Encryption for Conjunctive Queries Shangqi Lai, Sikhar Patranabis, Amin Sakzad, Joseph K. Liu, Debdeep Mukhopadhyay, Ron Steinfeld, Shi-Feng Sun, Dongxi Liu, Cong Zuo
2018/1167 (PDF ) On the Price of Proactivizing Round-Optimal Perfectly Secret Message Transmission Ravi Kishore, Ashutosh Kumar, Chiranjeevi Vanarasa, Kannan Srinathan
2018/1166 (PDF ) Keeping Time-Release Secrets through Smart Contracts Jianting Ning, Hung Dang, Ruomu Hou, Ee-Chien Chang
2018/1165 (PDF ) Identity-Concealed Authenticated Encryption and Key Exchange Yunlei Zhao
2018/1164 (PDF ) Can you sign a quantum state Gorjan Alagic, Tommaso Gagliardoni, Christian Majenz
2018/1163 (PDF ) More on sliding right Joachim Breitner
2018/1162 (PDF ) On the Concrete Security of Goldreich’s Pseudorandom Generator Geoffroy Couteau, Aurélien Dupin, Pierrick Méaux, Mélissa Rossi, Yann Rotella
2018/1161 (PDF ) Adaptively Secure MPC with Sublinear Communication Complexity Ran Cohen, abhi shelat, Daniel Wichs
2018/1160 (PDF ) Algebraic normal form of a bent function: properties and restrictions Natalia Tokareva
2018/1159 (PDF ) Improved upper bound on root number of linearized polynomials and its application to nonlinearity estimation of Boolean functions Sihem Mesnager, Kwang Ho Kim, Myong Song Jo
2018/1158 (PDF ) Adversarially Robust Property Preserving Hash Functions Elette Boyle, Rio LaVigne, Vinod Vaikuntanathan
2018/1157 (PDF ) Special Soundness Revisited Douglas Wikström
2018/1156 (PDF ) Towards Round-Optimal Secure Multiparty Computations: Multikey FHE without a CRS Eunkyung Kim, Hyang-Sook Lee, Jeongeun Park
2018/1155 (PDF ) Universally Composable Oblivious Transfer Protocol based on the RLWE Assumption Pedro Branco, Jintai Ding, Manuel Goulão, Paulo Mateus
2018/1154 (PDF ) Leakage Resilient Secret Sharing and Applications Akshayaram Srinivasan, Prashant Nalini Vasudevan
2018/1153 (PDF ) Dfinity Consensus, Explored Ittai Abraham, Dahlia Malkhi, Kartik Nayak, Ling Ren
2018/1152 (PDF ) Improvements of Blockchain’s Block Broadcasting:An Incentive Approach Qingzhao Zhang, Yijun Leng, Lei Fan
2018/1151 (PDF ) Analysis Of The Simulatability Of An Oblivious Transfer Bing Zeng
2018/1150 (PDF ) Quantum-secure message authentication via blind-unforgeability Gorjan Alagic, Christian Majenz, Alexander Russell, Fang Song
2018/1149 (PDF ) Compressive Sensing based Leakage Sampling and Reconstruction: A First Study Changhai Ou, Chengju Zhou, Siew-Kei Lam
2018/1148 (PDF ) Towards Practical Security of Pseudonymous Signature on the BSI eIDAS Token Mirosław Kutyłowski, Lucjan Hanzlik, Kamil Kluczniak
2018/1147 (PDF ) Stronger Leakage-Resilient and Non-Malleable Secret-Sharing Schemes for General Access Structures Divesh Aggarwal, Ivan Damgard, Jesper Buus Nielsen, Maciej Obremski, Erick Purwanto, Joao Ribeiro, Mark Simkin
2018/1145 (PDF ) Privacy Computing: Concept, Computing Framework And Future Development Trends Fenghua Li, Hui Li, Ben Niu, Jinjun Chen
2018/1144 (PDF ) Revisiting Non-Malleable Secret Sharing Saikrishna Badrinarayanan, Akshayaram Srinivasan
2018/1143 (PDF ) A new SNOW stream cipher called SNOW-V Patrik Ekdahl, Thomas Johansson, Alexander Maximov, Jing Yang
2018/1142 (PDF ) Factoring Products of Braids via Garside Normal Form Simon-Philipp Merz, Christophe Petit
2018/1141 (PDF ) Fast Authentication from Aggregate Signatures with Improved Security Muslum Ozgur Ozmen, Rouzbeh Behnia, Attila A. Yavuz
2018/1140 (PDF ) Efficient Fully-Leakage Resilient One-More Signature Schemes Antonio Faonio
2018/1139 (PDF ) Breaking the Binding: Attacks on the Merkle Approach to Prove Liabilities and its Applications Kexin Hu, Zhenfeng Zhang, Kaiven Guo
2018/1138 (PDF ) Leakage-Resilient Secret Sharing Ashutosh Kumar, Raghu Meka, Amit Sahai
2018/1137 (PDF ) Genus 2 curves with given split Jacobian Jasper Scholten
2018/1136 (PDF ) A Provably-Secure Unidirectional Proxy Re-Encryption Scheme Without Pairing in the Random Oracle Model S. Sharmila Deva Selvi, Arinjita Paul, C. Pandu Rangan
2018/1135 (PDF ) PoTS - A Secure Proof of TEE-Stake for Permissionless Blockchains Sébastien Andreina, Jens-Matthias Bohli, Ghassan O. Karame, Wenting Li, Giorgia Azzurra Marson
2018/1134 (PDF ) Echoes of the Past: Recovering Blockchain Metrics From Merged Mining Nicholas Stifter, Philipp Schindler, Aljosha Judmayer, Alexei Zamyatin, Andreas Kern, Edgar Weippl
2018/1133 (PDF ) A Public Key Exchange Cryptosystem Based on Ideal Secrecy Vamshi Krishna Kammadanam, Virendra R. Sule, Yi Hong
2018/1132 (PDF ) Ouroboros Crypsinous: Privacy-Preserving Proof-of-Stake Thomas Kerber, Markulf Kohlweiss, Aggelos Kiayias, Vassilis Zikas
2018/1131 (PDF ) A CCA-secure collusion-resistant Identity-based Proxy Re-encryption Scheme Arinjita Paul, Varshika Srinivasavaradhan, S. Sharmila Deva Selvi, C. Pandu Rangan
2018/1130 (PDF ) A Survey on Applications of H-Technique: Revisiting Security Analysis of PRP and PRF Ashwin Jha, Mridul Nandi
2018/1129 (PDF ) On Kilian's Randomization of Multilinear Map Encodings Jean-Sebastien Coron, Hilder V. L. Pereira
2018/1128 (PDF ) Direct Anonymous Attestation with Optimal TPM Signing Efficiency Kang Yang, Liqun Chen, Zhenfeng Zhang, Christopher J. P. Newton, Bo Yang, Li Xi
2018/1127 (PDF ) Freestyle, a randomized version of ChaCha for resisting offline brute-force and dictionary attacks P. Arun Babu, Jithin Jose Thomas
2018/1126 (PDF ) Lightweight AE and HASH in a Single Round Function Dingfeng Ye, Danping Shi, Peng Wang
2018/1125 (PDF ) Verifying liquidity of Bitcoin contracts Massimo Bartoletti, Roberto Zunino
2018/1124 (PDF ) Secure Opportunistic Multipath Key Exchange Sergiu Costea, Marios O. Choudary, Doru Gucea, Björn Tackmann, Costin Raiciu
2018/1123 (PDF ) When Theory Meets Practice: A Framework for Robust Profiled Side-channel Analysis Stjepan Picek, Annelie Heuser, Lichao Wu, Cesare Alippi, Francesco Regazzoni
2018/1122 (PDF ) Improved Quantum Multicollision-Finding Algorithm Akinori Hosoyamada, Yu Sasaki, Seiichiro Tani, Keita Xagawa
2018/1121 (PDF ) An Analysis of the ProtonMail Cryptographic Architecture Nadim Kobeissi
2018/1120 (PDF ) Organizational Cryptography for Access Control Masahito Gotaishi, Shigeo Tsujii
2018/1119 (PDF ) Parallel Chains: Improving Throughput and Latency of Blockchain Protocols via Parallel Composition Matthias Fitzi, Peter Ga{ž}i, Aggelos Kiayias, Alexander Russell
2018/1118 (PDF ) Non-Interactive Non-Malleability from Quantum Supremacy Yael Tauman Kalai, Dakshita Khurana
2018/1117 (PDF ) A Note on Transitional Leakage When Masking AES with Only Two Bits of Randomness Felix Wegener, Amir Moradi
2018/1116 (PDF ) Fly, you fool! Faster Frodo for the ARM Cortex-M4 Joppe W. Bos, Simon Friedberger, Marco Martinoli, Elisabeth Oswald, Martijn Stam
2018/1115 (PDF ) Group Signature without Random Oracles from Randomizable Signatures Remi Clarisse, Olivier Sanders
2018/1114 (PDF ) Lightweight Circuits with Shift and Swap Subhadeep Banik, Francesco Regazzoni, Serge Vaudenay
2018/1113 (PDF ) Private Function Evaluation with Cards Alexander Koch, Stefan Walzer
2018/1112 (PDF ) DEXON: A Highly Scalable, Decentralized DAG-Based Consensus Algorithm Tai-Yuan Chen, Wei-Ning Huang, Po-Chun Kuo, Hao Chung, Tzu-Wei Chao
2018/1110 (PDF ) Minting Mechanisms for Blockchain -- or -- Moving from Cryptoassets to Cryptocurrencies Dominic Deuber, Nico Döttling, Bernardo Magri, Giulio Malavolta, Sri Aravinda Krishnan Thyagarajan
2018/1109 (PDF ) Faster SeaSign signatures through improved rejection sampling Thomas Decru, Lorenz Panny, Frederik Vercauteren
2018/1108 (PDF ) Covert Security with Public Verifiability: Faster, Leaner, and Simpler Cheng Hong, Jonathan Katz, Vladimir Kolesnikov, Wen-jie Lu, Xiao Wang
2018/1107 (PDF ) Further observations on SIMON and SPECK families of block ciphers S. M. Dehnavi
2018/1106 (PDF ) P4TC—Provably-Secure yet Practical Privacy-Preserving Toll Collection Valerie Fetzer, Max Hoffmann, Matthias Nagel, Andy Rupp, Rebecca Schwerdt
2018/1105 (PDF ) Proof-of-Stake Protocols for Privacy-Aware Blockchains Chaya Ganesh, Claudio Orlandi, Daniel Tschudi
2018/1104 (PDF ) Tropical cryptography II: extensions by homomorphisms Dima Grigoriev, Vladimir Shpilrain
2018/1103 (PDF ) Some Properties of Modular Addition Victoria Vysotskaya
2018/1102 (PDF ) A fully distributed revocable ciphertext-policy hierarchical attribute-based encryption without pairing Mohammad Ali, Javad Mohajeri, Mohammad-Reza Sadeghi
2018/1101 (PDF ) Insecurity of a provably secure and lightweight certificateless signature scheme for IIoT environments Lunzhi Deng
2018/1100 (PDF ) Correction to "Improving the DGK comparison protocol" Thijs Veugen
2018/1099 (PDF ) SoK: Modular and Efficient Private Decision Tree Evaluation Ágnes Kiss, Masoud Naderpour, Jian Liu, N. Asokan, Thomas Schneider
2018/1098 (PDF ) MARVELlous: a STARK-Friendly Family of Cryptographic Primitives Tomer Ashur, Siemen Dhooghe
2018/1097 (PDF ) End-to-End Secure Mobile Group Messaging with Conversation Integrity and Deniability Michael Schliep, Nicholas Hopper
2018/1096 (PDF ) On Finding Quantum Multi-collisions Qipeng Liu, Mark Zhandry
2018/1095 (PDF ) Scalable One-Time Pad --- From Information Theoretic Security to Information Conservational Security Wen-Ran Zhang
2018/1094 (PDF ) Match Me if You Can: Matchmaking Encryption and its Applications Giuseppe Ateniese, Danilo Francati, David Nuñez, Daniele Venturi
2018/1093 (PDF ) Adaptively Simulation-Secure Attribute-Hiding Predicate Encryption Pratish Datta, Tatsuaki Okamoto, Katsuyuki Takashima
2018/1092 (PDF ) Shuffle and Mix: On the Diffusion of Randomness in Threshold Implementations of Keccak Felix Wegener, Christian Baiker, Amir Moradi
2018/1091 (PDF ) Simulation-based Receiver Selective Opening CCA Secure PKE from Standard Computational Assumptions Keisuke Hara, Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
2018/1090 (PDF ) Plaintext Recovery Attack of OCB2 Tetsu Iwata
2018/1089 (PDF ) On the impact of decryption failures on the security of LWE/LWR based schemes Jan-Pieter D'Anvers, Frederik Vercauteren, Ingrid Verbauwhede
2018/1088 (PDF ) High-speed Side-channel-protected Encryption and Authentication in Hardware Nele Mentens, Vojtech Miskovsky, Martin Novotny, Jo Vliegen
2018/1087 (PDF ) Breaking the confidentiality of OCB2 Bertram Poettering
2018/1086 (PDF ) Two Party Distribution Testing: Communication and Security Alexandr Andoni, Tal Malkin, Negev Shekel Nosatzki
2018/1085 (PDF ) Exact maximum expected differential and linear probability for 2-round Kuznyechik Vitaly Kiryukhin
2018/1084 (PDF ) A Deep Dive into Blockchain Selfish Mining Qianlan Bai, Xinyan Zhou, Xing Wang, Yuedong Xu, Xin Wang, Qingsheng Kong
2018/1083 (PDF ) Private Stateful Information Retrieval Sarvar Patel, Giuseppe Persiano, Kevin Yeo
2018/1082 (PDF ) An Algebraic Method to Recover Superpolies in Cube Attacks Chen-Dong Ye, Tian Tian
2018/1081 (PDF ) Statistical Zeroizing Attack: Cryptanalysis of Candidates of BP Obfuscation over GGH15 Multilinear Map Jung Hee Cheon, Wonhee Cho, Minki Hhan, Jiseung Kim, Changmin Lee
2018/1080 (PDF ) How Does Strict Parallelism Affect Security? A Case Study on the Side-Channel Attacks against GPU-based Bitsliced AES Implementation Yiwen Gao, Yongbin Zhou, Wei Cheng
2018/1079 (PDF ) Analysis of Deterministic Longest-Chain Protocols Elaine Shi
2018/1078 (PDF ) Two Round Information-Theoretic MPC with Malicious Security Prabhanjan Ananth, Arka Rai Choudhuri, Aarushi Goel, Abhishek Jain
2018/1077 (PDF ) More Efficient Lattice PRFs from Keyed Pseudorandom Synthesizers Hart Montgomery
2018/1076 (PDF ) Game Theoretic Notions of Fairness in Multi-Party Coin Toss Kai-Min Chung, Yue Guo, Wei-Kai Lin, Rafael Pass, Elaine Shi
2018/1074 (PDF ) Yet Another Size Record for AES: A First-Order SCA Secure AES S-box Based on GF($2^8$) Multiplication Felix Wegener, Amir Moradi
2018/1073 (PDF ) Faster Homomorphic Discrete Fourier Transforms and Improved FHE Bootstrapping Jung Hee Cheon, Kyoohyung Han, Minki Hhan
2018/1072 (PDF ) Construction of MDS Matrices from Generalized Feistel Structures Mahdi Sajadieh, Mohsen Mousavi
2018/1071 (PDF ) CertLedger: A New PKI Model with Certificate Transparency Based on Blockchain Murat Yasin Kubilay, Mehmet Sabir Kiraz, Haci Ali Mantar
2018/1070 (PDF ) A New Batch FHE Scheme over the Integers Kwak Wi Song, Kim Chol Un
2018/1069 (PDF ) Non-Malleable Codes, Extractors and Secret Sharing for Interleaved Tampering and Composition of Tampering Eshan Chattopadhyay, Xin Li
2018/1068 (PDF ) Partial Key Exposure in Ring-LWE-Based Cryptosystems: Attacks and Resilience Dana Dachman-Soled, Huijing Gong, Mukul Kulkarni, Aria Shahverdi
2018/1067 (PDF ) On Quantum Slide Attacks Xavier Bonnetain, María Naya-Plasencia, André Schrottenloher
2018/1066 (PDF ) Finding Collisions in a Quantum World: Quantum Black-Box Separation of Collision-Resistance and One-Wayness Akinori Hosoyamada, Takashi Yamakawa
2018/1065 (PDF ) Homomorphic Secret Sharing for Low Degree Polynomials Russell W. F. Lai, Giulio Malavolta, Dominique Schröder
2018/1064 (PDF ) Towards Provably-Secure Analog and Mixed-Signal Locking Against Overproduction Nithyashankari Gummidipoondi Jayasankaran, Adriana Sanabria Borbon, Edgar Sanchez-Sinencio, Jiang Hu, Jeyavijayan Rajendran
2018/1063 (PDF ) Your Culture is in Your Password: An Analysis of a Demographically-diverse Password Dataset Mashael AlSabah, Gabriele Oligeri, Ryan Riley
2018/1062 (PDF ) DAGsim: Simulation of DAG-based distributed ledger protocols Manuel Zander, Tom Waite, Dominik Harz
2018/1061 (PDF ) On the Design of a Secure Proxy Signature-based Handover Authentication Scheme for LTEWireless Networks Behnam Zahednejad, Majid Bayat, Ashok Kumar Das
2018/1060 (PDF ) Port Contention for Fun and Profit Alejandro Cabrera Aldaya, Billy Bob Brumley, Sohaib ul Hassan, Cesar Pereida García, Nicola Tuveri
2018/1059 (PDF ) Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies Daniel J. Bernstein, Tanja Lange, Chloe Martindale, Lorenz Panny
2018/1058 (PDF ) Ciphertext-Policy Attribute-Based Encrypted Data Equality Test and Classification Yuzhao Cui, Qiong Huang, Jianye Huang, Hongbo Li, Guomin Yang
2018/1057 (PDF ) Limiting the impact of unreliable randomness in deployed security protocols Liliya Akhmetzyanova, Cas Cremers, Luke Garratt, Stanislav V. Smyshlyaev, Nick Sullivan
2018/1056 (PDF ) Towards the AlexNet Moment for Homomorphic Encryption: HCNN, the First Homomorphic CNN on Encrypted Data with GPUs Ahmad Al Badawi, Jin Chao, Jie Lin, Chan Fook Mun, Jun Jie Sim, Benjamin Hong Meng Tan, Xiao Nan, Khin Mi Mi Aung, Vijay Ramaseshan Chandrasekhar
2018/1055 (PDF ) Candidate Differing-Inputs Obfuscation from Indistinguishability Obfuscation and Auxiliary-Input Point Obfuscation Pan Dongxue, Li Hongda, Ni Peifang
2018/1054 (PDF ) Efficient Multi-key FHE with short extended ciphertexts and less public parameters Tanping Zhou, Ningbo Li, Xiaoyuan Yang, Yiliang Han, Wenchao Liu
2018/1053 (PDF ) Revisiting Single-server Algorithms for Outsourcing Modular Exponentiation Jothi Rangasamy, Lakshmi Kuppusamy
2018/1052 (PDF ) Verifiability Analysis of CHVote David Bernhard, Véronique Cortier, Pierrick Gaudry, Mathieu Turuani, Bogdan Warinschi
2018/1051 (PDF ) Lower Bounds for Differentially Private RAMs Giuseppe Persiano, Kevin Yeo
2018/1050 (PDF ) Towards Automatically Penalizing Multimedia Breaches Easwar Vivek Mangipudi, Krutarth Rao, Jeremy Clark, Aniket Kate
2018/1049 (PDF ) Ouroboros-BFT: A Simple Byzantine Fault Tolerant Consensus Protocol Aggelos Kiayias, Alexander Russell
2018/1048 (PDF ) Proof-of-Work Sidechains Aggelos Kiayias, Dionysis Zindros
2018/1047 (PDF ) On the Linear Transformation in White-box Cryptography Seungkwang Lee, Nam-su Jho, Myungchul Kim
2018/1046 (PDF ) Constructing Infinite Families of Low Differential Uniformity $(n,m)$-Functions with $m>n/2$ Claude Carlet, Xi Chen, Longjiang Qu
2018/1045 (PDF ) MPC Joins the Dark Side John Cartlidge, Nigel P. Smart, Younes Talibi Alaoui
2018/1044 (PDF ) Strongly Unforgeable Signatures Resilient to Polynomially Hard-to-Invert Leakage under Standard Assumptions Masahito Ishizaka, Kanta Matsuura
2018/1043 (PDF ) Improved Bootstrapping for Approximate Homomorphic Encryption Hao Chen, Ilaria Chillotti, Yongsoo Song
2018/1042 (PDF ) Laser-induced Single-bit Faults in Flash Memory: Instructions Corruption on a 32-bit Microcontroller Brice Colombier, Alexandre Menu, Jean-Max Dutertre, Pierre-Alain Moëllic, Jean-Baptiste Rigaud, Jean-Luc Danger
2018/1041 (PDF ) Secure Outsourced Matrix Computation and Application to Neural Networks Xiaoqian Jiang, Miran Kim, Kristin Lauter, Yongsoo Song
2018/1040 (PDF ) Cryptanalysis of OCB2 Akiko Inoue, Kazuhiko Minematsu
2018/1039 (PDF ) Aggregate Cash Systems: A Cryptographic Investigation of Mimblewimble Georg Fuchsbauer, Michele Orrù, Yannick Seurin
2018/1038 (PDF ) On inversion modulo pseudo-Mersenne primes Michael Scott
2018/1037 (PDF ) The Double Ratchet: Security Notions, Proofs, and Modularization for the Signal Protocol Joël Alwen, Sandro Coretti, Yevgeniy Dodis
2018/1036 (PDF ) If a Generalised Butterfly is APN then it Operates on 6 Bits Anne Canteaut, Léo Perrin, Shizhu Tian
2018/1035 (PDF ) Relating different Polynomial-LWE problems Madalina Bolboceanu
2018/1034 (PDF ) Adding Distributed Decryption and Key Generation to a Ring-LWE Based CCA Encryption Scheme Michael Kraitsberg, Yehuda Lindell, Valery Osheter, Nigel P. Smart, Younes Talibi Alaoui
2018/1033 (PDF ) One-Round Authenticated Group Key Exchange from Isogenies Atsushi Fujioka, Katsuyuki Takashima, Kazuki Yoneyama
2018/1032 (PDF ) Conditionals in Homomorphic Encryption and Machine Learning Applications Diego Chialva, Ann Dooms
2018/1031 (PDF ) Sharing Independence & Relabeling: Efficient Formal Verification of Higher-Order Masking Roderick Bloem, Rinat Iusupov, Martin Krenn, Stefan Mangard
2018/1030 (PDF ) Registration-Based Encryption from Standard Assumptions Sanjam Garg, Mohammad Hajiabadi, Mohammad Mahmoody, Ahmadreza Rahimi, Sruthi Sekar
2018/1029 (PDF ) Reducing the Key Size of McEliece Cryptosystem from Automorphism-induced Goppa Codes via Permutations Zhe Li, Chaoping Xing, Sze Ling Yeo
2018/1028 (PDF ) Synchronous Byzantine Agreement with Expected $O(1)$ Rounds, Expected $O(n^2)$ Communication, and Optimal Resilience Ittai Abraham, Srinivas Devadas, Danny Dolev, Kartik Nayak, Ling Ren
2018/1027 (PDF ) A Unified Security Perspective on Legally Fair Contract Signing Protocols Diana Maimut, George Teseleanu
2018/1026 (PDF ) Pairing-Friendly Twisted Hessian Curves Chitchanok Chuengsatiansup, Chloe Martindale
2018/1025 (PDF ) Integer Matrices Homomorphic Encryption and Its application Yanan Bai, Jingwei Chen, Yong Feng, Wenyuan Wu
2018/1024 (PDF ) ZLiTE: Lightweight Clients for Shielded Zcash Transactions using Trusted Execution Karl Wüst, Sinisa Matetic, Moritz Schneider, Ian Miers, Kari Kostiainen, Srdjan Capkun
2018/1023 (PDF ) Make Some Noise: Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis Jaehun Kim, Stjepan Picek, Annelie Heuser, Shivam Bhasin, Alan Hanjalic
2018/1022 (PDF ) Blind Certificate Authorities Liang Wang, Gilad Asharov, Rafael Pass, Thomas Ristenpart, abhi shelat
2018/1021 (PDF ) Multi-Client Functional Encryption with Repetition for Inner Product Jérémy Chotard, Edouard Dufour-Sans, Romain Gay, Duong Hieu Phan, David Pointcheval
2018/1020 (PDF ) Non-Interactive Secure Computation from One-Way Functions Saikrishna Badrinarayanan, Abhishek Jain, Rafail Ostrovsky, Ivan Visconti
2018/1019 (PDF ) Decentralized Evaluation of Quadratic Polynomials on Encrypted Data Chloé Hébant, Duong Hieu Phan, David Pointcheval
2018/1018 (PDF ) Faster multiplication in $\mathbb{Z}_{2^m}[x]$ on Cortex-M4 to speed up NIST PQC candidates Matthias J. Kannwischer, Joost Rijneveld, Peter Schwabe
2018/1017 (PDF ) TNFS Resistant Families of Pairing-Friendly Elliptic Curves Georgios Fotiadis, Elisavet Konstantinou
2018/1016 (PDF ) Concealing Ketje: A Lightweight PUF-Based Privacy Preserving Authentication Protocol Gerben Geltink
2018/1015 (PDF ) Non-Malleable Codes Against Bounded Polynomial Time Tampering Marshall Ball, Dana Dachman-Soled, Mukul Kulkarni, Huijia Lin, Tal Malkin
2018/1014 (PDF ) An FPGA-based programmable processor for bilinear pairings Eduardo Cuevas-Farfán, Miguel Morales-Sandoval, René Cumplido
2018/1013 (PDF ) E3: A Framework for Compiling C++ Programs with Encrypted Operands Eduardo Chielle, Oleg Mazonka, Homer Gamil, Nektarios Georgios Tsoutsos, Michail Maniatakos
2018/1012 (PDF ) The authenticated encryption schemes Kravatte-SANE and Kravatte-SANSE Guido Bertoni, Joan Daemen, Seth Hoffert, Michaël Peeters, Gilles Van Assche, Ronny Van Keer
2018/1011 (PDF ) BISON - Instantiating the Whitened Swap-Or-Not Construction Anne Canteaut, Virginie Lallemand, Gregor Leander, Patrick Neumann, Friedrich Wiemer
2018/1010 (PDF ) Space Efficient Computational Multi-Secret Sharing and Its Applications Aggelos Kiayias, Murat Osmanoglu, Alexander Russell, Qiang Tang
2018/1009 (PDF ) LAC: Practical Ring-LWE Based Public-Key Encryption with Byte-Level Modulus Xianhui Lu, Yamin Liu, Zhenfei Zhang, Dingding Jia, Haiyang Xue, Jingnan He, Bao Li, Kunpeng Wang
2018/1007 (PDF ) Masking the AES with Only Two Random Bits Hannes Gross, Ko Stoffelen, Lauren De Meyer, Martin Krenn, Stefan Mangard
2018/1005 (PDF ) Code Offset in the Exponent Luke Demarest, Benjamin Fuller, Alexander Russell
2018/1004 (PDF ) Fiat-Shamir From Simpler Assumptions Ran Canetti, Yilei Chen, Justin Holmgren, Alex Lombardi, Guy N. Rothblum, Ron D. Rothblum
2018/1003 (PDF ) Secure Data Retrieval On The Cloud: Homomorphic Encryption Meets Coresets Adi Akavia, Dan Feldman, Hayim Shaul
2018/1002 (PDF ) "S-Box" Implementation of AES is NOT side-channel resistant C Ashokkumar, Bholanath Roy, M Bhargav Sri Venkatesh, Bernard L Menezes
2018/1001 (PDF ) Illuminating the Dark or how to recover what should not be seen in FE-based classifiers Sergiu Carpov, Caroline Fontaine, Damien Ligier, Renaud Sirdey
2018/1000 (PDF ) Adaptively Single-Key Secure Constrained PRFs for NC1 Nuttapong Attrapadung, Takahiro Matsuda, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
2018/999 (PDF ) A Refinement of ``A Key-recovery Attack on 855-round Trivium" From CRYPTO 2018 Ximing Fu, Xiaoyun Wang, Xiaoyang Dong, Willi Meier, Yonglin Hao, Boxin Zhao
2018/997 (PDF ) Turning HATE Into LOVE: Compact Homomorphic Ad Hoc Threshold Encryption for Scalable MPC Leonid Reyzin, Adam Smith, Sophia Yakoubov
2018/996 (PDF ) Wave: A New Family of Trapdoor One-Way Preimage Sampleable Functions Based on Codes Thomas Debris-Alazard, Nicolas Sendrier, Jean-Pierre Tillich
2018/995 (PDF ) Preprocess-then-NTT Technique and Its Applications to KYBER and NEWHOPE Shuai Zhou, Haiyang Xue, Daode Zhang, Kunpeng Wang, Xianhui Lu, Bao Li, Jingnan He
2018/994 (PDF ) People Who Live in Glass Houses Should not Throw Stones: Targeted Opening Message Franking Schemes Long Chen, Qiang Tang
2018/993 (PDF ) The Multi-user Security of GCM, Revisited: Tight Bounds for Nonce Randomization Viet Tung Hoang, Stefano Tessaro, Aishwarya Thiruvengadam
2018/992 (PDF ) Deconstructing the Blockchain to Approach Physical Limits Vivek Bagaria, Sreeram Kannan, David Tse, Giulia Fanti, Pramod Viswanath
2018/991 (PDF ) Reconsidering Generic Composition: the Tag-then-Encrypt case Francesco Berti, Olivier Pereira, Thomas Peters
2018/990 (PDF ) Quisquis: A New Design for Anonymous Cryptocurrencies Prastudy Fauzi, Sarah Meiklejohn, Rebekah Mercer, Claudio Orlandi
2018/989 (PDF ) Kleptography trapdoor free cryptographic protocols Bohdan Kovalenko, Anton Kudin
2018/988 (PDF ) On the Hardness of Learning With Errors with Binary Secrets Daniele Micciancio
2018/987 (PDF ) Fast Secure Multiparty ECDSA with Practical Distributed Key Generation and Applications to Cryptocurrency Custody Yehuda Lindell, Ariel Nof, Samuel Ranellucci
2018/986 (PDF ) Watermarking PRFs from Lattices: Stronger Security via Extractable PRFs Sam Kim, David J. Wu
2018/985 (PDF ) Efficient Arithmetic In (Pseudo-)Mersenne Prime Order Fields Kaushik Nath, Palash Sarkar
2018/984 (PDF ) Pseudorandomness Against Mean and Variance Bounded Attackers Maciej Skorski
2018/983 (PDF ) Efficient UC Commitment Extension with Homomorphism for Free (and Applications) Ignacio Cascudo, Ivan Damgård, Bernardo David, Nico Döttling, Rafael Dowsley, Irene Giacomelli
2018/982 (PDF ) Constrained PRFs for Bit-fixing (and More) from OWFs with Adaptive Security and Constant Collusion Resistance Alex Davidson, Shuichi Katsumata, Ryo Nishimaki, Shota Yamada
2018/981 (PDF ) PaLa: A Simple Partially Synchronous Blockchain T-H. Hubert Chan, Rafael Pass, Elaine Shi
2018/980 (PDF ) PiLi: An Extremely Simple Synchronous Blockchain T-H. Hubert Chan, Rafael Pass, Elaine Shi
2018/979 (PDF ) FPGA-based Assessment of Midori and GIFT Lightweight Block Ciphers Carlos Andres Lara-Nino, Arturo Diaz-Perez, Miguel Morales-Sandoval
2018/978 (PDF ) Encrypted Multi-Maps with Computationally-Secure Leakage Seny Kamara, Tarik Moataz
2018/977 (PDF ) Threshold Single Password Authentication Devriş İşler, Alptekin Küpçü
2018/976 (PDF ) Distributed Single Password Protocol Framework Devriş İşler, Alptekin Küpçü
2018/975 (PDF ) User Study on Single Password Authentication Devriş İşler, Alptekin Küpçü, Aykut Coskun
2018/974 (PDF ) Adaptively Secure and Succinct Functional Encryption: Improving Security and Efficiency, Simultaneously Fuyuki Kitagawa, Ryo Nishimaki, Keisuke Tanaka, Takashi Yamakawa
2018/973 (PDF ) How to leverage hardness of constant-degree expanding polynomials over $\mathbb{R}$ to build iO Aayush Jain, Amit Sahai
2018/972 (PDF ) Observations on the Dynamic Cube Attack of 855-Round TRIVIUM from Crypto'18 Yonglin Hao, Lin Jiao, Chaoyun Li, Willi Meier, Yosuke Todo, Qingju Wang
2018/971 (PDF ) Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
2018/970 (PDF ) Protean Signature Schemes Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
2018/969 (PDF ) Optimal TNFS-secure pairings on elliptic curves with even embedding degree Georgios Fotiadis, Chloe Martindale
2018/968 (PDF ) Edrax: A Cryptocurrency with Stateless Transaction Validation Alexander Chepurnoy, Charalampos Papamanthou, Shravan Srinivasan, Yupeng Zhang
2018/967 (PDF ) Higher dimensional sieving for the number field sieve algorithms Laurent Grémy
2018/966 (PDF ) On the Security of the Multivariate Ring Learning with Errors Problem Carl Bootland, Wouter Castryck, Frederik Vercauteren
2018/965 (PDF ) Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries Paul Grubbs, Marie-Sarah Lacharité, Brice Minaud, Kenny Paterson
2018/964 (PDF ) Fast Scalar Multiplication for Elliptic Curves over Prime Fields by Efficiently Computable Formulas Saud Al Musa, Guangwu Xu
2018/963 (PDF ) On Enabling Attribute-Based Encryption to Be Traceable against Traitors Zhen Liu, Qiong Huang, Duncan S. Wong
2018/962 (PDF ) Zexe: Enabling Decentralized Private Computation Sean Bowe, Alessandro Chiesa, Matthew Green, Ian Miers, Pratyush Mishra, Howard Wu
2018/961 (PDF ) Jitter Estimation with High Accuracy for Oscillator-Based TRNGs Shaofeng Zhu, Hua Chen, Limin Fan, Meihui Chen, Wei Xi, Dengguo Feng
2018/960 (PDF ) Towards Quantum One-Time Memories from Stateless Hardware Anne Broadbent, Sevag Gharibian, Hong-Sheng Zhou
2018/959 (PDF ) Information Entropy Based Leakage Certification Changhai Ou, Xinping Zhou, Siew-Kei Lam
2018/958 (PDF ) On Tightly Secure Primitives in the Multi-Instance Setting Dennis Hofheinz, Ngoc Khanh Nguyen
2018/957 (PDF ) Same Point Composable and Nonmalleable Obfuscated Point Functions Peter Fenteany, Benjamin Fuller
2018/956 (PDF ) Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key Zhen Liu, Guomin Yang, Duncan S. Wong, Khoa Nguyen, Huaxiong Wang
2018/955 (PDF ) Compact Sparse Merkle Trees Faraz Haider
2018/954 (PDF ) Efficient Ratcheting: Almost-Optimal Guarantees for Secure Messaging Daniel Jost, Ueli Maurer, Marta Mularczyk
2018/953 (PDF ) A Comparative Evaluation of Order-Revealing Encryption Schemes and Secure Range-Query Protocols Dmytro Bogatov, George Kollios, Leonid Reyzin
2018/952 (PDF ) Approximate Homomorphic Encryption over the Conjugate-invariant Ring Duhyeong Kim, Yongsoo Song
2018/951 (PDF ) The Landscape of Optimal Card-based Protocols Alexander Koch
2018/950 (PDF ) Security bound for CTR-ACPKM internally re-keyed encryption mode Liliya R. Akhmetzyanova, Evgeny K. Alekseev, Stanislav V. Smyshlyaev
2018/949 (PDF ) Constructing TI-Friendly Substitution Boxes using Shift-Invariant Permutations Si Gao, Arnab Roy, Elisabeth Oswald
2018/948 (PDF ) MILP-Based Automatic Differential Searches for LEA and HIGHT Elnaz Bagherzadeh, Zahra Ahmadian
2018/947 (PDF ) On the security of Circulant UOV/Rainbow Yasufumi Hashimoto
2018/946 (PDF ) Building an Efficient Lattice Gadget Toolkit: Subgaussian Sampling and More Nicholas Genise, Daniele Micciancio, Yuriy Polyakov
2018/945 (PDF ) On the Inner Product Predicate and a Generalization of Matching Vector Families Balthazar Bauer, Jevgēnijs Vihrovs, Hoeteck Wee
2018/944 (PDF ) Data-Independent Memory Hard Functions: New Attacks and Stronger Constructions Jeremiah Blocki, Ben Harsha, Siteng Kang, Seunghoon Lee, Lu Xing, Samson Zhou
2018/943 (PDF ) Valiant's Universal Circuits Revisited: an Overall Improvement and a Lower Bound Shuoyao Zhao, Yu Yu, Jiang Zhang, Hanlin Liu
2018/942 (PDF ) Insured MPC: Efficient Secure Computation with Financial Penalties Carsten Baum, Bernardo David, Rafael Dowsley
2018/941 (PDF ) A tutorial introduction to CryptHOL Andreas Lochbihler, S. Reza Sefidgar
2018/940 (PDF ) Reusable Non-Interactive Secure Computation Melissa Chase, Yevgeniy Dodis, Yuval Ishai, Daniel Kraschewski, Tianren Liu, Rafail Ostrovsky, Vinod Vaikuntanathan
2018/939 (PDF ) The Proof is in the Pudding: Proofs of Work for Solving Discrete Logarithms Marcella Hastings, Nadia Heninger, Eric Wustrow
2018/938 (PDF ) Private Message Franking with After Opening Privacy Iraklis Leontiadis, Serge Vaudenay
2018/937 (PDF ) Improved Brute-Force Search Strategies for Single-Trace and Few-Traces Template Attacks on the DES Round Keys Mathias Wagner, Stefan Heyse
2018/936 (PDF ) New Techniques for Obfuscating Conjunctions James Bartusek, Tancrède Lepoint, Fermi Ma, Mark Zhandry
2018/935 (PDF ) Distinguishing Error of Nonlinear Invariant Attacks Subhabrata Samajder, Palash Sarkar
2018/934 (PDF ) Integrative Acceleration of First-Order Boolean Masking for Embedded IoT Devices Yuichi Komano, Hideo Shimizu, Hideyuki Miyake
2018/933 (PDF ) Asymptotically Ideal CRT-based Secret Sharing Schemes for Multilevel and Compartmented Access Structures Ferucio Laurentiu Tiplea, Constantin Catalin Dragan
2018/932 (PDF ) 18 Seconds to Key Exchange: Limitations of Supersingular Isogeny Diffie-Hellman on Embedded Devices Philipp Koppermann, Eduard Pop, Johann Heyszl, Georg Sigl
2018/931 (PDF ) A Full RNS Variant of Approximate Homomorphic Encryption Jung Hee Cheon, Kyoohyung Han, Andrey Kim, Miran Kim, Yongsoo Song
2018/930 (PDF ) A study on the fast ElGamal encryption Kim Gyu-Chol, Li Su-Chol
2018/929 (PDF ) Expander Graphs are Non-Malleable Codes Peter M. R. Rasmussen, Amit Sahai
2018/928 (PDF ) Generic Authenticated Key Exchange in the Quantum Random Oracle Model Kathrin Hövelmanns, Eike Kiltz, Sven Schäge, Dominique Unruh
2018/927 (PDF ) Adaptively Secure Distributed PRFs from LWE Benoît Libert, Damien Stehlé, Radu Titiu
2018/926 (PDF ) Hard Isogeny Problems over RSA Moduli and Groups with Infeasible Inversion Salim Ali Altug, Yilei Chen
2018/925 (PDF ) PolyShard: Coded Sharding Achieves Linearly Scaling Efficiency and Security Simultaneously Songze Li, Mingchao Yu, A. Salman Avestimehr, Sreeram Kannan, Pramod Viswanath
2018/924 (PDF ) Forward Secure Signatures on Smart Cards Andreas Hülsing, Christoph Busold, Johannes Buchmann
2018/923 (PDF ) Delegatable Anonymous Credentials from Mercurial Signatures Elizabeth C. Crites, Anna Lysyanskaya
2018/922 (PDF ) Optimized Threshold Implementations: Securing Cryptographic Accelerators for Low-Energy and Low-Latency Applications Dušan Božilov, Miroslav Knežević, Ventzislav Nikov
2018/921 (PDF ) Round Optimal Black-Box “Commit-and-Prove” Dakshita Khurana, Rafail Ostrovsky, Akshayaram Srinivasan
2018/920 (PDF ) A Message Franking Channel Loïs Huguenin-Dumittan, Iraklis Leontiadis
2018/919 (PDF ) Registration-Based Encryption: Removing Private-Key Generator from IBE Sanjam Garg, Mohammad Hajiabadi, Mohammad Mahmoody, Ahmadreza Rahimi
2018/918 (PDF ) Scalable Lightning Factories for Bitcoin Alejandro Ranchal-Pedrosa, Maria Potop-Butucaru, Sara Tucci-Piergiovanni
2018/917 (PDF ) Secure multiparty PageRank algorithm for collaborative fraud detection Alex Sangers, Maran van Heesch, Thomas Attema, Thijs Veugen, Mark Wiggerman, Jan Veldsink, Oscar Bloemen, Daniël Worm
2018/916 (PDF ) Forking a Blockcipher for Authenticated Encryption of Very Short Messages Elena Andreeva, Reza Reyhanitabar, Kerem Varici, Damian Vizár
2018/915 (PDF ) On the Security of a Certificateless Strong Designated Verifier Signature Scheme Nasrollah Pakniat
2018/914 (PDF ) Note on Constructing Constrained PRFs from OWFs with Constant Collusion Resistance Shuichi Katsumata, Shota Yamada
2018/913 (PDF ) Best Possible Information-Theoretic MPC Shai Halevi, Yuval Ishai, Eyal Kushilevitz, Tal Rabin
2018/912 (PDF ) Round-Optimal Fully Black-Box Zero-Knowledge Arguments from One-Way Permutations Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
2018/911 (PDF ) Achieving Fair Treatment in Algorithmic Classification Andrew Morgan, Rafael Pass
2018/910 (PDF ) Secure Certification of Mixed Quantum States with Application to Two-Party Randomness Generation Frédéric Dupuis, Serge Fehr, Philippe Lamontagne, Louis Salvail
2018/909 (PDF ) Two-Round MPC: Information-Theoretic and Black-Box Sanjam Garg, Yuval Ishai, Akshayaram Srinivasan
2018/908 (PDF ) FE and iO for Turing Machines from Minimal Assumptions Shweta Agrawal, Monosij Maitra
2018/907 (PDF ) Proving the correct execution of concurrent services in zero-knowledge Srinath Setty, Sebastian Angel, Trinabh Gupta, Jonathan Lee
2018/906 (PDF ) Watermarking PRFs under Standard Assumptions: Public Marking and Security with Extraction Queries Willy Quach, Daniel Wichs, Giorgos Zirdelis
2018/905 (PDF ) On the Security Loss of Unique Signatures Andrew Morgan, Rafael Pass
2018/904 (PDF ) Quantum security proofs using semi-classical oracles Andris Ambainis, Mike Hamburg, Dominique Unruh
2018/903 (PDF ) Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange Nina Bindel, Jacqueline Brendel, Marc Fischlin, Brian Goncalves, Douglas Stebila
2018/902 (PDF ) ProximiTEE: Hardened SGX Attestation by Proximity Verification Aritra Dhar, Evan Puddu, Kari Kostiainen, Srdjan Capkun
2018/901 (PDF ) On the Complexity of Fair Coin Flipping Iftach Haitner, Nikolaos Makriyannis, Eran Omri
2018/900 (PDF ) Enhancements Are Blackbox Non-Trivial: Impossibility of Enhanced Trapdoor Permutations from Standard Trapdoor Permutations Mohammad Hajiabadi
2018/899 (PDF ) Differential Cryptanalysis of Round-Reduced SPECK Ashutosh Dhar Dwivedi, Pawel Morawiecki
2018/898 (PDF ) Differential Cryptanalysis in ARX Ciphers with specific applications to LEA Ashutosh Dhar Dwivedi, Gautam Srivastava
2018/897 (PDF ) Traitor-Tracing from LWE Made Simple and Attribute-Based Yilei Chen, Vinod Vaikuntanathan, Brent Waters, Hoeteck Wee, Daniel Wichs
2018/896 (PDF ) Proofs of Ignorance and Applications to 2-Message Witness Hiding Apoorvaa Deshpande, Yael Kalai
2018/895 (PDF ) Weak Zero-Knowledge Beyond the Black-Box Barrier Nir Bitansky, Dakshita Khurana, Omer Paneth
2018/894 (PDF ) Perfect Secure Computation in Two Rounds Benny Applebaum, Zvika Brakerski, Rotem Tsabary
2018/893 (PDF ) Blockchain as cryptanalytic tool Manfred Lochter
2018/892 (PDF ) OptORAMa: Optimal Oblivious RAM Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Kartik Nayak, Enoch Peserico, Elaine Shi
2018/891 (PDF ) Breaking a Lightweight M2M Authentication Protocol for Communications in IIoT Environment Seyed Farhad Aghili, Hamid Mala
2018/890 (PDF ) A Bit-fixing PRF with O(1) Collusion-Resistance from LWE Alex Davidson, Ryo Nishimaki
2018/889 (PDF ) Bidirectional Asynchronous Ratcheted Key Agreement with Linear Complexity F. Betül Durak, Serge Vaudenay
2018/888 (PDF ) Energy-Efficient ARM64 Cluster with Cryptanalytic Applications: 80 Cores That Do Not Cost You an ARM and a Leg Thom Wiggers
2018/887 (PDF ) Classical Proofs for the Quantum Collapsing Property of Classical Hash Functions Serge Fehr
2018/886 (PDF ) Towards Isogeny-Based Password-Authenticated Key Establishment Oleg Taraskin, Vladimir Soukharev, David Jao, Jason LeGrow
2018/885 (PDF ) PASTA: PASsword-based Threshold Authentication Shashank Agrawal, Peihan Miao, Payman Mohassel, Pratyay Mukherjee
2018/884 (PDF ) Key Encapsulation from Noisy Key Agreement in the Quantum Random Oracle Model Alan Szepieniec, Reza Reyhanitabar, Bart Preneel
2018/883 (PDF ) Public Key Encryption Resilient to Post-Challenge Leakage and Tampering Attacks Suvradip Chakraborty, C. Pandu Rangan
2018/882 (PDF ) Pre- and post-quantum Diffie--Hellman from groups, actions, and isogenies Benjamin Smith
2018/881 (PDF ) Remote Inter-Chip Power Analysis Side-Channel Attacks at Board-Level Falk Schellenberg, Dennis R. E. Gnad, Amir Moradi, Mehdi B. Tahoori
2018/880 (PDF ) Spread: a new layer for profiled deep-learning side-channel attacks Christophe Pfeifer, Patrick Haddad
2018/879 (PDF ) Efficient Group Signature Scheme without Pairings Ke Gu, Bo Yin
2018/878 (PDF ) RSA Signatures Under Hardware Restrictions Marc Joye, Yan Michalevsky
2018/877 (PDF ) On QA-NIZK in the BPK Model Behzad Abdolmaleki, Helger Lipmaa, Janno Siim, Michał Zając
2018/876 (PDF ) Identity Confidentiality in 5G Mobile Telephony Systems Haibat Khan, Benjamin Dowling, Keith M. Martin
2018/875 (PDF ) Oblivious Transfer in Incomplete Networks Varun Narayanan, Vinod M. Prabhakaran
2018/874 (PDF ) Enhanced Security of Attribute-Based Signatures Johannes Blömer, Fabian Eidens, Jakob Juhnke
2018/873 (PDF ) TACHYON: Fast Signatures from Compact Knapsack Rouzbeh Behnia, Muslum Ozgur Ozmen, Attila A. Yavuz, Mike Rosulek
2018/872 (PDF ) New Techniques for Efficient Trapdoor Functions and Applications Sanjam Garg, Romain Gay, Mohammad Hajiabadi
2018/871 (PDF ) Non-profiled Mask Recovery: the impact of Independent Component Analysis Si Gao, Elisabeth Oswald, Hua Chen, Wei Xi
2018/870 (PDF ) Unifying Kleptographic Attacks George Teseleanu
2018/869 (PDF ) Higher-Order DCA against Standard Side-Channel Countermeasures Andrey Bogdanov, Matthieu Rivain, Philip S. Vejre, Junwei Wang
2018/868 (PDF ) S-Mbank: Secure Mobile Banking Authentication Scheme Using Signcryption, Pair Based Text Authentication, and Contactless Smartcard Dea Saka Kurnia Putra, Mohamad Ali Sadikin, Susila Windarta
2018/867 (PDF ) Poly-Logarithmic Side Channel Rank Estimation via Exponential Sampling Liron David, Avishai Wool
2018/866 (PDF ) Output Compression, MPC, and iO for Turing Machines Saikrishna Badrinarayanan, Rex Fernando, Venkata Koppula, Amit Sahai, Brent Waters
2018/865 (PDF ) Multiplicative Masking for AES in Hardware Lauren De Meyer, Oscar Reparaz, Begül Bilgin
2018/863 (PDF ) Helix: A Scalable and Fair Consensus Algorithm Resistant to Ordering Manipulation Avi Asayag, Gad Cohen, Ido Grayevsky, Maya Leshkowitz, Ori Rottenstreich, Ronen Tamari, David Yakira
2018/862 (PDF ) Attacking RO-PUFs with Enhanced Challenge-Response Pairs Nils Wisiol, Marian Margraf
2018/861 (PDF ) Delegating Computations with (almost) Minimal Time and Space Overhead Justin Holmgren, Ron D. Rothblum
2018/860 (PDF ) Encrypted Databases for Differential Privacy Archita Agarwal, Maurice Herlihy, Seny Kamara, Tarik Moataz
2018/859 (PDF ) Cryptanalysis of Low-Data Instances of Full LowMCv2 Christian Rechberger, Hadi Soleimany, Tyge Tiessen
2018/858 (PDF ) Stronger Security for Sanitizable Signatures Stephan Krenn, Kai Samelin, Dieter Sommer
2018/857 (PDF ) Raptor: A Practical Lattice-Based (Linkable) Ring Signature Xingye Lu, Man Ho Au, Zhenfei Zhang
2018/856 (PDF ) Measuring, simulating and exploiting the head concavity phenomenon in BKZ Shi Bai, Damien Stehlé, Weiqiang Wen
2018/855 (PDF ) On the Security of the PKCS#1 v1.5 Signature Scheme Tibor Jager, Saqib A. Kakvi, Alexander May
2018/854 (PDF ) Universal Multi-Party Poisoning Attacks Saeed Mahloujifar, Mahammad Mahmoody, Ameer Mohammed
2018/853 (PDF ) Towards a Smart Contract-based, Decentralized, Public-Key Infrastructure Christos Patsonakis, Katerina Samari, Mema Roussopoulos, Aggelos Kiayias
2018/852 (PDF ) Fault Attacks on Nonce-based Authenticated Encryption: Application to Keyak and Ketje Christoph Dobraunig, Stefan Mangard, Florian Mendel, Robert Primas
2018/851 (PDF ) More is Less: Perfectly Secure Oblivious Algorithms in the Multi-Server Setting T-H. Hubert Chan, Jonathan Katz, Kartik Nayak, Antigoni Polychroniadou, Elaine Shi
2018/850 (PDF ) Computing supersingular isogenies on Kummer surfaces Craig Costello
2018/849 (PDF ) Improved (Almost) Tightly-Secure Simulation-Sound QA-NIZK with Applications Masayuki Abe, Charanjit S. Jutla, Miyako Ohkubo, Arnab Roy
2018/848 (PDF ) A Universally Composable Framework for the Privacy of Email Ecosystems Pyrros Chaidos, Olga Fourtounelli, Aggelos Kiayias, Thomas Zacharias
2018/847 (PDF ) Realizing Chosen Ciphertext Security Generically in Attribute-Based Encryption and Predicate Encryption Venkata Koppula, Brent Waters
2018/846 (PDF ) Strong Leakage Resilient Encryption: Enhancing Data Confidentiality by Hiding Partial Ciphertext Jia Xu, Jianying Zhou
2018/845 (PDF ) A Framework for Achieving KDM-CCA Secure Public-Key Encryption Fuyuki Kitagawa, Keisuke Tanaka
2018/844 (PDF ) Simulatable Channels: Extended Security that is Universally Composable and Easier to Prove Jean Paul Degabriele, Marc Fischlin
2018/843 (PDF ) Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT) Carmit Hazay, Emmanuela Orsini, Peter Scholl, Eduardo Soria-Vazquez
2018/842 (PDF ) Attribute-Based Signatures for Unbounded Languages from Standard Assumptions Yusuke Sakai, Shuichi Katsumata, Nuttapong Attrapadung, Goichiro Hanaoka
2018/841 (PDF ) Building Quantum-One-Way Functions from Block Ciphers: Davies-Meyer and Merkle-Damgård Constructions Akinori Hosoyamada, Kan Yasuda
2018/840 (PDF ) Universal Proxy Re-Encryption Nico Döttling, Ryo Nishimaki
2018/839 (PDF ) On Kummer Lines With Full Rational 2-torsion and Their Usage in Cryptography Huseyin Hisil, Joost Renes
2018/838 (PDF ) (Tightly) QCCA-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model Keita Xagawa, Takashi Yamakawa
2018/837 (PDF ) Constructing Ideal Secret Sharing Schemes based on Chinese Remainder Theorem Yu Ning, Fuyou Miao, Wenchao Huang, Keju Meng, Yan Xiong, Xingfu Wang
2018/836 (PDF ) Pitchforks in Cryptocurrencies: Enforcing rule changes through offensive forking- and consensus techniques Aljosha Judmayer, Nicholas Stifter, Philipp Schindler, Edgar Weippl
2018/835 (PDF ) Fully-Featured Anonymous Credentials with Reputation System Kai Bemmann, Johannes Blömer, Jan Bobolz, Henrik Bröcher, Denis Diemert, Fabian Eidens, Lukas Eilers, Jan Haltermann, Jakob Juhnke, Burhan Otour, Laurens Porzenheim, Simon Pukrop, Erik Schilling, Michael Schlichtig, Marcel Stienemeier
2018/834 (PDF ) Identity-based Encryption Tightly Secure under Chosen-ciphertext Attacks Dennis Hofheinz, Dingding Jia, Jiaxin Pan
2018/833 (PDF ) Improved Inner-product Encryption with Adaptive Security and Full Attribute-hiding Jie Chen, Junqing Gong, Hoeteck Wee
2018/832 (PDF ) Lightweight and Side-channel Secure 4x4 S-Boxes from Cellular Automata Rules Ashrujit Ghoshal, Rajat Sadhukhan, Sikhar Patranabis, Nilanjan Datta, Stjepan Picek, Debdeep Mukhopadhyay
2018/831 (PDF ) Practical Attack on RaCoSS-R Keita Xagawa
2018/830 (PDF ) A remark on a success rate model fpr DPA and CPA Andreas Wiemers
2018/829 (PDF ) Information-Theoretic Broadcast with Dishonest Majority for Long Messages Wutichai Chongchitmate, Rafail Ostrovsky
2018/828 (PDF ) Aurora: Transparent Succinct Arguments for R1CS Eli Ben-Sasson, Alessandro Chiesa, Michael Riabzev, Nicholas Spooner, Madars Virza, Nicholas P. Ward
2018/827 (PDF ) Practical Strategy-Resistant Privacy-Preserving Elections Sébastien Canard, David Pointcheval, Quentin Santos, Jacques Traoré
2018/826 (PDF ) Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH Tibor Jager, Rafael Kurek, Jiaxin Pan
2018/825 (PDF ) Low Randomness Masking and Shuffling: An Evaluation Using Mutual Information Kostas Papagiannopoulos
2018/824 (PDF ) SeaSign: Compact isogeny signatures from class group actions Luca De Feo, Steven D. Galbraith
2018/823 (PDF ) The Security of Lazy Users in Out-of-Band Authentication Moni Naor, Lior Rotem, Gil Segev
2018/822 (PDF ) LWE Without Modular Reduction and Improved Side-Channel Attacks Against BLISS Jonathan Bootle, Claire Delaplace, Thomas Espitau, Pierre-Alain Fouque, Mehdi Tibouchi
2018/821 (PDF ) Side-channel Assisted Existential Forgery Attack on Dilithium - A NIST PQC candidate Prasanna Ravi, Mahabir Prasad Jhanwar, James Howe, Anupam Chattopadhyay, Shivam Bhasin
2018/820 (PDF ) Privacy Loss Classes: The Central Limit Theorem in Differential Privacy David Sommer, Sebastian Meiser, Esfandiar Mohammadi
2018/819 (PDF ) ZCZ - Achieving n-bit SPRP Security with a Minimal Number of Tweakable-block-cipher Calls Ritam Bhaumik, Eik List, Mridul Nandi
2018/818 (PDF ) Robustly Reusable Fuzzy Extractor from Standard Assumptions Yunhua Wen, Shengli Liu
2018/817 (PDF ) Understanding and Constructing AKE via Double-key Key Encapsulation Mechanism Haiyang Xue, Xianhui Lu, Bao Li, Bei Liang, Jingnan He
2018/816 (PDF ) Revisiting Key-alternating Feistel Ciphers for Shorter Keys and Multi-user Security Chun Guo, Lei Wang
2018/815 (PDF ) Estimation of the Success Probability of Random Sampling by the Gram-Charlier Approximation Yoshitatsu Matsuda, Tadanori Teruya, Kenji Kasiwabara
2018/814 (PDF ) White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography Yudi Zhang, Debiao He, Xinyi Huang, Ding Wang, Kim-Kwang Raymond Choo
2018/813 (PDF ) Programming the Demirci-Sel{ç}uk Meet-in-the-Middle Attack with Constraints Danping Shi, Siwei Sun, Patrick Derbez, Yosuke Todo, Bing Sun, Lei Hu
2018/812 (PDF ) Injective Trapdoor Functions via Derandomization: How Strong is Rudich’s Black-Box Barrier? Lior Rotem, Gil Segev
2018/811 (PDF ) Reconstructing an S-box from its Difference Distribution Table Orr Dunkelman, Senyang Huang
2018/810 (PDF ) Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP Ling Song, Jian Guo
2018/809 (PDF ) Algebraic Cryptanalysis of Frit Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Markus Schofnegger
2018/808 (PDF ) Data Oblivious ISA Extensions for Side Channel-Resistant and High Performance Computing Jiyong Yu, Lucas Hsiung, Mohamad El Hajj, Christopher W. Fletcher
2018/807 (PDF ) On the Existence of Non-Linear Invariants and Algebraic Polynomial Constructive Approach to Backdoors in Block Ciphers Nicolas T. Courtois
2018/806 (PDF ) Guards in Action: First-Order SCA Secure Implementations of Ketje without Additional Randomness Victor Arribas, Svetla Nikova, Vincent Rijmen
2018/805 (PDF ) Beetle Family of Lightweight and Secure Authenticated Encryption Ciphers Avik Chakraborti, Nilanjan Datta, Mridul Nandi, Kan Yasuda
2018/804 (PDF ) Double-block Hash-then-Sum: A Paradigm for Constructing BBB Secure PRF Nilanjan Datta, Avijit Dutta, Mridul Nandi, Goutam Paul
2018/803 (PDF ) BITE: Bitcoin Lightweight Client Privacy using Trusted Execution Sinisa Matetic, Karl Wüst, Moritz Schneider, Kari Kostiainen, Ghassan Karame, Srdjan Capkun
2018/802 (PDF ) Secure Modulo Zero-Sum Randomness as Cryptographic Resource Masahito Hayashi, Takeshi Koshiba
2018/801 (PDF ) Faster PCA and Linear Regression through Hypercubes in HElib Deevashwer Rathee, Pradeep Kumar Mishra, Masaya Yasuda
2018/800 (PDF ) Security of the Blockchain against Long Delay Attack Puwen Wei, Quan Yuan, Yuliang Zheng
2018/799 (PDF ) Finding Ordinary Cube Variables for Keccak-MAC with Greedy Algorithm Fukang Liu, Zhenfu Cao, Gaoli Wang
2018/798 (PDF ) Recovering Secrets From Prefix-Dependent Leakage Houda Ferradi, Rémi Géraud, Sylvain Guilley, David Naccache, Mehdi Tibouchi
2018/797 (PDF ) Quantum algorithms for computing general discrete logarithms and orders with tradeoffs Martin Ekerå
2018/796 (PDF ) On relations between CCZ- and EA-equivalences Lilya Budaghyan, Marco Calderini, Irene Villa
2018/795 (PDF ) Solving ECDLP via List Decoding Fangguo Zhang, Shengli Liu
2018/794 (PDF ) Blending FHE-NTRU keys – The Excalibur Property Louis Goubin, Francisco Vial-Prado
2018/793 (PDF ) Universal Forgery and Multiple Forgeries of MergeMAC and Generalized Constructions Tetsu Iwata, Virginie Lallemand, Gregor Leander, Yu Sasaki
2018/792 (PDF ) Faster Modular Arithmetic For Isogeny Based Crypto on Embedded Devices Joppe W. Bos, Simon J. Friedberger
2018/791 (PDF ) Practical Fully Secure Unrestricted Inner Product Functional Encryption modulo $p$ Guilhem Castagnos, Fabien Laguillaumie, Ida Tucker
2018/790 (PDF ) Generic Double-Authentication Preventing Signatures and a Post-Quantum Instantiation David Derler, Sebastian Ramacher, Daniel Slamanig
2018/789 (PDF ) Free IF: How to Omit Inactive Branches and Implement S-Universal Garbled Circuit (Almost) for Free Vladimir Kolesnikov
2018/788 (PDF ) Privacy-preserving certificate linkage/revocation in VANETs without Linkage Authorities Marcos A. Simplicio Jr., Eduardo Lopes Cominetti, Harsh Kupwade Patil, Jefferson E. Ricardini, Leonardo T. D. Ferraz, Marcos Vinicius M. Silva
2018/787 (PDF ) Labeled PSI from Fully Homomorphic Encryption with Malicious Security Hao Chen, Zhicong Huang, Kim Laine, Peter Rindal
2018/786 (PDF ) Discrete Gaussian Measures and New Bounds of the Smoothing Parameter for Lattices Zhongxiang Zheng, Guangwu Xu, Chunhuan Zhao
2018/785 (PDF ) Efficiently Processing Complex-Valued Data in Homomorphic Encryption Carl Bootland, Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren
2018/784 (PDF ) Tweakable Block Ciphers Secure Beyond the Birthday Bound in the Ideal Cipher Model ByeongHak Lee, Jooyoung Lee
2018/783 (PDF ) Short Variable Length Domain Extenders With Beyond Birthday Bound Security Yu Long Chen, Bart Mennink, Mridul Nandi
2018/782 (PDF ) A faster way to the CSIDH Michael Meyer, Steffen Reith
2018/781 (PDF ) Leakage-Resilient Cryptography from Puncturable Primitives and Obfuscation Yu Chen, Yuyu Wang, Hong-sheng Zhou
2018/780 (PDF ) A Game Theoretic Analysis of Resource Mining in Blockchain Rajani Singh, Ashutosh Dhar Dwivedi, Gautam Srivastava, Agnieszka Wiszniewska-Matyszkiel, Xiaochun Cheng
2018/779 (PDF ) Lattice-Based Group Signatures and Zero-Knowledge Proofs of Automorphism Stability Rafael del Pino, Vadim Lyubashevsky, Gregor Seiler
2018/778 (PDF ) PPP-Completeness with Connections to Cryptography Katerina Sotiraki, Manolis Zampetakis, Giorgos Zirdelis
2018/777 (PDF ) Delegation of Decryption Rights with Revocability from Learning with Errors Wei Yin, Qiaoyan Wen, Kaitai Liang, Zhenfei Zhang, Liqun Chen, Hanbing Yan, Hua Zhang
2018/776 (PDF ) On Publicly Verifiable Delegation From Standard Assumptions Yael Kalai, Omer Paneth, Lisa Yang
2018/775 (PDF ) The Fiat-Shamir Zoo: Relating the Security of Different Signature Variants Matilda Backendal, Mihir Bellare, Jessica Sorrell, Jiahao Sun
2018/774 (PDF ) Thring Signatures and their Applications to Spender-Ambiguous Digital Currencies Brandon Goodell, Sarang Noether
2018/773 (PDF ) Short Lattice-based One-out-of-Many Proofs and Applications to Ring Signatures Muhammed F. Esgin, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Dongxi Liu
2018/772 (PDF ) Linear Equivalence of Block Ciphers with Partial Non-Linear Layers: Application to LowMC Itai Dinur, Daniel Kales, Angela Promitzer, Sebastian Ramacher, Christian Rechberger
2018/771 (PDF ) A Simple Construction of iO for Turing Machines Sanjam Garg, Akshayaram Srinivasan
2018/770 (PDF ) Combiners for Backdoored Random Oracles Balthazar Bauer, Pooya Farshim, Sogol Mazaheri
2018/769 (PDF ) Constructing APN functions through isotopic shifts Lilya Budaghyan, Marco Calderini, Claude Carlet, Robert S. Coulter, Irene Villa
2018/768 (PDF ) DRANKULA: a McEliece-like rank metric based cryptosystem implementation Ameera Salem Al Abdouli, Mohamed Al Ali, Emanuele Bellini, Florian Caullery, Alexandros Hasikos, Marc Manzano, Victor Mateu
2018/767 (PDF ) Xoodoo cookbook Joan Daemen, Seth Hoffert, Michaël Peeters, Gilles Van Assche, Ronny Van Keer
2018/766 (PDF ) Noise Explorer: Fully Automated Modeling and Verification for Arbitrary Noise Protocols Nadim Kobeissi, Georgio Nicolas, Karthikeyan Bhargavan
2018/765 (PDF ) Symbolic Proofs for Lattice-Based Cryptography Gilles Barthe, Xiong Fan, Joshua Gancher, Benjamin Grégoire, Charlie Jacomme, Elaine Shi
2018/764 (PDF ) Generating Graphs Packed with Paths Mathias Hall-Andersen, Philip S. Vejre
2018/763 (PDF ) Block Cipher Invariants as Eigenvectors of Correlation Matrices (Full Version) Tim Beyne
2018/762 (PDF ) Generalizing the SPDZ Compiler For Other Protocols Toshinori Araki, Assi Barak, Jun Furukawa, Marcel Keller, Yehuda Lindell, Kazuma Ohara, Hikaru Tsuchida
2018/761 (PDF ) New Single-Trace Side-Channel Attacks on a Specific Class of Elgamal Cryptosystem Parinaz Mahdion, Hadi Soleimany, Pouya Habibi, Farokhlagha Moazami
2018/760 (PDF ) Strongly Secure Authenticated Key Exchange from Supersingular Isogenies Xiu Xu, Haiyang Xue, Kunpeng Wang, Man Ho Au, Bei Liang, Song Tian
2018/759 (PDF ) Succinct Garbling Schemes from Functional Encryption through a Local Simulation Paradigm Prabhanjan Ananth, Alex Lombardi
2018/758 (PDF ) CHIMERA: Combining Ring-LWE-based Fully Homomorphic Encryption Schemes Christina Boura, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev
2018/757 (PDF ) Cryptography for Human Senses Kimmo Halunen, Outi-Marja Latvala
2018/756 (PDF ) Obfuscation Using Tensor Products Craig Gentry, Charanjit S. Jutla, Daniel Kane
2018/755 (PDF ) Simulation-Based Selective Opening Security for Receivers under Chosen-Ciphertext Attacks Zhengan Huang, Junzuo Lai, Wenbin Chen, Man Ho Au, Zhen Peng, Jin Li
2018/754 (PDF ) SoK: A Consensus Taxonomy in the Blockchain Era Juan Garay, Aggelos Kiayias
2018/753 (PDF ) Decentralized Policy-Hiding Attribute-Based Encryption with Receiver Privacy Yan Michalevsky, Marc Joye
2018/752 (PDF ) Isogeny Secrets can be Traded David Urbanik
2018/751 (PDF ) An End-to-End System for Large Scale P2P MPC-as-a-Service and Low-Bandwidth MPC for Weak Participants Assi Barak, Martin Hirt, Lior Koskas, Yehuda Lindell
2018/750 (PDF ) Non-Malleable Secret Sharing for General Access Structures Vipul Goyal, Ashutosh Kumar
2018/749 (PDF ) Prime and Prejudice: Primality Testing Under Adversarial Conditions Martin R. Albrecht, Jake Massimo, Kenneth G. Paterson, Juraj Somorovsky
2018/748 (PDF ) Definitions for Plaintext-Existence Hiding in Cloud Storage Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Håvard Raddum, Mohsen Toorani
2018/747 (PDF ) Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure Eyal Ronen, Kenneth G. Paterson, Adi Shamir
2018/746 (PDF ) Secret Sharing with Binary Shares Fuchun Lin, Mahdi Cheraghchi, Venkatesan Guruswami, Reihaneh Safavi-Naini, Huaxiong Wang
2018/745 (PDF ) Achilles' Heel: the Unbalanced Mask Sets May Destroy a Masking Countermeasure Jingdian Ming, Wei Cheng, Huizhong Li, Guang Yang, Yongbin Zhou, Qian Zhang
2018/744 (PDF ) BAdASS: Preserving Privacy in Behavioural Advertising with Applied Secret Sharing Leon J. Helsloot, Gamze Tillem, Zekeriya Erkin
2018/743 (PDF ) On the Leakage of Corrupted Garbled Circuits Aurélien Dupin, David Pointcheval, Christophe Bidan
2018/742 (PDF ) Witness-Indistinguishable Arguments with $\Sigma$-Protocols for Bundled Witness Spaces and its Application to Global Identities Hiroaki Anada, Seiko Arita
2018/741 (PDF ) LP Solutions of Vectorial Integer Subset Sums - Cryptanalysis of Galbraith's Binary Matrix LWE Alexander May, Gottfried Herold
2018/740 (PDF ) FairSwap: How to fairly exchange digital goods Stefan Dziembowski, Lisa Eckey, Sebastian Faust
2018/739 (PDF ) Using MILP in Analysis of Feistel Structures and Improving Type II GFS by Switching Mechanism Mahdi Sajadieh, Mohammad Vaziri
2018/738 (PDF ) Towards Static Assumption Based Cryptosystem in Pairing Setting: Further Applications of DéjàQ and Dual-Form Signature Sanjit Chatterjee, R. Kabaleeshwaran
2018/737 (PDF ) Steady: A Simple End-to-End Secure Logging System Tobias Pulls, Rasmus Dahlberg
2018/736 (PDF ) Improved Signature Schemes for Secure Multi-Party Computation with Certified Inputs Marina Blanton, Myoungin Jeong
2018/734 (PDF ) Random Number Generators Can Be Fooled to Behave Badly George Teseleanu
2018/733 (PDF ) Threshold Partially-Oblivious PRFs with Applications to Key Management Stanislaw Jarecki, Hugo Krawczyk, Jason Resch
2018/732 (PDF ) Data Oblivious Genome Variants Search on Intel SGX Avradip Mandal, John C. Mitchell, Hart Montgomery, Arnab Roy
2018/731 (PDF ) An Optimal Distributed Discrete Log Protocol with Applications to Homomorphic Secret Sharing Itai Dinur, Nathan Keller, Ohad Klein
2018/730 (PDF ) Supersingular Isogeny Diffie-Hellman Authenticated Key Exchange Atsushi Fujioka, Katsuyuki Takashima, Shintaro Terada, Kazuki Yoneyama
2018/728 (PDF ) A $k$-out-of-$n$ Ring Signature with Flexible Participation for Signers Takeshi Okamoto, Raylin Tso, Michitomo Yamaguchi, Eiji Okamoto
2018/727 (PDF ) DiSE: Distributed Symmetric-key Encryption Shashank Agrawal, Payman Mohassel, Pratyay Mukherjee, Peter Rindal
2018/726 (PDF ) Towards Key-Dependent Integral and Impossible Differential Distinguishers on 5-Round AES Kai Hu, Tingting Cui, Chao Gao, Meiqin Wang
2018/725 (PDF ) Round5: KEM and PKE based on GLWR Sauvik Bhattacharya, Oscar Garcia-Morchon, Thijs Laarhoven, Ronald Rietman, Markku-Juhani O. Saarinen, Ludo Tolhuizen, Zhenfei Zhang
2018/724 (PDF ) Rethinking Secure FPGAs: Towards a Cryptography-friendly Configurable Cell Architecture and its Automated Design Flow Nele Mentens, Edoardo Charbon, Francesco Regazzoni
2018/723 (PDF ) Shorter Messages and Faster Post-Quantum Encryption with Round5 on Cortex M Markku-Juhani O. Saarinen, Sauvik Bhattacharya, Oscar Garcia-Morchon, Ronald Rietman, Ludo Tolhuizen, Zhenfei Zhang
2018/722 (PDF ) uMine: a Blockchain based on Human Miners Henning Kopp, Frank Kargl, Christoph Bösch, Andreas Peter
2018/721 (PDF ) Transparency Logs via Append-only Authenticated Dictionaries Alin Tomescu, Vivek Bhupatiraju, Dimitrios Papadopoulos, Charalampos Papamanthou, Nikos Triandopoulos, Srinivas Devadas
2018/720 (PDF ) {Adiantum}: length-preserving encryption for entry-level processors Paul Crowley, Eric Biggers
2018/719 (PDF ) Data Recovery on Encrypted Databases With k-Nearest Neighbor Query Leakage Evgenios M. Kornaropoulos, Charalampos Papamanthou, Roberto Tamassia
2018/718 (PDF ) Cryptographic Pseudorandom Generators Can Make Cryptosystems Problematic Koji Nuida
2018/717 (PDF ) Key Extraction using Thermal Laser Stimulation: A Case Study on Xilinx Ultrascale FPGAs Heiko Lohrke, Shahin Tajik, Thilo Krachenfels, Christian Boit, Jean-Pierre Seifert
2018/716 (PDF ) Lattice-Based Zero-Knowledge Arguments for Integer Relations Benoît Libert, San Ling, Khoa Nguyen, Huaxiong Wang
2018/715 (PDF ) Practical Attacks on Relational Databases Protected via Searchable Encryption Mohamed Ahmed Abdelraheem, Tobias Andersson, Christian Gehrmann, Cornelius Glackin
2018/714 (PDF ) PKP-Based Signature Scheme Ward Beullens, Jean-Charles Faugère, Eliane Koussa, Gilles Macario-Rat, Jacques Patarin, Ludovic Perret
2018/713 (PDF ) On CCZ-Equivalence, Extended-Affine Equivalence, and Function Twisting Anne Canteaut, Léo Perrin
2018/712 (PDF ) A Survey of Two Verifiable Delay Functions Dan Boneh, Benedikt Bünz, Ben Fisch
2018/711 (PDF ) Cryptanalysis of a Group Key Transfer Protocol Based on Secret Sharing: Generalization and Countermeasures Kallepu Raju, Appala Naidu Tentuand, V. Ch. Venkaiah
2018/710 (PDF ) Fast Secure Computation for Small Population over the Internet Megha Byali, Arun Joseph, Arpita Patra, Divya Ravi
2018/709 (PDF ) Simple oblivious transfer protocols compatible with Kummer and supersingular isogenies Vanessa Vitse
2018/708 (PDF ) Masking the Lightweight Authenticated Ciphers ACORN and Ascon in Software Alexandre Adomnicai, Jacques J. A. Fournier, Laurent Masson
2018/707 (PDF ) Function Secret Sharing: Improvements and Extensions Elette Boyle, Niv Gilboa, Yuval Ishai
2018/706 (PDF ) Efficient 3-Party Distributed ORAM Paul Bunn, Jonathan Katz, Eyal Kushilevitz, Rafail Ostrovsky
2018/705 (PDF ) Subvector Commitments with Application to Succinct Arguments Russell W. F. Lai, Giulio Malavolta
2018/704 (PDF ) Verifiable Sealed-Bid Auction on the Ethereum Blockchain Hisham S. Galal, Amr M. Youssef
2018/703 (PDF ) New Protocols for Secure Linear Algebra: Pivoting-Free Elimination and Fast Block-Recursive Matrix Decomposition Niek J. Bouman, Niels de Vreede
2018/702 (PDF ) Tight Proofs of Space and Replication Ben Fisch
2018/700 (PDF ) SIDH on ARM: Faster Modular Multiplications for Faster Post-Quantum Supersingular Isogeny Key Exchange Hwajeong Seo, Zhe Liu, Patrick Longa, Zhi Hu
2018/699 (PDF ) Correlated Sequence Attack on Reduced-Round Simon-32/64 and Simeck-32/64 Raghvendra Rohit, Guang Gong
2018/698 (PDF ) Parameter-Hiding Order Revealing Encryption David Cash, Feng-Hao Liu, Adam O'Neill, Mark Zhandry, Cong Zhang
2018/697 (PDF ) AUDIT: Practical Accountability of Secret Processes Jonathan Frankle, Sunoo Park, Daniel Shaar, Shafi Goldwasser, Daniel J. Weitzner
2018/696 (PDF ) Unbounded Inner Product Functional Encryption from Bilinear Maps Junichi Tomida, Katsuyuki Takashima
2018/695 (PDF ) SPHINX: A Password Store that Perfectly Hides Passwords from Itself Maliheh Shirvanian, Stanislaw Jarecki, Hugo Krawczyk, Nitesh Saxena
2018/694 (PDF ) Faster Privacy-Preserving Location Proximity Schemes Kimmo Järvinen, Ágnes Kiss, Thomas Schneider, Oleksandr Tkachenko, Zheng Yang
2018/693 (PDF ) Efficient Side-Channel Protections of ARX Ciphers Bernhard Jungk, Richard Petri, Marc Stöttinger
2018/692 (PDF ) New Configurations of Grain Ciphers: Security Against Slide Attacks Diana Maimut, George Teseleanu
2018/691 (PDF ) DIZK: A Distributed Zero Knowledge Proof System Howard Wu, Wenting Zheng, Alessandro Chiesa, Raluca Ada Popa, Ion Stoica
2018/690 (PDF ) Efficient KEA-Style Lattice-Based Authenticated Key Exchange Zilong Wang, Honggang Hu
2018/689 (PDF ) Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis Ralph Ankele, Stefan Kölbl
2018/688 (PDF ) Finding Integral Distinguishers with Ease Zahra Eskandari, Andreas Brasen Kidmose, Stefan Kölbl, Tyge Tiessen
2018/687 (PDF ) Assessing the Feasibility of Single Trace Power Analysis of Frodo Joppe W. Bos, Simon Friedberger, Marco Martinoli, Elisabeth Oswald, Martijn Stam
2018/686 (PDF ) Standard Lattice-Based Key Encapsulation on Embedded Devices James Howe, Tobias Oder, Markus Krausz, Tim Güneysu
2018/685 (PDF ) On Trade-offs of Applying Block Chains for Electronic Voting Bulletin Boards Sven Heiberg, Ivo Kubjas, Janno Siim, Jan Willemson
2018/684 (PDF ) PIEs: Public Incompressible Encodings for Decentralized Storage Ethan Cecchetti, Ben Fisch, Ian Miers, Ari Juels
2018/683 (PDF ) Usability is not Enough: Lessons Learned from 'Human Factors in Security' Research for Verifiability Oksana Kulyk, Melanie Volkamer
2018/682 (PDF ) Saber on ARM CCA-secure module lattice-based key encapsulation on ARM Angshuman Karmakar, Jose Maria Bermudo Mera, Sujoy Sinha Roy, Ingrid Verbauwhede
2018/681 (PDF ) A Reusable Fuzzy Extractor with Practical Storage Size Jung Hee Cheon, Jinhyuck Jeong, Dongwoo Kim, Jongchan Lee
2018/680 (PDF ) Related-Tweakey Impossible Differential Attack on Reduced-Round Deoxys-BC-256 Rui Zong, Xiaoyang Dong, Xiaoyun Wang
2018/679 (PDF ) DeepChain: Auditable and Privacy-Preserving Deep Learning with Blockchain-based Incentive Jiasi Weng, Jian Weng, Jilian Zhang, Ming Li, Yue Zhang, Weiqi Luo
2018/678 (PDF ) PoReps: Proofs of Space on Useful Data Ben Fisch
2018/677 (PDF ) Module-lattice KEM Over a Ring of Dimension 128 for Embedded Systems François Gérard
2018/676 (PDF ) Static Power Side-Channel Analysis - An Investigation of Measurement Factors Thorben Moos, Amir Moradi, Bastian Richter
2018/675 (PDF ) A signature scheme from the finite field isomorphism problem Jeffrey Hoffstein, Joseph H. Silverman, William Whyte, Zhenfei Zhang
2018/674 (PDF ) Practical Fault Injection Attacks on SPHINCS Aymeric Genêt, Matthias J. Kannwischer, Hervé Pelletier, Andrew McLauchlan
2018/673 (PDF ) Differential Power Analysis of XMSS and SPHINCS Matthias J. Kannwischer, Aymeric Genêt, Denis Butin, Juliane Krämer, Johannes Buchmann
2018/672 (PDF ) Cold Boot Attacks on Ring and Module LWE Keys Under the NTT Martin R. Albrecht, Amit Deo, Kenneth G. Paterson
2018/671 (PDF ) A Systematic Study of the Impact of Graphical Models on Inference-based Attacks on AES Joey Green, Elisabeth Oswald, Arnab Roy
2018/670 (PDF ) Public Key Compression for Constrained Linear Signature Schemes Ward Beullens, Bart Preneel, Alan Szepieniec
2018/669 (PDF ) Faster cofactorization with ECM using mixed representations Cyril Bouvier, Laurent Imbert
2018/668 (PDF ) Breaking Message Integrity of an End-to-End Encryption Scheme of LINE Takanori Isobe, Kazuhiko Minematsu
2018/667 (PDF ) On Hardware Implementation of Tang-Maitra Boolean Functions Mustafa Khairallah, Anupam Chattopadhyay, Bimal Mandal, Subhamoy Maitra
2018/666 (PDF ) Reproducible Families of Codes and Cryptographic Applications Paolo Santini, Edoardo Persichetti, Marco Baldi
2018/665 (PDF ) Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves Dan Boneh, Darren Glass, Daniel Krashen, Kristin Lauter, Shahed Sharif, Alice Silverberg, Mehdi Tibouchi, Mark Zhandry
2018/664 (PDF ) Public Accountability vs. Secret Laws: Can They Coexist? Shafi Goldwasser, Sunoo Park
2018/663 (PDF ) Fast Secure Matrix Multiplications over Ring-Based Homomorphic Encryption Pradeep Kumar Mishra, Deevashwer Rathee, Dung Hoang Duong, Masaya Yasuda
2018/662 (PDF ) Efficient Logistic Regression on Large Encrypted Data Kyoohyung Han, Seungwan Hong, Jung Hee Cheon, Daejun Park
2018/661 (PDF ) Exploring Deployment Strategies for the Tor Network Christoph Döpmann, Sebastian Rust, Florian Tschorsch
2018/660 (PDF ) A New Blind ECDSA Scheme for Bitcoin Transaction Anonymity Xun Yi, Kwok-Yan Lam, Dieter Gollmann
2018/659 (PDF ) On the Menezes-Teske-Weng’s conjecture Sihem Mesnager, Kwang Ho Kim, Junyop Choe, Chunming Tang
2018/658 (PDF ) Blockchained Post-Quantum Signatures Konstantinos Chalkias, James Brown, Mike Hearn, Tommy Lillehagen, Igor Nitto, Thomas Schroeter
2018/657 (PDF ) Platform-independent Secure Blockchain-Based Voting System Bin Yu, Joseph Liu, Amin Sakzad, Surya Nepal, Paul Rimba, Ron Steinfeld, Man Ho Au
2018/656 (PDF ) FPGA Cluster based high performance Cryptanalysis framework Abhishek Bajpai, S V Kulgod
2018/655 (PDF ) Loamit: A Blockchain-based Residual Loanable-limit Query System Lijing Zhou, Licheng Wang, Yiru Sun, Pin Lv
2018/654 (PDF ) Proofs of Replicated Storage Without Timing Assumptions Ivan Damgård, Chaya Ganesh, Claudio Orlandi
2018/653 (PDF ) Homomorphic Evaluation of Lattice-Based Symmetric Encryption Schemes Pierre-Alain Fouque, Benjamin Hadjibeyli, Paul Kirchner
2018/652 (PDF ) Efficient Collision Attack Frameworks for RIPEMD-160 Fukang Liu, Christoph Dobraunig, Florian Mendel, Takanori Isobe, Gaoli Wang, Zhenfu Cao
2018/651 (PDF ) Side-Channel Analysis of SM2: A Late-Stage Featurization Case Study Nicola Tuveri, Sohaib ul Hassan, Cesar Pereida García, Billy Brumley
2018/650 (PDF ) Designing Efficient Dyadic Operations for Cryptographic Applications Gustavo Banegas, Paulo S. L. M. Barreto, Edoardo Persichetti, Paolo Santini
2018/649 (PDF ) No-signaling Linear PCPs Susumu Kiyoshima
2018/648 (PDF ) Semi-Commutative Masking: A Framework for Isogeny-based Protocols, with an Application to Fully Secure Two-Round Isogeny-based OT Cyprien Delpech de Saint Guilhem, Emmanuela Orsini, Christophe Petit, Nigel P. Smart
2018/647 (PDF ) A new perspective on the powers of two descent for discrete logarithms in finite fields Thorsten Kleinjung, Benjamin Wesolowski
2018/646 (PDF ) Pseudo Flawed-Smudging Generators and Their Application to Indistinguishability Obfuscation Huijia Lin, Christian Matt
2018/645 (PDF ) Mitigating the One-Use Restriction in Attribute-Based Encryption Lucas Kowalczyk, Jiahui Liu, Kailash Meiyappan, Tal Malkin
2018/644 (PDF ) Hide The Modulus: A Secure Non-Interactive Fully Verifiable Delegation Scheme for Modular Exponentiations via CRT Osmanbey Uzunkol, Jothi Rangasamy, Lakshmi Kuppusamy
2018/643 (PDF ) XCLAIM: Trustless, Interoperable Cryptocurrency-Backed Assets Alexei Zamyatin, Dominik Harz, Joshua Lind, Panayiotis Panayiotou, Arthur Gervais, William J. Knottenbelt
2018/642 (PDF ) Commit-Chains: Secure, Scalable Off-Chain Payments Rami Khalil, Alexei Zamyatin, Guillaume Felley, Pedro Moreno-Sanchez, Arthur Gervais
2018/641 (PDF ) Membership Privacy for Fully Dynamic Group Signatures Michael Backes, Lucjan Hanzlik, Jonas Schneider
2018/640 (PDF ) Lower Bounds on Structure-Preserving Signatures for Bilateral Messages Masayuki Abe, Miguel Ambrona, Miyako Ohkubo, Mehdi Tibouchi
2018/639 (PDF ) Function-Dependent Commitments for Verifiable Multi-Party Computation Lucas Schabhüser, Denis Butin, Denise Demirel, Johanens Buchmann
2018/638 (PDF ) BurnBox: Self-Revocable Encryption in a World of Compelled Access Nirvan Tyagi, Muhammad Haris Mughees, Thomas Ristenpart, Ian Miers
2018/637 (PDF ) Efficient Fully Homomorphic Encryption Scheme Shuhong Gao
2018/636 (PDF ) Lattice-Based Dual Receiver Encryption and More Daode Zhang, Kai Zhang, Bao Li, Xianhui Lu, Haiyang Xue, Jie Li
2018/635 (PDF ) On linear hulls in one round of DES Tomer Ashur, Raluca Posteuca
2018/634 (PDF ) Partially Specified Channels: The TLS 1.3 Record Layer without Elision Christopher Patton, Thomas Shrimpton
2018/633 (PDF ) New Methods for Indistinguishability Obfuscation: Bootstrapping and Instantiation Shweta Agrawal
2018/632 (PDF ) CHARIOT: Cloud-Assisted Access Control for the Internet of Things Clementine Gritti, Melek Onen, Refik Molva
2018/631 (PDF ) Efficient Construction of the Boomerang Connection Table Orr Dunkelman
2018/630 (PDF ) Characterizing overstretched NTRU attacks Gabrielle De Micheli, Nadia Heninger, Barak Shani
2018/629 (PDF ) Context Hiding Multi-Key Linearly Homomorphic Authenticators Lucas Schabhüser, Denis Butin, Johannes Buchmann
2018/627 (PDF ) Simple Verifiable Delay Functions Krzysztof Pietrzak
2018/626 (PDF ) Efficient Evaluation of Low Degree Multivariate Polynomials in Ring-LWE Homomorphic Encryption Schemes Sergiu Carpov, Oana Stan
2018/625 (PDF ) Better Than Advertised: Improved Collision-Resistance Guarantees for MD-Based Hash Functions Mihir Bellare, Joseph Jaeger, Julia Len
2018/624 (PDF ) Formal Analysis of Vote Privacy using Computationally Complete Symbolic Attacker Gergei Bana, Rohit Chadha, Ajay Kumar Eeralla
2018/623 (PDF ) Efficient verifiable delay functions Benjamin Wesolowski
2018/622 (PDF ) New techniques for Multi-value input Homomorphic Evaluation and Applications Sergiu Carpov, Malika Izabachène, Victor Mollimard
2018/621 (PDF ) Cache-Attacks on the ARM TrustZone implementations of AES-256 and AES-256-GCM via GPU-based analysis Ben Lapid, Avishai Wool
2018/620 (PDF ) STELLAR: A Generic EM Side-Channel Attack Protection through Ground-Up Root-cause Analysis Debayan Das, Mayukh Nath, Baibhab Chatterjee, Santosh Ghosh, Shreyas Sen
2018/619 (PDF ) Is there an Oblivious RAM Lower Bound for Online Reads? Mor Weiss, Daniel Wichs
2018/618 (PDF ) On some methods for constructing almost optimal S-Boxes and their resilience against side-channel attacks Reynier Antonio de la Cruz Jiménez
2018/617 (PDF ) Two Notions of Differential Equivalence on Sboxes Christina Boura, Anne Canteaut, Jérémy Jean, Valentin Suder
2018/616 (PDF ) Matrioska: A Compiler for Multi-Key Homomorphic Signatures Dario Fiore, Elena Pagnin
2018/615 (PDF ) Indistinguishability Obfuscation Without Multilinear Maps: iO from LWE, Bilinear Maps, and Weak Pseudorandomness Prabhanjan Ananth, Aayush Jain, Amit Sahai
2018/614 (PDF ) A Note on Key Rank Daniel P. Martin, Marco Martinoli
2018/613 (PDF ) One-Message Zero Knowledge and Non-Malleable Commitments Nir Bitansky, Huijia Lin
2018/612 (PDF ) Burning Zerocoins for Fun and for Profit: A Cryptographic Denial-of-Spending Attack on the Zerocoin Protocol Tim Ruffing, Sri Aravinda Thyagarajan, Viktoria Ronge, Dominique Schröder
2018/611 (PDF ) Is Java Card ready for hash-based signatures? Ebo van der Laan, Erik Poll, Joost Rijneveld, Joeri de Ruiter, Peter Schwabe, Jan Verschuren
2018/610 (PDF ) Hierarchical Attribute-based Signatures Constantin-Catalin Dragan, Daniel Gardham, Mark Manulis
2018/609 (PDF ) Improved Results on Factoring General RSA Moduli with Known Bits Mengce Zheng
2018/608 (PDF ) Domain-specific Accelerators for Ideal Lattice-based Public Key Protocols Hamid Nejatollahi, Nikil Dutt, Indranil Banerjee, Rosario Cammarota
2018/607 (PDF ) SEEMless: Secure End-to-End Encrypted Messaging with less trust Melissa Chase, Apoorvaa Deshpande, Esha Ghosh, Harjasleen Malvai
2018/606 (PDF ) Continuously Non-Malleable Codes with Split-State Refresh Antonio Faonio, Jesper Buus Nielsen, Mark Simkin, Daniele Venturi
2018/605 (PDF ) N-term Karatsuba Algorithm and its Application to Multiplier designs for Special Trinomials Yin Li, Yu Zhang, Xiaoli Guo, Chuanda Qi
2018/604 (PDF ) Attack on Kayawood Protocol: Uncloaking Private Keys Matvei Kotov, Anton Menshov, Alexander Ushakov
2018/603 (PDF ) Actively Secure OT-Extension from q-ary Linear Codes Ignacio Cascudo, René Bødker Christensen, Jaron Skovsted Gundersen
2018/602 (PDF ) On the Universally Composable Security of OpenStack Kyle Hogan, Hoda Maleki, Reza Rahaeimehr, Ran Canetti, Marten van Dijk, Jason Hennessey, Mayank Varia, Haibin Zhang
2018/601 (PDF ) Verifiable Delay Functions Dan Boneh, Joseph Bonneau, Benedikt Bünz, Ben Fisch
2018/600 (PDF ) GRANULE: An Ultra lightweight cipher design for embedded security Gaurav Bansod, Abhijit Patil, Narayan Pisharoty
2018/599 (PDF ) CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case Lucas Schabhüser, Denis Butin, Johannes Buchmann
2018/598 (PDF ) Trends in design of ransomware viruses Vlad Constantin Craciun, Andrei Mogage, Emil Simion
2018/597 (PDF ) Consolidating Security Notions in Hardware Masking Lauren De Meyer, Begül Bilgin, Oscar Reparaz
2018/596 (PDF ) Continuous NMC Secure Against Permutations and Overwrites, with Applications to CCA Secure Commitments Ivan Damgård, Tomasz Kazana, Maciej Obremski, Varun Raj, Luisa Siniscalchi
2018/594 (PDF ) Cryptanalysis of SFN Block Cipher Sadegh Sadeghi, Nasour Bagheri
2018/593 (PDF ) Ramanujan graphs in cryptography Anamaria Costache, Brooke Feigon, Kristin Lauter, Maike Massierer, Anna Puskas
2018/592 (PDF ) XS-circuits in Block Ciphers Sergey Agievich
2018/591 (PDF ) 4-bit crypto S-boxes: Generation with irreducible polynomials over Galois field GF(24) and cryptanalysis. Sankhanil Dey, Ranjan Ghosh
2018/590 (PDF ) The Twin Conjugacy Search Problem and Applications Xiaoming Chen, Weiqing You
2018/589 (PDF ) Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme Ahmad Al Badawi, Yuriy Polyakov, Khin Mi Mi Aung, Bharadwaj Veeravalli, Kurt Rohloff
2018/588 (PDF ) BISEN: Efficient Boolean Searchable Symmetric Encryption with Verifiability and Minimal Leakage Guilherme Borges, Henrique Domingos, Bernardo Ferreira, João Leitão, Tiago Oliveira, Bernardo Portela
2018/587 (PDF ) Offline Witness Encryption from Witness PRF and Randomized Encoding in CRS model Tapas Pal, Ratna Dutta
2018/586 (PDF ) Lower Bounds on Lattice Enumeration with Extreme Pruning Yoshinori Aono, Phong Q. Nguyen, Takenobu Seito, Junji Shikata
2018/585 (PDF ) Polynomial Functional Encryption Scheme with Linear Ciphertext Size Jung Hee Cheon, Seungwan Hong, Changmin Lee, Yongha Son
2018/584 (PDF ) Bounded Fully Homomorphic Encryption from Monoid Algebras Mugurel Barcau, Vicentiu Pasol
2018/583 (PDF ) Ring Homomorphic Encryption Schemes Mugurel Barcau, Vicentiu Pasol
2018/582 (PDF ) Pisa: Arbitration Outsourcing for State Channels Patrick McCorry, Surya Bakshi, Iddo Bentov, Andrew Miller, Sarah Meiklejohn
2018/581 (PDF ) Smart contracts for bribing miners Patrick McCorry, Alexander Hicks, Sarah Meiklejohn
2018/580 (PDF ) Secure MPC: Laziness Leads to GOD Saikrishna Badrinarayanan, Aayush Jain, Nathan Manohar, Amit Sahai
2018/579 (PDF ) PIR-PSI: Scaling Private Contact Discovery Daniel Demmler, Peter Rindal, Mike Rosulek, Ni Trieu
2018/578 (PDF ) Optimizing Authenticated Garbling for Faster Secure Two-Party Computation Jonathan Katz, Samuel Ranellucci, Mike Rosulek, Xiao Wang
2018/577 (PDF ) Fast Distributed RSA Key Generation for Semi-Honest and Malicious Adversaries Tore Kasper Frederiksen, Yehuda Lindell, Valery Osheter, Benny Pinkas
2018/576 (PDF ) Simpler Constructions of Asymmetric Primitives from Obfuscation Pooya Farshim, Georg Fuchsbauer, Alain Passelègue
2018/575 (PDF ) An Algorithmic Framework for the Generalized Birthday Problem Itai Dinur
2018/574 (PDF ) Correctness and Fairness of Tendermint-core Blockchains Yackolley Amoussou-Guenou, Antonella Del Pozzo, Maria Potop-Butucaru, Sara Tucci-Piergiovanni
2018/573 (PDF ) Improved Lightweight Implementations of CAESAR Authenticated Ciphers Farnoud Farahmand, William Diehl, Abubakr Abdulgadir, Jens-Peter Kaps, Kris Gaj
2018/572 (PDF ) Round-Optimal Secure Multiparty Computation with Honest Majority Prabhanjan Ananth, Arka Rai Choudhuri, Aarushi Goel, Abhishek Jain
2018/571 (PDF ) Limits of Practical Sublinear Secure Computation Elette Boyle, Yuval Ishai, Antigoni Polychroniadou
2018/570 (PDF ) Fast Large-Scale Honest-Majority MPC for Malicious Adversaries Koji Chida, Daniel Genkin, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Yehuda Lindell, Ariel Nof
2018/569 (PDF ) Dissection-BKW Andre Esser, Felix Heuer, Robert Kübler, Alexander May, Christian Sohler
2018/568 (PDF ) Finding Small Solutions of the Equation $Bx-Ay=z$ and Its Applications to Cryptanalysis of the RSA Cryptosystem Shixiong Wang, Longjiang Qu, Chao Li, Shaojing Fu, Hao Chen
2018/567 (PDF ) On the Security Properties of e-Voting Bulletin Boards Aggelos Kiayias, Annabell Kuldmaa, Helger Lipmaa, Janno Siim, Thomas Zacharias
2018/566 (PDF ) Private Circuits: A Modular Approach Prabhanjan Ananth, Yuval Ishai, Amit Sahai
2018/564 (PDF ) Impossibility on Tamper-Resilient Cryptography with Uniqueness Properties Yuyu Wang, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
2018/563 (PDF ) Multi-client Predicate-only Encryption for Conjunctive Equality Tests Tim van de Kamp, Andreas Peter, Maarten H. Everts, Willem Jonker
2018/562 (PDF ) maskVerif: automated analysis of software and hardware higher-order masked implementations Gilles Barthe, Sonia Belaïd, Gaëtan Cassiers, Pierre-Alain Fouque, Benjamin Grégoire, François-Xavier Standaert
2018/561 (PDF ) Blockchain Abstract Data Type Emmanuelle Anceaume, Antonella Del Pozzo, Romaric Ludinard, Maria Potop-Butucaru, Sara Tucci-Piergiovanni
2018/560 (PDF ) Sub-Linear Lattice-Based Zero-Knowledge Arguments for Arithmetic Circuits Carsten Baum, Jonathan Bootle, Andrea Cerulli, Rafael del Pino, Jens Groth, Vadim Lyubashevsky
2018/559 (PDF ) Proofs of Work from Worst-Case Assumptions Marshall Ball, Alon Rosen, Manuel Sabin, Prashant Nalini Vasudevan
2018/558 (PDF ) Simplifying Game-Based Definitions: Indistinguishability up to Correctness and Its Application to Stateful AE Phillip Rogaway, Yusi Zhang
2018/557 (PDF ) Non-Interactive Zero-Knowledge Proofs for Composite Statements Shashank Agrawal, Chaya Ganesh, Payman Mohassel
2018/556 (PDF ) The Curse of Small Domains: New Attacks on Format-Preserving Encryption Viet Tung Hoang, Stefano Tessaro, Ni Trieu
2018/555 (PDF ) Limits on the Power of Garbling Techniques for Public-Key Encryption Sanjam Garg, Mohammad Hajiabadi, Mohammad Mahmoody, Ameer Mohammed
2018/554 (PDF ) A new class of irreducible pentanomials for polynomial based multipliers in binary fields Gustavo Banegas, Ricardo Custodio, Daniel Panario
2018/553 (PDF ) Optimal Channel Security Against Fine-Grained State Compromise: The Safety of Messaging Joseph Jaeger, Igors Stepanovs
2018/552 (PDF ) On the Complexity of Compressing Obfuscation Gilad Asharov, Naomi Ephraim, Ilan Komargodski, Rafael Pass
2018/551 (PDF ) Structured Encryption and Leakage Suppression Seny Kamara, Tarik Moataz, Olga Ohrimenko
2018/550 (PDF ) PRank: Fast Analytical Rank Estimation via Pareto Distributions Liron David, Avishai Wool
2018/549 (PDF ) Adaptive Garbled RAM from Laconic Oblivious Transfer Sanjam Garg, Rafail Ostrovsky, Akshayaram Srinivasan
2018/548 (PDF ) From Laconic Zero-Knowledge to Public-Key Cryptography Itay Berman, Akshay Degwekar, Ron D. Rothblum, Prashant Nalini Vasudevan
2018/547 (PDF ) Indifferentiable Authenticated Encryption Manuel Barbosa, Pooya Farshim
2018/546 (PDF ) Quantum Lattice Enumeration and Tweaking Discrete Pruning Yoshinori Aono, Phong Q. Nguyen, Yixin Shen
2018/545 (PDF ) Fully Automated Differential Fault Analysis on Software Implementations of Block Ciphers Xiaolu Hou, Jakub Breier, Fuyuan Zhang, Yang Liu
2018/544 (PDF ) Pseudorandom Quantum States Zhengfeng Ji, Yi-Kai Liu, Fang Song
2018/543 (PDF ) Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange Kristian Gjøsteen, Tibor Jager
2018/542 (PDF ) Continuously Non-Malleable Codes in the Split-State Model from Minimal Assumptions Rafail Ostrovsky, Giuseppe Persiano, Daniele Venturi, Ivan Visconti
2018/541 (PDF ) Generic Attacks against Beyond-Birthday-Bound MACs Gaëtan Leurent, Mridul Nandi, Ferdinand Sibleyras
2018/540 (PDF ) Must the Communication Graph of MPC Protocols be an Expander? Elette Boyle, Ran Cohen, Deepesh Data, Pavel Hubacek
2018/539 (PDF ) Extracting Linearization Equations from Noisy Sources Daniel Smith-Tone
2018/538 (PDF ) Non-Malleable Codes for Partial Functions with Manipulation Detection Aggelos Kiayias, Feng-Hao Liu, Yiannis Tselekounis
2018/537 (PDF ) Quantum Security Analysis of CSIDH Xavier Bonnetain, André Schrottenloher
2018/536 (PDF ) On the Hardness of the Computational Ring-LWR Problem and its Applications Long Chen, Zhenfeng Zhang, Zhenfei Zhang
2018/535 (PDF ) Monero - Privacy in the Blockchain Kurt M. Alonso, Jordi Herrera Joancomartí
2018/534 (PDF ) Cryptographic Constructions Supporting Implicit Data Integrity Michael Kounavis, David Durham, Sergej Deutsch
2018/533 (PDF ) Quantum Attacks against Indistinguishablility Obfuscators Proved Secure in the Weak Multilinear Map Model Alice Pellet-Mary
2018/532 (PDF ) Ring packing and amortized FHEW bootstrapping Daniele Micciancio, Jessica Sorrell
2018/531 (PDF ) Polynomial direct sum masking to protect against both SCA and FIA Claude Carlet, Abderrahman Daif, Sylvain Guilley, Cédric Tavernier
2018/530 (PDF ) Two-Message Statistically Sender-Private OT from LWE Zvika Brakerski, Nico Döttling
2018/529 (PDF ) Trapdoor Functions from the Computational Diffie-Hellman Assumption Sanjam Garg, Mohammad Hajiabadi
2018/528 (PDF ) Recovering short secret keys of RLCE in polynomial time Alain Couvreur, Matthieu Lequesne, Jean-Pierre Tillich
2018/527 (PDF ) Improved Key Recovery Attacks on Reduced-Round AES with Practical Data an d Memory Complexities Achiya Bar-On, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir
2018/526 (PDF ) Towards KEM Unification Daniel J. Bernstein, Edoardo Persichetti
2018/525 (PDF ) Location-Proof System based on Secure Multi-Party Computations Aurélien Dupin, Jean-Marc Robert, Christophe Bidan
2018/524 (PDF ) New Smooth Projective Hashing For Oblivious Transfer Bing Zeng
2018/523 (PDF ) Reducing Complexity of Pairing Comparisons using Polynomial Evaluation Adam Bobowski, Marcin Słowik
2018/522 (PDF ) Fast Correlation Attack Revisited --Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1 Yosuke Todo, Takanori Isobe, Willi Meier, Kazumaro Aoki, Bin Zhang
2018/521 (PDF ) Ciphertext Expansion in Limited-Leakage Order-Preserving Encryption: A Tight Computational Lower Bound Gil Segev, Ido Shahaf
2018/520 (PDF ) Bernstein Bound on WCS is Tight - Repairing Luykx-Preneel Optimal Forgeries Mridul Nandi
2018/519 (PDF ) Fortified Universal Composability: Taking Advantage of Simple Secure Hardware Modules Brandon Broadnax, Alexander Koch, Jeremias Mechler, Tobias Müller, Jörn Müller-Quade, Matthias Nagel
2018/518 (PDF ) Secure and Reliable Key Agreement with Physical Unclonable Functions Onur Gunlu, Tasnad Kernetzky, Onurcan Iscan, Vladimir Sidorenko, Gerhard Kramer, Rafael F. Schaefer
2018/517 (PDF ) Upper and Lower Bounds for Continuous Non-Malleable Codes Dana Dachman-Soled, Mukul Kulkarni
2018/516 (PDF ) Partial Key Exposure Attacks on RSA: Achieving the Boneh-Durfee Bound Atsushi Takayasu, Noboru Kunihiro
2018/515 (PDF ) Highly Efficient and Re-executable Private Function Evaluation with Linear Complexity Osman Bicer, Muhammed Ali Bingol, Mehmet Sabir Kiraz, Albert Levi
2018/514 (PDF ) Weak Compression and (In)security of Rational Proofs of Storage Ben Fisch, Shashwat Silas
2018/513 (PDF ) Another coin bites the dust: An analysis of dust in UTXO based cryptocurrencies Cristina Pérez-Solà, Sergi Delgado-Segura, Guillermo Navarro-Arribas, Jordi Herrera-Joancomart
2018/512 (PDF ) Provably Secure Integration Cryptosystem on Non-Commutative Group Weiqing You, Xiaoming Chen
2018/511 (PDF ) Return of GGH15: Provable Security Against Zeroizing Attacks James Bartusek, Jiaxin Guan, Fermi Ma, Mark Zhandry
2018/510 (PDF ) Key-Secrecy of PACE with OTS/CafeOBJ Dominik Klein
2018/508 (PDF ) Cost-Effective Private Linear Key Agreement With Adaptive CCA Security from Prime Order Multilinear Maps and Tracing Traitors Mriganka Mandal, Ratna Dutta
2018/507 (PDF ) Tight Tradeoffs in Searchable Symmetric Encryption Gilad Asharov, Gil Segev, Ido Shahaf
2018/506 (PDF ) Secure Two-Party Computation over Unreliable Channels Ran Gelles, Anat Paskin-Cherniavsky, Vassilis Zikas
2018/505 (PDF ) Improved Parallel Mask Refreshing Algorithms: Generic Solutions with Parametrized Non-Interference \& Automated Optimizations Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, François-Xavier Standaert, Pierre-Yves Strub
2018/504 (PDF ) Quantum Attacks on Some Feistel Block Ciphers Xiaoyang Dong, Bingyou Dong, Xiaoyun Wang
2018/503 (PDF ) Finger Printing Data Gideon Samid
2018/502 (PDF ) Computer-aided proofs for multiparty computation with active security Helene Haagh, Aleksandr Karbyshev, Sabine Oechsner, Bas Spitters, Pierre-Yves Strub
2018/500 (PDF ) Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based MAC Nilanjan Datta, Avijit Dutta, Mridul Nandi, Kan Yasuda
2018/499 (PDF ) Secure Two-party Threshold ECDSA from ECDSA Assumptions Jack Doerner, Yashvanth Kondi, Eysa Lee, abhi shelat
2018/498 (PDF ) Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint Qian Guo, Vincent Grosso, François-Xavier Standaert, Olivier Bronchain
2018/497 (PDF ) Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency Xiangfu Song, Changyu Dong, Dandan Yuan, Qiuliang Xu, Minghao Zhao
2018/496 (PDF ) Efficient Delegated Private Set Intersection on Outsourced Private Datasets Aydin Abadi, Sotirios Terzis, Roberto Metere, Changyu Dong
2018/495 (PDF ) Approximating Private Set Union/Intersection Cardinality with Logarithmic Complexity Changyu Dong, Grigorios Loukides
2018/494 (PDF ) Order-LWE and the Hardness of Ring-LWE with Entropic Secrets Madalina Bolboceanu, Zvika Brakerski, Renen Perlman, Devika Sharma
2018/493 (PDF ) Out-of-Band Authentication in Group Messaging: Computational, Statistical, Optimal Lior Rotem, Gil Segev
2018/492 (PDF ) New Instantiations of the CRYPTO 2017 Masking Schemes Pierre Karpman, Daniel S. Roche
2018/491 (PDF ) Conjugacy Separation Problem in Braids: an Attack on the Original Colored Burau Key Agreement Protocol Matvei Kotov, Anton Menshov, Alexey Myasnikov, Dmitry Panteleev, Alexander Ushakov
2018/490 (PDF ) Glitch-Resistant Masking Revisited - or Why Proofs in the Robust Probing Model are Needed Thorben Moos, Amir Moradi, Tobias Schneider, François-Xavier Standaert
2018/489 (PDF ) Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing Changyu Dong, Yilei Wang, Amjad Aldweesh, Patrick McCorry, Aad van Moorsel
2018/488 (PDF ) Wide Tweakable Block Ciphers Based on Substitution-Permutation Networks: Security Beyond the Birthday Bound Benoît Cogliati, Jooyoung Lee
2018/487 (PDF ) Unbounded Inner-Product Functional Encryption, with Succinct Keys Edouard Dufour-Sans, David Pointcheval
2018/486 (PDF ) Pushing the Communication Barrier in Secure Computation using Lookup Tables Ghada Dessouky, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider, Shaza Zeitouni, Michael Zohner
2018/485 (PDF ) Towards practical key exchange from ordinary isogeny graphs Luca De Feo, Jean Kieffer, Benjamin Smith
2018/484 (PDF ) Authenticated Encryption with Nonce Misuse and Physical Leakages: Definitions, Separation Results, and Leveled Constructions Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert
2018/483 (PDF ) Compact Multi-Signatures for Smaller Blockchains Dan Boneh, Manu Drijvers, Gregory Neven
2018/482 (PDF ) SPDZ2k: Efficient MPC mod 2^k for Dishonest Majority Ronald Cramer, Ivan Damgård, Daniel Escudero, Peter Scholl, Chaoping Xing
2018/481 (PDF ) On the Exact Round Complexity of Secure Three-Party Computation Arpita Patra, Divya Ravi
2018/480 (PDF ) On Distributional Collision Resistant Hashing Ilan Komargodski, Eylon Yogev
2018/479 (PDF ) On the security of Jhanwar-Barua Identity-Based Encryption Scheme Adrian G. Schipor
2018/478 (PDF ) On Non-Monotonicity of the Success Probability in Linear Cryptanalysis Ali Aydin Selcuk
2018/477 (PDF ) CSI Neural Network: Using Side-channels to Recover Your Artificial Neural Network Information Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek
2018/476 (PDF ) The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations Stjepan Picek, Annelie Heuser, Alan Jovic, Shivam Bhasin, Francesco Regazzoni
2018/475 (PDF ) Improved Non-Interactive Zero Knowledge with Applications to Post-Quantum Signatures Jonathan Katz, Vladimir Kolesnikov, Xiao Wang
2018/474 (PDF ) Minimising Communication in Honest-Majority MPC by Batchwise Multiplication Verification Peter Sebastian Nordholt, Meilof Veeningen
2018/473 (PDF ) A Black-Box Construction of Fully-Simulatable, Round-Optimal Oblivious Transfer from Strongly Uniform Key Agreement Daniele Friolo, Daniel Masny, Daniele Venturi
2018/472 (PDF ) Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability Giulio Malavolta, Pedro Moreno-Sanchez, Clara Schneidewind, Aniket Kate, Matteo Maffei
2018/471 (PDF ) Efficient Range ORAM with $\mathbb{O}(\log^{2}{N})$ Locality Anrin Chakraborti, Adam J. Aviv, Seung Geol Choi, Travis Mayberry, Daniel S. Roche, Radu Sion
2018/470 (PDF ) The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO Thomas Agrikola, Geoffroy Couteau, Dennis Hofheinz
2018/469 (PDF ) An Abstract Model of UTxO-based Cryptocurrencies with Scripts Joachim Zahnentferner
2018/468 (PDF ) On Beyond-Birthday-Bound Security: Revisiting the Development of ISO/IEC 9797-1 MACs Yaobin Shen, Lei Wang
2018/467 (PDF ) Error-Detecting in Monotone Span Programs with Application to Communication Efficient Multi-Party Computation Nigel P. Smart, Tim Wood
2018/466 (PDF ) A secure end-to-end verifiable e-voting system using zero knowledge based blockchain Somnath Panja, Bimal Kumar Roy
2018/465 (PDF ) A Note on the Communication Complexity of Multiparty Computation in the Correlated Randomness Model Geoffroy Couteau
2018/464 (PDF ) Cryptanalysis of MORUS Tomer Ashur, Maria Eichlseder, Martin M. Lauridsen, Gaëtan Leurent, Brice Minaud, Yann Rotella, Yu Sasaki, Benoît Viguier
2018/463 (PDF ) Generic Hardness of Inversion on Ring and Its Relation to Self-Bilinear Map Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro
2018/462 (PDF ) Logistic regression over encrypted data from fully homomorphic encryption Hao Chen, Ran Gilad-Bachrach, Kyoohyung Han, Zhicong Huang, Amir Jalali, Kim Laine, Kristin Lauter
2018/461 (PDF ) Continuous-Source Fuzzy Extractors: Source uncertainty and security Benjamin Fuller, Lowen Peng
2018/460 (PDF ) RapidChain: Scaling Blockchain via Full Sharding Mahdi Zamani, Mahnush Movahedi, Mariana Raykova
2018/459 (PDF ) Supersingular Isogeny Oblivious Transfer (SIOT) Paulo Barreto, Anderson Nascimento, Glaucio Oliveira, Waldyr Benits
2018/458 (PDF ) Characterizing Collision and Second-Preimage Resistance in Linicrypt Ian McQuoid, Trevor Swope, Mike Rosulek
2018/457 (PDF ) From FE Combiners to Secure MPC and Back Prabhanjan Ananth, Saikrishna Badrinarayanan, Aayush Jain, Nathan Manohar, Amit Sahai
2018/456 (PDF ) An efficient structural attack on NIST submission DAGS Elise Barelli, Alain Couvreur
2018/455 (PDF ) On Renyi Entropies and their Applications to Guessing Attacks in Cryptography Serdar Boztas
2018/454 (PDF ) R3C3: Cryptographically secure Censorship Resistant Rendezvous using Cryptocurrencies Mohsen Minaei, Pedro Moreno-Sanchez, Aniket Kate
2018/453 (PDF ) Floppy-Sized Group Signatures from Lattices Cecilia Boschini, Jan Camenisch, Gregory Neven
2018/452 (PDF ) Time-space complexity of quantum search algorithms in symmetric cryptanalysis: applying to AES and SHA-2 Panjin Kim, Daewan Han, Kyung Chul Jeong
2018/451 (PDF ) Tighter Security Proofs for GPV-IBE in the Quantum Random Oracle Model Shuichi Katsumata, Shota Yamada, Takashi Yamakawa
2018/450 (PDF ) From Keys to Databases -- Real-World Applications of Secure Multi-Party Computation David W. Archer, Dan Bogdanov, Liina Kamm, Y. Lindell, Kurt Nielsen, Jakob Illeborg Pagter, Nigel P. Smart, Rebecca N. Wright
2018/449 (PDF ) Key Prediction Security of Keyed Sponges Bart Mennink
2018/448 (PDF ) Non-adaptive Group-Testing Aggregate MAC Scheme Shoichi Hirose, Junji Shikata
2018/447 (PDF ) Improved Distinguisher Search Techniques Based on Parity Sets Xiaofeng Xie, Tian Tian
2018/446 (PDF ) A voting scheme with post-quantum security based on physical laws Hua Dong, Li Yang
2018/445 (PDF ) CRPSF and NTRU Signatures over cyclotomic fields Yang Wang, Mingqiang Wang
2018/444 (PDF ) Founding Cryptography on Smooth Projective Hashing Bing Zeng
2018/443 (PDF ) Quantum Multi-Key Homomorphic Encryption for Polynomial-Sized Circuits Rishab Goyal
2018/442 (PDF ) SecureNN: Efficient and Private Neural Network Training Sameer Wagh, Divya Gupta, Nishanth Chandran
2018/441 (PDF ) Optimal Linear Multiparty Conditional Disclosure of Secrets Protocols Amos Beimel, Naty Peter
2018/440 (PDF ) Formal Analysis of Distance Bounding with Secure Hardware Handan Kılınç, Serge Vaudenay
2018/439 (PDF ) Tight Private Circuits: Achieving Probing Security with the Least Refreshing Sonia Belaïd, Dahmun Goudarzi, Matthieu Rivain
2018/438 (PDF ) Trivially and Efficiently Composing Masked Gadgets with Probe Isolating Non-Interference Gaëtan Cassiers, François-Xavier Standaert
2018/437 (PDF ) Zero-Knowledge Protocols for Search Problems Ben Berger, Zvika Brakerski
2018/436 (PDF ) Crash-tolerant Consensus in Directed Graph Revisited Ashish Choudhury, Gayathri Garimella, Arpita Patra, Divya Ravi, Pratik Sarkar
2018/435 (PDF ) A Treasury System for Cryptocurrencies: Enabling Better Collaborative Intelligence Bingsheng Zhang, Roman Oliynykov, Hamed Balogun
2018/434 (PDF ) Towards Tight Security of Cascaded LRW2 Bart Mennink
2018/433 (PDF ) Achieving Fine-grained Multi-keyword Ranked Search over Encrypted Cloud Data Guowen Xu, Hongwei Li
2018/432 (PDF ) Hidden Shift Quantum Cryptanalysis and Implications Xavier Bonnetain, María Naya-Plasencia
2018/430 (PDF ) A Simplified Approach to Rigorous Degree 2 Elimination in Discrete Logarithm Algorithms Faruk Göloğlu, Antoine Joux
2018/429 (PDF ) Amortized Complexity of Information-Theoretically Secure MPC Revisited Ignacio Cascudo, Ronald Cramer, Chaoping Xing, Chen Yuan
2018/428 (PDF ) Differential Fault Analysis of Rectangle-80 Shobhit Sinha, Sandip Karmakar
2018/427 (PDF ) Secure Boot and Remote Attestation in the Sanctum Processor Ilia Lebedev, Kyle Hogan, Srinivas Devadas
2018/426 (PDF ) Adaptively Secure Proxy Re-encryption Georg Fuchsbauer, Chethan Kamath, Karen Klein, Krzysztof Pietrzak
2018/425 (PDF ) Implementing RLWE-based Schemes Using an RSA Co-Processor Martin R. Albrecht, Christian Hanser, Andrea Hoeller, Thomas Pöppelmann, Fernando Virdia, Andreas Wallner
2018/424 (PDF ) Circumventing Cryptographic Deniability with Remote Attestation Lachlan J. Gunn, Ricardo Vieitez Parra, N. Asokan
2018/423 (PDF ) Yes, There is an Oblivious RAM Lower Bound! Kasper Green Larsen, Jesper Buus Nielsen
2018/422 (PDF ) Message-locked Encryption with File Update Suyash Kandele, Souradyuti Paul
2018/421 (PDF ) TFHE: Fast Fully Homomorphic Encryption over the Torus Ilaria Chillotti, Nicolas Gama, Mariya Georgieva, Malika Izabachène
2018/420 (PDF ) Lattice-based Revocable (Hierarchical) IBE with Decryption Key Exposure Resistance Shuichi Katsumata, Takahiro Matsuda, Atsushi Takayasu
2018/419 (PDF ) Homomorphic Secret Sharing: Optimizations and Applications Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Michele Orrù
2018/418 (PDF ) DAWG: A Defense Against Cache Timing Attacks in Speculative Execution Processors Vladimir Kiriansky, Ilia Lebedev, Saman Amarasinghe, Srinivas Devadas, Joel Emer
2018/417 (PDF ) On the Security of Two-Round Multi-Signatures Manu Drijvers, Kasra Edalatnejad, Bryan Ford, Eike Kiltz, Julian Loss, Gregory Neven, Igors Stepanovs
2018/416 (PDF ) Ledger Design Language: Towards Formal Reasoning and Implementation for Public Ledgers Nadim Kobeissi, Natalia Kulatova
2018/415 (PDF ) Flux: Revisiting Near Blocks for Proof-of-Work Blockchains Alexei Zamyatin, Nicholas Stifter, Philipp Schindler, Edgar Weippl, William J. Knottenbelt
2018/414 (PDF ) Aggregation of Gamma-Signatures and Applications to Bitcoin Yunlei Zhao
2018/413 (PDF ) Scaling Backend Authentication at Facebook Kevin Lewi, Callen Rain, Stephen Weis, Yueting Lee, Haozhi Xiong, Benjamin Yang
2018/412 (PDF ) PRCash: Fast, Private and Regulated Transactions for Digital Currencies Karl Wüst, Kari Kostiainen, Vedran Capkun, Srdjan Capkun
2018/411 (PDF ) Unsupervised Machine Learning on Encrypted Data Angela Jäschke, Frederik Armknecht
2018/410 (PDF ) A Note On Clauser-Horne-Shimony-Holt Inequality Zhengjun Cao, Lihua Liu
2018/409 (PDF ) Laconic Function Evaluation and Applications Willy Quach, Hoeteck Wee, Daniel Wichs
2018/408 (PDF ) Cryptanalyses of Branching Program Obfuscations over GGH13 Multilinear Map from the NTRU Problem Jung Hee Cheon, Minki Hhan, Jiseung Kim, Changmin Lee
2018/407 (PDF ) Goshawk: A Novel Efficient, Robust and Flexible Blockchain Protocol Cencen Wan, Shuyang Tang, Yuncong Zhang, Chen Pan, Zhiqiang Liu, Yu Long, Zhen Liu, Yu Yu
2018/406 (PDF ) “Larger Keys, Less Complexity” A Strategic Proposition Gideon Samid
2018/405 (PDF ) A review of cryptographic properties of S-boxes with Generation and Analysis of crypto secure S-boxes. Sankhanil Dey, Ranjan Ghosh
2018/404 (PDF ) Enforcing ideal-world leakage bounds in real-world secret sharing MPC frameworks José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Hugo Pacheco, Vitor Pereira, Bernardo Portela
2018/403 (PDF ) ABY3: A Mixed Protocol Framework for Machine Learning Payman Mohassel, Peter Rindal
2018/402 (PDF ) Another Look at Relay and Distance-based Attacks in Contactless Payments Ioana Boureanu, Anda Anda
2018/401 (PDF ) Lattice-based Direct Anonymous Attestation (LDAA) Nada EL Kassem, Liqun Chen, Rachid El Bansarkhani, Ali El Kaafarani, Jan Camenisch, Patrick Hough, Paulo Martins, Leonel Sousa
2018/400 (PDF ) Agreement with Satoshi – On the Formalization of Nakamoto Consensus Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Alexei Zamyatin, Edgar Weippl
2018/399 (PDF ) On the Feasibility of an ECDLP Algorithm Sergey Grebnev
2018/398 (PDF ) Fun with Bitcoin smart contracts Massimo Bartoletti, Tiziana Cimoli, Roberto Zunino
2018/397 (PDF ) Cryptanalysis on the HHSS Obfuscation Arising from Absence of Safeguards Jung Hee Cheon, Minki Hhan, Jiseung Kim, Changmin Lee
2018/396 (PDF ) New Bleichenbacher Records: Fault Attacks on qDSA Signatures Akira Takahashi, Mehdi Tibouchi, Masayuki Abe
2018/395 (PDF ) Secure Computation with Constant Communication Overhead using Multiplication Embeddings Alexander R. Block, Hemanta K. Maji, Hai H. Nguyen
2018/394 (PDF ) Almost-Surely Terminating Asynchronous Byzantine Agreement Revisited Laasya Bangalore, Ashish Choudhury, Arpita Patra
2018/393 (PDF ) AN ATTACK ON THE WALNUT DIGITAL SIGNATURE ALGORITHM Matvei Kotov, Anton Menshov, Alexander Ushakov
2018/392 (PDF ) Making AES great again: the forthcoming vectorized AES instruction Nir Drucker, Shay Gueron, Vlad Krasnov
2018/391 (PDF ) Tight Adaptively Secure Broadcast Encryption with Short Ciphertexts and Keys Romain Gay, Lucas Kowalczyk, Hoeteck Wee
2018/390 (PDF ) MILP-based Differential Attack on Round-reduced GIFT Baoyu Zhu, Xiaoyang Dong, Hongbo Yu
2018/389 (PDF ) Distributed SSH Key Management with Proactive RSA Threshold Signatures Yotam Harchol, Ittai Abraham, Benny Pinkas
2018/388 (PDF ) Security Analysis of Fan et al. Lightweight RFID Authentication Protocol for Privacy Protection in IoT Seyed Farhad Aghili, Hamid Mala
2018/387 (PDF ) Efficient Bit-Decomposition and Modulus-Conversion Protocols with an Honest Majority Ryo Kikuchi, Dai Ikarashi, Takahiro Matsuda, Koki Hamada, Koji Chida
2018/386 (PDF ) Certificateless Public Key Signature Schemes from Standard Algorithms Zhaohui Cheng, Liqun Chen
2018/385 (PDF ) Cryptographic Hashing From Strong One-Way Functions Justin Holmgren, Alex Lombardi
2018/383 (PDF ) CSIDH: An Efficient Post-Quantum Commutative Group Action Wouter Castryck, Tanja Lange, Chloe Martindale, Lorenz Panny, Joost Renes
2018/382 (PDF ) Revocable Identity-based Encryption from Codes with Rank Metric Donghoon Chang, Amit Kumar Chauhan, Sandeep Kumar, Somitra Kumar Sanadhya
2018/381 (PDF ) Masking the GLP Lattice-Based Signature Scheme at Any Order Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Benjamin Grégoire, Mélissa Rossi, Mehdi Tibouchi
2018/380 (PDF ) Nearly Linear-Time Zero-Knowledge Proofs for Correct Program Execution Jonathan Bootle, Andrea Cerulli, Jens Groth, Sune Jakobsen, Mary Maller
2018/379 (PDF ) Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT v1.0) Wilson Alberto Torres, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Veronika Kuchta, Nandita Bhattacharjee, Man Ho Au, Jacob Cheng
2018/378 (PDF ) Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability Christian Badertscher, Peter Gazi, Aggelos Kiayias, Alexander Russell, Vassilis Zikas
2018/377 (PDF ) ALGORAND AGREEMENT: Super Fast and Partition Resilient Byzantine Agreement Jing Chen, Sergey Gorbunov, Silvio Micali, Georgios Vlachos
2018/376 (PDF ) Arithmetic Considerations for Isogeny Based Cryptography Joppe W. Bos, Simon Friedberger
2018/375 (PDF ) Witness Indistinguishability for any Single-Round Argument with Applications to Access Control Zvika Brakerski, Yael Tauman Kalai
2018/374 (PDF ) Functional Graphs and Their Applications in Generic Attacks on Iterated Hash Constructions Zhenzhen Bao, Jian Guo, Lei Wang
2018/373 (PDF ) PanORAMa: Oblivious RAM with Logarithmic Overhead Sarvar Patel, Giuseppe Persiano, Mariana Raykova, Kevin Yeo
2018/372 (PDF ) Secure Computation using Leaky Correlations (Asymptotically Optimal Constructions) Alexander R. Block, Divya Gupta, Hemanta K. Maji, Hai H. Nguyen
2018/371 (PDF ) Supersingular isogeny graphs and endomorphism rings: reductions and solutions Kirsten Eisentraeger, Sean Hallgren, Kristin Lauter, Travis Morrison, Christophe Petit
2018/370 (PDF ) Spectral-linear and spectral-differential methods for generating S-boxes having almost optimal cryptographic parameters A. V. Menyachikhin
2018/369 (PDF ) Security Analysis and Modification of ID-Based Encryption with Equality Test from ACISP 2017 Hyung Tae Lee, Huaxiong Wang, Kai Zhang
2018/367 (PDF ) Cache-Timing Attacks on RSA Key Generation Alejandro Cabrera Aldaya, Cesar Pereida García, Luis Manuel Alvarez Tapia, Billy Bob Brumley
2018/366 (PDF ) Directional Distance-Bounding Identification Protocols Ahmad Ahmadi, Reihaneh Safavi-Naini
2018/365 (PDF ) Anonymous Distance-Bounding Identification Ahmad Ahmadi, Reihaneh Safavi-Naini, Mamunur Akand
2018/364 (PDF ) Perfectly Secure Oblivious Parallel RAM T-H. Hubert Chan, Kartik Nayak, Elaine Shi
2018/363 (PDF ) Private Anonymous Data Access Ariel Hamlin, Rafail Ostrovsky, Mor Weiss, Daniel Wichs
2018/362 (PDF ) Backdoored Hash Functions: Immunizing HMAC and HKDF Marc Fischlin, Christian Janson, Sogol Mazaheri
2018/361 (PDF ) Two-message Key Exchange with Strong Security from Ideal Lattices Zheng Yang, Yu Chen, Song Luo
2018/360 (PDF ) GGH15 Beyond Permutation Branching Programs: Proofs, Attacks, and Candidates Yilei Chen, Vinod Vaikuntanathan, Hoeteck Wee
2018/358 (PDF ) Efficient Erasable PUFs from Programmable Logic and Memristors Yansong Gao, Chenglu Jin, Jeeson Kim, Hussein Nili, Xiaolin Xu, Wayne Burleson, Omid Kavehei, Marten van Dijk, Damith C. Ranasinghe, Ulrich Rührmair
2018/357 (PDF ) Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures Christoph Dobraunig, Maria Eichlseder, Hannes Gross, Stefan Mangard, Florian Mendel, Robert Primas
2018/356 (PDF ) In Praise of Twisted Embeddings Jheyne N. Ortiz, Robson R. de Araujo, Diego F. Aranha, Sueli I. R. Costa, Ricardo Dahab
2018/355 (PDF ) Differential Fault Attacks on Deterministic Lattice Signatures Leon Groot Bruinderink, Peter Pessl
2018/354 (PDF ) Start your ENGINEs: dynamically loadable contemporary crypto Nicola Tuveri, Billy B. Brumley
2018/353 (PDF ) Non-Malleable Extractors and Non-Malleable Codes: Partially Optimal Constructions Xin Li
2018/352 (PDF ) Cryptography with Disposable Backdoors Kai-Min Chung, Marios Georgiou, Ching-Yi Lai, Vassilis Zikas
2018/351 (PDF ) A Chosen Plaintext Attack on Offset Public Permutation Mode Miloslav Homer
2018/350 (PDF ) The Interpose PUF: Secure PUF Design against State-of-the-art Machine Learning Attacks Phuong Ha Nguyen, Durga Prasad Sahoo, Chenglu Jin, Kaleel Mahmood, Ulrich Rührmair, Marten van Dijk
2018/349 (PDF ) An Analysis of the NIST SP 800-90A Standard Joanne Woodage, Dan Shumow
2018/348 (PDF ) Monero Ring Attack: Recreating Zero Mixin Transaction Effect Dimaz Ankaa Wijaya, Joseph Liu, Ron Steinfeld, Dongxi Liu
2018/347 (PDF ) 3PC ORAM with Low Latency, Low Bandwidth, and Fast Batch Retrieval Stanislaw Jarecki, Boyang Wei
2018/346 (PDF ) Collusion Resistant Traitor Tracing from Learning with Errors Rishab Goyal, Venkata Koppula, Brent Waters
2018/345 (PDF ) In-region Authentication Mamunur Rashid Akand, Reihaneh Safavi-Naini
2018/344 (PDF ) Nothing Refreshes Like a RePSI: Reactive Private Set Intersection Andrea Cerulli, Emiliano De Cristofaro, Claudio Soriente
2018/343 (PDF ) Flexible Signatures: Towards Making Authentication Suitable for Real-Time Environments Duc Viet Le, Mahimna Kelkar, Aniket Kate
2018/342 (PDF ) MergeMAC: A MAC for Authentication with Strict Time Constraints and Limited Bandwidth Ralph Ankele, Florian Böhl, Simon Friedberger
2018/341 (PDF ) Comparison of Cost of Protection Against Differential Power Analysis of Selected Authenticated Ciphers William Diehl, Abubakr Abdulgadir, Farnoud Farahmand, Jens-Peter Kaps, Kris Gaj
2018/340 (PDF ) Delegatable Attribute-based Anonymous Credentials from Dynamically Malleable Signatures Johannes Blömer, Jan Bobolz
2018/339 (PDF ) Two attacks on rank metric code-based schemes: RankSign and an Identity-Based-Encryption scheme Thomas Debris-Alazard, Jean-Pierre Tillich
2018/338 (PDF ) Quantum FHE (Almost) As Secure As Classical Zvika Brakerski
2018/337 (PDF ) Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent Marc Fischlin, Patrick Harasser
2018/336 (PDF ) SoK: The Problem Landscape of SIDH David Urbanik, David Jao
2018/335 (PDF ) Fast modular squaring with AVX512IFMA Nir Drucker, Shay Gueron
2018/334 (PDF ) Impossible Differential Attack on QARMA Family of Block Ciphers Dong Yang, Wen-feng Qi, Hua-jin Chen
2018/333 (PDF ) Breaking the Circuit-Size Barrier in Secret Sharing Tianren Liu, Vinod Vaikuntanathan
2018/332 (PDF ) Differential Cryptanalysis of Round-Reduced Sparx-64/128 Ralph Ankele, Eik List
2018/331 (PDF ) Estimate all the {LWE, NTRU} schemes! Martin R. Albrecht, Benjamin R. Curtis, Amit Deo, Alex Davidson, Rachel Player, Eamonn W. Postlethwaite, Fernando Virdia, Thomas Wunderer
2018/330 (PDF ) Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List Joseph K. Liu, Tsz Hon Yuen, Peng Zhang, Kaitai Liang
2018/329 (PDF ) Symbolic Side-Channel Analysis for Probabilistic Programs Pasquale Malacaria, MHR. Khouzani, Corina S. Păsăreanu, Quoc-Sang Phan, Kasper Luckow
2018/328 (PDF ) Improved High-Order Conversion From Boolean to Arithmetic Masking Luk Bettale, Jean-Sebastien Coron, Rina Zeitoun
2018/327 (PDF ) A Note On Groth-Ostrovsky-Sahai Non-Interactive Zero-Knowledge Proof System Zhengjun Cao, Lihua Liu
2018/325 (PDF ) Multi-power Post-quantum RSA John M. Schanck
2018/324 (PDF ) ACPC: Efficient revocation of pseudonym certificates using activation codes Marcos A. Simplicio Jr., Eduardo Lopes Cominetti, Harsh Kupwade Patil, Jefferson E. Ricardini, Marcos Vinicius M. Silva
2018/323 (PDF ) PPAD: Privacy Preserving Group-Based ADvertising in Online Social Networks Sanaz Taheri Boshrooyeh, Alptekin Küpçü, Öznur Özkasap
2018/322 (PDF ) DeepMarks: A Digital Fingerprinting Framework for Deep Neural Networks Huili Chen, Bita Darvish Rohani, Farinaz Koushanfar
2018/321 (PDF ) Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications David Derler, Stephan Krenn, Thomas Lorünser, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks
2018/320 (PDF ) General State Channel Networks Stefan Dziembowski, Sebastian Faust, Kristina Hostáková
2018/319 (PDF ) HydRand: Practical Continuous Distributed Randomness Philipp Schindler, Aljosha Judmayer, Nicholas Stifter, Edgar Weippl
2018/318 (PDF ) Practical attacks against the Walnut digital signature scheme Ward Beullens, Simon R. Blackburn
2018/317 (PDF ) Sliding-Window Correlation Attacks Against Encryption Devices with an Unstable Clock Dor Fledel, Avishai Wool
2018/316 (PDF ) Non-Malleable Secret Sharing Vipul Goyal, Ashutosh Kumar
2018/315 (PDF ) Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison Dahmun Goudarzi, Anthony Journault, Matthieu Rivain, François-Xavier Standaert
2018/314 (PDF ) Secure top most significant genome variants search: iDASH 2017 competition Sergiu Carpov, Thibaud Tortech
2018/313 (PDF ) On the cost of computing isogenies between supersingular elliptic curves Gora Adj, Daniel Cervantes-Vázquez, Jesús-Javier Chi-Domínguez, Alfred Menezes, Francisco Rodríguez-Henríquez
2018/312 (PDF ) Multilinear maps via secret ring Chunsheng Gu
2018/311 (PDF ) DeepSigns: A Generic Watermarking Framework for Protecting the Ownership of Deep Learning Models Bita Darvish Rouhani, Huili Chen, farinaz Koushanfar
2018/310 (PDF ) Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017 Yasufumi Hashimoto, Yasuhiko Ikematsu, Tsuyoshi Takagi
2018/308 (PDF ) On perfectly secure 2PC in the OT-hybrid model Bar Alon, Anat Paskin-Cherniavsky
2018/307 (PDF ) Isolated Curves and the MOV Attack Travis Scholl
2018/306 (PDF ) State Separation for Code-Based Game-Playing Proofs Chris Brzuska, Antoine Delignat-Lavaud, Cedric Fournet, Konrad Kohbrok, Markulf Kohlweiss
2018/305 (PDF ) Efficient four-dimensional GLV curve with high security Olivier Bernard, Renaud Dubois, Simon Masson
2018/304 (PDF ) Geosocial Query with User-Controlled Privacy Peizhao Hu, Sherman S. M. Chow, Asma Aloufi
2018/303 (PDF ) 21 - Bringing Down the Complexity: Fast Composable Protocols for Card Games Without Secret State Bernardo David, Rafael Dowsley, Mario Larangeira
2018/302 (PDF ) Rethinking Large-Scale Consensus Rafael Pass, Elaine Shi
2018/301 (PDF ) On the Ineffectiveness of Internal Encodings - Revisiting the DCA Attack on White-Box Cryptography Estuardo Alpirez Bock, Chris Brzuska, Wil Michiels, Alexander Treff
2018/300 (PDF ) Outsourcing Modular Exponentiation in Cryptographic Web Applications Pascal Mainini, Rolf Haenni
2018/299 (PDF ) Clusters of Re-used Keys Stephen Farrell
2018/298 (PDF ) In search of CurveSwap: Measuring elliptic curve implementations in the wild Luke Valenta, Nick Sullivan, Antonio Sanso, Nadia Heninger
2018/297 (PDF ) Fine-Grained Secure Computation Matteo Campanelli, Rosario Gennaro
2018/296 (PDF ) Asynchronous ratcheted key exchange Bertram Poettering, Paul Rösler
2018/295 (PDF ) ExpFault: An Automated Framework for Exploitable Fault Characterization in Block Ciphers (Revised Version) Sayandeep Saha, Debdeep Mukhopadhyay, Pallab Dasgupta
2018/294 (PDF ) Learning strikes again: the case of the DRS signature scheme Léo Ducas, Yang Yu
2018/293 (PDF ) Privacy Amplification from Non-malleable Codes Eshan Chattopadhyay, Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar
2018/292 (PDF ) Linear Biases in AEGIS Keystream Brice Minaud
2018/291 (PDF ) Simulations of Optical Emissions for Attacking AES and Masked AES Guido Marco Bertoni, Lorenzo Grassi, Filippo Melzani
2018/290 (PDF ) Direct Anonymous Attestation with Efficient Verifier-Local Revocation for Subscription System Vireshwar Kumar, He Li, Noah Luther, Pranav Asokan, Jung-Min (Jerry) Park, Kaigui Bian, Martin B. H. Weiss, Taieb Znati
2018/289 (PDF ) Secure and Scalable Document Similarity on Distributed Databases: Differential Privacy to the Rescue Phillipp Schoppmann, Lennart Vogelsang, Adrià Gascón, Borja Balle
2018/288 (PDF ) Constant Size Traceable Ring Signature Scheme without Random Oracles Ke Gu, Na Wu
2018/287 (PDF ) Secure Cloud Storage Scheme Based On Hybrid Cryptosystem Atanu Basu, Indranil Sengupta
2018/286 (PDF ) AuCPace: Efficient verifier-based PAKE protocol tailored for the IIoT Björn Haase, Benoît Labrique
2018/285 (PDF ) Collateral Damage of Facebook Applications: a Comprehensive Study Iraklis Symeonidis, Gergely Biczók, Fatemeh Shirazi, Cristina Pérez-Solà, Jessica Schroers, Bart Preneel
2018/284 (PDF ) Hadamard Matrices, $d$-Linearly Independent Sets and Correlation-Immune Boolean Functions with Minimum Hamming Weights Qichun Wang
2018/283 (PDF ) Homomorphic Rank Sort Using Surrogate Polynomials Gizem S. Çetin, Berk Sunar
2018/282 (PDF ) Modeling Quantum-Safe Authenticated Key Establishment, and an Isogeny-Based Protocol Jason LeGrow, David Jao, Reza Azarderakhsh
2018/281 (PDF ) Upgrading to Functional Encryption Saikrishna Badrinarayanan, Dakshita Khurana, Amit Sahai, Brent Waters
2018/280 (PDF ) Updatable and Universal Common Reference Strings with Applications to zk-SNARKs Jens Groth, Markulf Kohlweiss, Mary Maller, Sarah Meiklejohn, Ian Miers
2018/279 (PDF ) Worst-Case Hardness for LPN and Cryptographic Hashing via Code Smoothing Zvika Brakerski, Vadim Lyubashevsky, Vinod Vaikuntanathan, Daniel Wichs
2018/278 (PDF ) Mixed-radix Naccache-Stern encryption Rémi Géraud, David Naccache
2018/277 (PDF ) Approximate and Probabilistic Differential Privacy Definitions Sebastian Meiser
2018/276 (PDF ) How to Record Quantum Queries, and Applications to Quantum Indifferentiability Mark Zhandry
2018/275 (PDF ) Lattice-Based zk-SNARKs from Square Span Programs Rosario Gennaro, Michele Minelli, Anca Nitulescu, Michele Orrù
2018/274 (PDF ) G-Merkle: A Hash-Based Group Signature Scheme From Standard Assumptions Rachid El Bansarkhani, Rafael Misoczki
2018/273 (PDF ) Towards Attribute-Based Encryption for RAMs from LWE: Sub-linear Decryption, and More Prabhanjan Ananth, Xiong Fan, Elaine Shi
2018/272 (PDF ) Multi-Theorem Preprocessing NIZKs from Lattices Sam Kim, David J. Wu
2018/271 (PDF ) MathCoin: A Blockchain Proposal that Helps Verify Mathematical Theorems In Public Borching Su
2018/270 (PDF ) A Brief Retrospective Look at the Cayley-Purser Public-key Cryptosystem, 19 Years Later Douglas R. Stinson
2018/269 (PDF ) Vault: Fast Bootstrapping for the Algorand Cryptocurrency Derek Leung, Adam Suhl, Yossi Gilad, Nickolai Zeldovich
2018/268 (PDF ) Perfectly Secure Oblivious RAM with Sublinear Bandwidth Overhead Michael Raskin, Mark Simkin
2018/267 (PDF ) A Note on Post-Quantum Authenticated Key Exchange from Supersingular Isogenies Patrick Longa
2018/266 (PDF ) Authenticated key exchange for SIDH Steven D. Galbraith
2018/265 (PDF ) Compact, Scalable, and Efficient Discrete Gaussian Samplers for Lattice-Based Cryptography Ayesha Khalid, James Howe, Ciara Rafferty, Francesco Regazzoni, Maire O’Neill
2018/264 (PDF ) Security proof for Quantum Key Recycling with noise Daan Leermakers, Boris Skoric
2018/262 (PDF ) Chimeric Ledgers: Translating and Unifying UTXO-based and Account-based Cryptocurrencies Joachim Zahnentferner
2018/261 (PDF ) Post-Quantum EPID Signatures from Symmetric Primitives Dan Boneh, Saba Eskandarian, Ben Fisch
2018/260 (PDF ) MDS Matrices with Lightweight Circuits Sébastien Duval, Gaëtan Leurent
2018/259 (PDF ) The Death and Rebirth of Privacy-Preserving WiFi Fingerprint Localization with Paillier Encryption Zheng Yang, Kimmo Järvinen
2018/258 (PDF ) Fault Analysis of the KTANTAN Family of Block Ciphers: A Revisited Work of Fault Analysis of the KATAN Family of Block Ciphers Alya Geogiana Buja, Shekh Faisal Abdul-Latip, Rabiah Ahmad
2018/257 (PDF ) On Quantum Indifferentiability Tore Vincent Carstens, Ehsan Ebrahimi, Gelo Noel Tabia, Dominique Unruh
2018/256 (PDF ) QC-MDPC: A Timing Attack and a CCA2 KEM Edward Eaton, Matthieu Lequesne, Alex Parent, Nicolas Sendrier
2018/255 (PDF ) Topology-Hiding Computation Beyond Semi-Honest Adversaries Rio LaVigne, Chen-Da Liu-Zhang, Ueli Maurer, Tal Moran, Marta Mularczyk, Daniel Tschudi
2018/254 (PDF ) Logistic Regression Model Training based on the Approximate Homomorphic Encryption Andrey Kim, Yongsoo Song, Miran Kim, Keewoo Lee, Jung Hee Cheon
2018/253 (PDF ) Capsule: A Protocol for Secure Collaborative Document Editing Nadim Kobeissi
2018/252 (PDF ) The Limit of Blockchains: Infeasibility of a Smart Obama-Trump Contract Yongge Wang, Qutaibah m. Malluhi
2018/251 (PDF ) VeritasDB: High Throughput Key-Value Store with Integrity Rohit Sinha, Mihai Christodorescu
2018/250 (PDF ) Making Public Key Functional Encryption Function Private, Distributively Xiong Fan, Qiang Tang
2018/249 (PDF ) Analysis of Deutsch-Jozsa Quantum Algorithm Zhengjun Cao, Lihua Liu
2018/248 (PDF ) Stake-Bleeding Attacks on Proof-of-Stake Blockchains Peter Gaži, Aggelos Kiayias, Alexander Russell
2018/247 (PDF ) Hardware-Supported ORAM in Effect: Practical Oblivious Search and Update on Very Large Dataset Thang Hoang, Muslum Ozgur Ozmen, Yeongjin Jang, Attila A. Yavuz
2018/246 (PDF ) Universally Verifiable MPC with Applications to IRV Ballot Counting Chris Culnane, Olivier Pereira, Kim Ramchen, Vanessa Teague
2018/245 (PDF ) Secure Search via Multi-Ring Fully Homomorphic Encryption Adi Akavia, Dan Feldman, Hayim Shaul
2018/244 (PDF ) Faster Homomorphic Linear Transformations in HElib Shai Halevi, Victor Shoup
2018/243 (PDF ) A New Approach to Deanonymization of Unreachable Bitcoin Nodes Indra Deep Mastan, Souradyuti Paul
2018/242 (PDF ) A New Constant-size Accountable Ring Signature Scheme Without Random Oracles Sudhakar Kumawat, Souradyuti Paul
2018/241 (PDF ) zkLedger: Privacy-Preserving Auditing for Distributed Ledgers Neha Narula, Willy Vasquez, Madars Virza
2018/240 (PDF ) Towards Non-Interactive Zero-Knowledge for NP from LWE Ron D. Rothblum, Adam Sealfon, Katerina Sotiraki
2018/239 (PDF ) RepuCoin: Your Reputation is Your Power Jiangshan Yu, David Kozhaya, Jeremie Decouchant, Paulo Esteves-Verissimo
2018/238 (PDF ) Private Set Intersection with Linear Communication from General Assumptions Brett Hemenway Falk, Daniel Noble, Rafail Ostrovsky
2018/237 (PDF ) On Tightly Secure Non-Interactive Key Exchange Julia Hesse, Dennis Hofheinz, Lisa Kohl
2018/236 (PDF ) Low-Resource Eclipse Attacks on Ethereum's Peer-to-Peer Network Yuval Marcus, Ethan Heilman, Sharon Goldberg
2018/235 (PDF ) Combining Asynchronous and Synchronous Byzantine Agreement: The Best of Both Worlds Julian Loss, Tal Moran
2018/234 (PDF ) P2KMV: A Privacy-preserving Counting Sketch for Efficient and Accurate Set Intersection Cardinality Estimations Hagen Sparka, Florian Tschorsch, Björn Scheuermann
2018/233 (PDF ) Privacy-Preserving Logistic Regression Training Charlotte Bonte, Frederik Vercauteren
2018/232 (PDF ) Improved fully homomorphic public-key encryption with small ciphertext size Masahiro Yagisawa
2018/231 (PDF ) Remarks on Bell's Inequality Zhengjun Cao, Lihua Liu
2018/230 (PDF ) Saber: Module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM Jan-Pieter D’Anvers, Angshuman Karmakar, Sujoy Sinha Roy, Frederik Vercauteren
2018/229 (PDF ) Optimizing polynomial convolution for NTRUEncrypt Wei Dai, William Whyte, Zhenfei Zhang
2018/228 (PDF ) Non-interactive zaps of knowledge Georg Fuchsbauer, Michele Orrù
2018/227 (PDF ) Can We Overcome the $n \log n$ Barrier for Oblivious Sorting? Wei-Kai Lin, Elaine Shi, Tiancheng Xie
2018/226 (PDF ) Non-Uniform Bounds in the Random-Permutation, Ideal-Cipher, and Generic-Group Models Sandro Coretti, Yevgeniy Dodis, Siyao Guo
2018/225 (PDF ) A foundation for secret, verifiable elections Ben Smyth
2018/224 (PDF ) Threshold Properties of Prime Power Subgroups with Application to Secure Integer Comparisons Rhys Carlton, Aleksander Essex, Krzysztof Kapulkin
2018/223 (PDF ) Shorter double-authentication preventing signatures for small address spaces Bertram Poettering
2018/222 (PDF ) Authentication with weaker trust assumptions for voting systems Elizabeth A. Quaglia, Ben Smyth
2018/221 (PDF ) Bandwidth-Hard Functions: Reductions and Lower Bounds Jeremiah Blocki, Peiyuan Liu, Ling Ren, Samson Zhou
2018/220 (PDF ) PRO-ORAM: Constant Latency Read-Only Oblivious RAM Shruti Tople, Yaoqi Jia, Prateek Saxena
2018/219 (PDF ) On Side-Channel Vulnerabilities of Bit Permutations: Key Recovery and Reverse Engineering Jakub Breier, Dirmanto Jap, Xiaolu Hou, Shivam Bhasin
2018/218 (PDF ) On Evaluating Fault Resilient Encoding Schemes in Software Jakub Breier, Xiaolu Hou, Yang Liu
2018/217 (PDF ) Defending Against Key Exfiltration: Efficiency Improvements for Big-Key Cryptography via Large-Alphabet Subkey Prediction Mihir Bellare, Wei Dai
2018/216 (PDF ) Secure Computation with Low Communication from Cross-checking S. Dov Gordon, Samuel Ranellucci, Xiao Wang
2018/215 (PDF ) Towards everlasting privacy and efficient coercion resistance in remote electronic voting Panagiotis Grontas, Aris Pagourtzis, Alexandros Zacharakis, Bingsheng Zhang
2018/214 (PDF ) RMAC -- A Lightweight Authentication Protocol for Highly Constrained IoT Devices Ahmad Khoureich Ka
2018/213 (PDF ) Committing to Quantum Resistance: A Slow Defence for Bitcoin against a Fast Quantum Computing Attack I. Stewart, D. Ilie, A. Zamyatin, S. Werner, M. F. Torshizi, W. J. Knottenbelt
2018/212 (PDF ) How to Subvert Backdoored Encryption: Security Against Adversaries that Decrypt All Ciphertexts Thibaut Horel, Sunoo Park, Silas Richelson, Vinod Vaikuntanathan
2018/211 (PDF ) Number "Not Used" Once - Practical fault attack on pqm4 implementations of NIST candidates Prasanna Ravi, Debapriya Basu Roy, Shivam Bhasin, Anupam Chattopadhyay, Debdeep Mukhopadhyay
2018/210 (PDF ) A Simple Obfuscation Scheme for Pattern-Matching with Wildcards Allison Bishop, Lucas Kowalczyk, Tal Malkin, Valerio Pastro, Mariana Raykova, Kevin Shi
2018/209 (PDF ) CALYPSO: Private Data Management for Decentralized Ledgers Eleftherios Kokoris-Kogias, Enis Ceyhun Alp, Linus Gasser, Philipp Jovanovic, Ewa Syta, Bryan Ford
2018/208 (PDF ) TinyKeys: A New Approach to Efficient Multi-Party Computation Carmit Hazay, Emmanuela Orsini, Peter Scholl, Eduardo Soria-Vazquez
2018/207 (PDF ) Non-Malleable Codes for Small-Depth Circuits Marshall Ball, Dana Dachman-Soled, Siyao Guo, Tal Malkin, Li-Yang Tan
2018/206 (PDF ) Reading in the Dark: Classifying Encrypted Digits with Functional Encryption Edouard Dufour-Sans, Romain Gay, David Pointcheval
2018/205 (PDF ) Static-Memory-Hard Functions, and Modeling the Cost of Space vs. Time Thaddeus Dryja, Quanquan C. Liu, Sunoo Park
2018/204 (PDF ) Short Non-Malleable Codes from Related-Key Secure Block Ciphers Serge Fehr, Pierre Karpman, Bart Mennink
2018/203 (PDF ) Impeccable Circuits Anita Aghaie, Amir Moradi, Shahram Rasoolzadeh, Aein Rezaei Shahmirzadi, Falk Schellenberg, Tobias Schneider
2018/202 (PDF ) Doing Real Work with FHE: The Case of Logistic Regression Jack L. H. Crawford, Craig Gentry, Shai Halevi, Daniel Platt, Victor Shoup
2018/201 (PDF ) Efficient Parallel Binary Operations on Homomorphic Encrypted Real Numbers Jim Basilakis, Bahman Javadi
2018/200 (PDF ) Hermes. A framework for cryptographically assured access control and data security Eugene Pilyankevich, Ignat Korchagin, Andrey Mnatsakanov
2018/199 (PDF ) Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange David Derler, Kai Gellert, Tibor Jager, Daniel Slamanig, Christoph Striecks
2018/198 (PDF ) A Key-recovery Attack on 855-round Trivium Ximing Fu, Xiaoyun Wang, Xiaoyang Dong, Willi Meier
2018/197 (PDF ) Green Mining: toward a less energetic impact of cryptocurrencies Philippe Jacquet, Bernard Mans
2018/196 (PDF ) Non-Profiled Deep Learning-Based Side-Channel Attacks Benjamin Timon
2018/195 (PDF ) Breach-Resistant Structured Encryption Ghous Amjad, Seny Kamara, Tarik Moataz
2018/194 (PDF ) Proofs of Catalytic Space Krzysztof Pietrzak
2018/193 (PDF ) A New Family of Pairing-Friendly elliptic curves Michael Scott, Aurore Guillevic
2018/192 (PDF ) SoK: unraveling Bitcoin smart contracts Nicola Atzei, Massimo Bartoletti, Tiziana Cimoli, Stefano Lande, Roberto Zunino
2018/191 (PDF ) Signatures with Flexible Public Key: Introducing Equivalence Classes for Public Keys Michael Backes, Lucjan Hanzlik, Kamil Kluczniak, Jonas Schneider
2018/190 (PDF ) New Lower Bounds on Predicate Entropy for Function Private Public-Key Predicate Encryption Sikhar Patranabis, Debdeep Mukhopadhyay
2018/189 (PDF ) Threshold Implementation in Software - Case Study of PRESENT Pascal Sasdrich, René Bock, Amir Moradi
2018/188 (PDF ) Kissing numbers and transference theorems from generalized tail bounds Stephen D. Miller, Noah Stephens-Davidowitz
2018/187 (PDF ) Making Groth's zk-SNARK Simulation Extractable in the Random Oracle Model Sean Bowe, Ariel Gabizon
2018/186 (PDF ) RKHD ElGamal signing and 1-way sums Daniel R. L. Brown
2018/185 (PDF ) A privacy-preserving method for temporarily linking/revoking pseudonym certificates in vehicular networks Marcos A. Simplicio Jr., Eduardo Lopes Cominetti, Harsh Kupwade Patil, Jefferson E. Ricardini, Leonardo T. D. Ferraz, Marcos Vinicius M. Silva
2018/184 (PDF ) Can you find the one for me? Privacy-Preserving Matchmaking via Threshold PSI Yongjun Zhao, Sherman S. M. Chow
2018/183 (PDF ) Simple Proofs of Sequential Work Bram Cohen, Krzysztof Pietrzak
2018/182 (PDF ) Truncated Differential Properties of the Diagonal Set of Inputs for 5-round AES Lorenzo Grassi, Christian Rechberger
2018/181 (PDF ) Rasta: A cipher with low ANDdepth and few ANDs per bit Christoph Dobraunig, Maria Eichlseder, Lorenzo Grassi, Virginie Lallemand, Gregor Leander, Eik List, Florian Mendel, Christian Rechberger
2018/180 (PDF ) Two-Round Multiparty Secure Computation Minimizing Public Key Operations Sanjam Garg, Peihan Miao, Akshayaram Srinivasan
2018/179 (PDF ) Efficient and Constant-Rounds Secure Comparison through Dynamic Groups and Asymmetric Computations Ken Goss, Wei Jiang
2018/177 (PDF ) On the Use of Independent Component Analysis to Denoise Side-Channel Measurements Houssem Maghrebi, Emmanuel Prouff
2018/176 (PDF ) Fine-Tuning Decentralized Anonymous Payment Systems based on Arguments for Arithmetic Circuit Satisfiability Kamil Kluczniak, Man Ho Au
2018/175 (PDF ) Scalable Key Rank Estimation (and Key Enumeration) Algorithm for Large Keys Vincent Grosso
2018/174 (PDF ) A New Framework for Finding Nonlinear Superpolies in Cube Attacks against Trivium-Like Ciphers Chen-Dong Ye, Tian Tian
2018/173 (PDF ) Vectorizing Higher-Order Masking Benjamin Grégoire, Kostas Papagiannopoulos, Peter Schwabe, Ko Stoffelen
2018/172 (PDF ) A First-Order SCA Resistant AES without Fresh Randomness Felix Wegener, Amir Moradi
2018/171 (PDF ) On the Complexity of Simulating Auxiliary Input Yi-Hsiu Chen, Kai-Min Chung, Jyun-Jie Liao
2018/170 (PDF ) On the Ring-LWE and Polynomial-LWE problems Miruna Rosca, Damien Stehlé, Alexandre Wallet
2018/169 (PDF ) Full Indifferentiable Security of the Xor of Two or More Random Permutations Using the $\chi^2$ Method Srimanta Bhattacharya, Mridul Nandi
2018/168 (PDF ) Statistical Witness Indistinguishability (and more) in Two Messages Yael Tauman Kalai, Dakshita Khurana, Amit Sahai
2018/167 (PDF ) On the Existence of Three Round Zero-Knowledge Proofs Nils Fleischhacker, Vipul Goyal, Abhishek Jain
2018/166 (PDF ) Optimal Forgeries Against Polynomial-Based MACs and GCM Atul Luykx, Bart Preneel
2018/165 (PDF ) The Wonderful World of Global Random Oracles Jan Camenisch, Manu Drijvers, Tommaso Gagliardoni, Anja Lehmann, Gregory Neven
2018/164 (PDF ) An Efficiency-Preserving Transformation from Honest-Verifier Statistical Zero-Knowledge to Statistical Zero-Knowledge Pavel Hubáček, Alon Rosen, Margarita Vald
2018/163 (PDF ) OPAQUE: An Asymmetric PAKE Protocol Secure Against Pre-Computation Attacks Stanislaw Jarecki, Hugo Krawczyk, Jiayu Xu
2018/162 (PDF ) Untagging Tor: A Formal Treatment of Onion Encryption Jean Paul Degabriele, Martijn Stam
2018/161 (PDF ) Boomerang Connectivity Table: A New Cryptanalysis Tool Carlos Cid, Tao Huang, Thomas Peyrin, Yu Sasaki, Ling Song
2018/160 (PDF ) DelegaTEE: Brokered Delegation Using Trusted Execution Environments Sinisa Matetic, Moritz Schneider, Andrew Miller, Ari Juels, Srdjan Capkun
2018/159 (PDF ) The Missing Difference Problem, and its Applications to Counter Mode Encryption Gaëtan Leurent, Ferdinand Sibleyras
2018/158 (PDF ) Correlation Cube Attacks: From Weak-Key Distinguisher to Key Recovery Meicheng Liu, Jingchun Yang, Wenhao Wang, Dongdai Lin
2018/157 (PDF ) ROYALE: A Framework for Universally Composable Card Games with Financial Rewards and Penalties Enforcement Bernardo David, Rafael Dowsley, Mario Larangeira
2018/156 (PDF ) A New Approach to Black-Box Concurrent Secure Computation Sanjam Garg, Susumu Kiyoshima, Omkant Pandey
2018/155 (PDF ) Memory Lower Bounds of Reductions Revisited Yuyu Wang, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
2018/154 (PDF ) Constrained PRFs for NC1 in Traditional Groups Nuttapong Attrapadung, Takahiro Matsuda, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
2018/153 (PDF ) Bootstrapping for Approximate Homomorphic Encryption Jung Hee Cheon, Kyoohyung Han, Andrey Kim, Miran Kim, Yongsoo Song
2018/152 (PDF ) A General Framework for the Related-key Linear Attack against Block Ciphers with Linear Key Schedules Jung-Keun Lee, Bonwook Koo, Woo-Hwan Kim
2018/151 (PDF ) Adaptively Secure Garbling with Near Optimal Online Complexity Sanjam Garg, Akshayaram Srinivasan
2018/150 (PDF ) Analysis of Error-Correcting Codes for Lattice-Based Key Exchange Tim Fritzmann, Thomas Pöppelmann, Johanna Sepulveda
2018/149 (PDF ) Another Step Towards Realizing Random Oracles: Non-Malleable Point Obfuscation Ilan Komargodski, Eylon Yogev
2018/148 (PDF ) The Complexity of Multiparty PSM Protocols and Related Models Amos Beimel, Eyal Kushilevitz, Pnina Nissim
2018/147 (PDF ) Sustained Space Complexity Joel Alwen, Jeremiah Blocki, Krzysztof Pietrzak
2018/146 (PDF ) Polynomial Time Bounded Distance Decoding near Minkowski’s Bound in Discrete Logarithm Lattices Léo Ducas, Cécile Pierrot
2018/145 (PDF ) Fast Near Collision Attack on the Grain v1 Stream Cipher Bin Zhang, Chao Xu, Willi Meier
2018/144 (PDF ) The Communication Complexity of Private Simultaneous Messages, Revisited Benny Applebaum, Thomas Holenstein, Manoj Mishra, Ofer Shayevitz
2018/143 (PDF ) Conjecturally Superpolynomial Lower Bound for Share Size Shahram Khazaei
2018/142 (PDF ) MILP-Aided Related-Tweak/Key Impossible Differential Attack and Its applications to QARMA, Joltik-BC Rui Zong, Xiaoyang Dong
2018/141 (PDF ) Symbolic security of garbled circuits Baiyu Li, Daniele Micciancio
2018/140 (PDF ) A Reaction Attack on LEDApkc Tomas Fabsic, Viliam Hromada, Pavol Zajac
2018/138 (PDF ) But Why does it Work? A Rational Protocol Design Treatment of Bitcoin Christian Badertscher, Juan Garay, Ueli Maurer, Daniel Tschudi, Vassilis Zikas
2018/137 (PDF ) Naor-Reingold Goes Public: The Complexity of Known-key Security Pratik Soni, Stefano Tessaro
2018/136 (PDF ) Revisiting AES-GCM-SIV: Multi-user Security, Faster Key Derivation, and Better Bounds Priyanka Bose, Viet Tung Hoang, Stefano Tessaro
2018/135 (PDF ) A note on the equivalence of IND-CCA & INT-PTXT and IND-CCA & INT-CTXT Daniel Jost, Christian Badertscher, Fabio Banfi
2018/134 (PDF ) A Las Vegas algorithm to solve the elliptic curve discrete logarithm problem Ayan Mahalanobis, Vivek Mallick
2018/133 (PDF ) Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs Dan Boneh, Yuval Ishai, Amit Sahai, David J. Wu
2018/132 (PDF ) On Isogeny Graphs of Supersingular Elliptic Curves over Finite Fields Gora Adj, Omran Ahmadi, Alfred Menezes
2018/131 (PDF ) Fiat-Shamir and Correlation Intractability from Strong KDM-Secure Encryption Ran Canetti, Yilei Chen, Leonid Reyzin, Ron D. Rothblum
2018/130 (PDF ) SMT-based Cube Attack on Simeck32/64 Mojtaba Zaheri, Babak Sadeghiyan
2018/129 (PDF ) Multi-mode Cryptocurrency Systems Tuyet Duong, Alexander Chepurnoy, Hong-Sheng Zhou
2018/128 (PDF ) Authenticated Encryption Mode IAPM using SHA-3's Public Random Permutation Charanjit S. Jutla
2018/127 (PDF ) Accountability in Security Protocols Robert Künnemann, Deepak Garg, Michael Backes
2018/126 (PDF ) Onion-AE: Foundations of Nested Encryption Phillip Rogaway, Yusi Zhang
2018/125 (PDF ) Challenges in cyber security - Ransomware Phenomenon Pasca Vlad-Raul, Simion Emil
2018/124 (PDF ) Evaluating the indistinguishability of the XTS mode in the proposed security model Nguyen Tuan Anh, Nguyen Bui Cuong
2018/123 (PDF ) Distributed Time-Memory Tradeoff Attacks on Ciphers (with Application to Stream Ciphers and Counter Mode) Howard M. Heys
2018/122 (PDF ) BitML: A Calculus for Bitcoin Smart Contracts Massimo Bartoletti, Roberto Zunino
2018/121 (PDF ) ECC mod 8^91+5 Daniel R. L. Brown
2018/120 (PDF ) Efficient Circuit-based PSI via Cuckoo Hashing Benny Pinkas, Thomas Schneider, Christian Weinert, Udi Wieder
2018/119 (PDF ) Drive-by Key-Extraction Cache Attacks from Portable Code Daniel Genkin, Lev Pachmanov, Eran Tromer, Yuval Yarom
2018/118 (PDF ) Updatable Encryption with Post-Compromise Security Anja Lehmann, Bjoern Tackmann
2018/117 (PDF ) An Improved RNS Variant of the BFV Homomorphic Encryption Scheme Shai Halevi, Yuriy Polyakov, Victor Shoup
2018/116 (PDF ) Unbounded ABE via Bilinear Entropy Expansion, Revisited Jie Chen, Junqing Gong, Lucas Kowalczyk, Hoeteck Wee
2018/115 (PDF ) An Improved Affine Equivalence Algorithm for Random Permutations Itai Dinur
2018/114 (PDF ) Offline Assisted Group Key Exchange Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Yao Jiang
2018/113 (PDF ) Classification of Balanced Quadratic Functions Lauren De Meyer, Begül Bilgin
2018/112 (PDF ) Just in Time Hashing Benjamin Harsha, Jeremiah Blocki
2018/111 (PDF ) MRHS Solver Based on Linear Algebra and Exhaustive Search Håvard Raddum, Pavol Zajac
2018/110 (PDF ) Rank Analysis of Cubic Multivariate Cryptosystems John Baena, Daniel Cabarcas, Daniel Escudero, Karan Khathuria, Javier Verbel
2018/109 (PDF ) NTRU-LPR IND-CPA: A New Ideal Lattices-based Scheme Soda Diop, Bernard Ousmane Sané, Nafissatou Diarra, Michel Seck
2018/108 (PDF ) Generic Round-Function-Recovery Attacks for Feistel Networks over Small Domains F. Betül Durak, Serge Vaudenay
2018/107 (PDF ) Towards Practical Lattice-Based One-Time Linkable Ring Signatures Carsten Baum, Huang Lin, Sabine Oechsner
2018/106 (PDF ) On the Gold Standard for Security of Universal Steganography Sebastian Berndt, Maciej Liśkiewicz
2018/105 (PDF ) Combining Private Set-Intersection with Secure Two-Party Computation Michele Ciampi, Claudio Orlandi
2018/104 (PDF ) PHANTOM and GHOSTDAG: A Scalable Generalization of Nakamoto Consensus Yonatan Sompolinsky, Shai Wyborski, Aviv Zohar
2018/103 (PDF ) Decomposition of Permutations in a Finite Field Svetla Nikova, Ventzislav Nikov, Vincent Rijmen
2018/102 (PDF ) Grafting Trees: a Fault Attack against the SPHINCS framework Laurent Castelnovi, Ange Martinelli, Thomas Prest
2018/101 (PDF ) A Secure and Privacy-preserving Protocol for Smart Metering Operational Data Collection Mustafa A. Mustafa, Sara Cleemput, Abdelrahaman Aly, Aysajan Abidin
2018/100 (PDF ) A Nonstandard Variant of Learning with Rounding with Polynomial Modulus and Unbounded Samples Hart Montgomery
2018/099 (PDF ) Improved Bounds on the Threshold Gap in Ramp Secret Sharing Ignacio Cascudo, Jaron Skovsted Gundersen, Diego Ruano
2018/098 (PDF ) How to Reveal the Secrets of an Obscure White-Box Implementation Louis Goubin, Pascal Paillier, Matthieu Rivain, Junwei Wang
2018/097 (PDF ) Exploiting an HMAC-SHA-1 optimization to speed up PBKDF2 Andrea Visconti, Federico Gorla
2018/096 (PDF ) Paralysis Proofs: Secure Access-Structure Updates for Cryptocurrencies and More Fan Zhang, Philip Daian, Gabriel Kaptchuk, Iddo Bentov, Ian Miers, Ari Juels
2018/095 (PDF ) Towards Fully Automated Analysis of Whiteboxes: Perfect Dimensionality Reduction for Perfect Leakage Cees-Bart Breunesse, Ilya Kizhvatov, Ruben Muijrers, Albert Spruyt
2018/094 (PDF ) Parameterization of Edwards curves on the rational field Q with given torsion subgroups Linh Tung Vo
2018/093 (PDF ) Statistical Attacks on Cookie Masking for RC4 Kenneth G. Paterson, Jacob C. N. Schuldt
2018/092 (PDF ) Constructions of S-boxes with uniform sharing Kerem Varici, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen
2018/091 (PDF ) Polynomial multiplication over binary finite fields: new upper bounds Alessandro De Piccoli, Andrea Visconti, Ottavio Giulio Rizzo
2018/090 (PDF ) Secure and Scalable Multi-User Searchable Encryption Cédric Van Rompay, Refik Molva, Melek Önen
2018/089 (PDF ) The Unified Butterfly Effect: Efficient Security Credential Management System for Vehicular Communications Marcos A. Simplicio Jr., Eduardo Lopes Cominetti, Harsh Kupwade Patil, Jefferson E. Ricardini, Marcos Vinicius M. Silva
2018/088 (PDF ) Fully homomorphic public-key encryption with small ciphertext size Masahiro Yagisawa
2018/087 (PDF ) (Short Paper) A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice Alexei Zamyatin, Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Edgar Weippl, William J. Knottenbelt
2018/086 (PDF ) Constructing low-weight dth-order correlation-immune Boolean functions through the Fourier-Hadamard transform Claude Carlet, Xi Chen
2018/085 (PDF ) Protecting Block Ciphers against Differential Fault Attacks without Re-keying (Extended Version) Anubhab Baksi, Shivam Bhasin, Jakub Breier, Mustafa Khairallah, Thomas Peyrin
2018/084 (PDF ) Threat-Adjusting Security: BitFlip as an AI-Ready, Post-Quantum cipher Gideon Samid
2018/083 (PDF ) Flaws in a Verifiably Multiplicative Secret Sharing Scheme from ICITS 2017 Maki Yoshida, Satoshi Obana
2018/082 (PDF ) Synchronized Aggregate Signatures from the RSA Assumption Susan Hohenberger, Brent Waters
2018/081 (PDF ) How to validate the secret of a Ring Learning with Errors (RLWE) key Jintai Ding, Saraswathy RV, Saed Alsayigh, Crystal Clough
2018/080 (PDF ) A Cryptographic Analysis of the WireGuard Protocol Benjamin Dowling, Kenneth G. Paterson
2018/079 (PDF ) Progressive lattice sieving Thijs Laarhoven, Artur Mariano
2018/078 (PDF ) A Systematic Approach To Cryptocurrency Fees Alexander Chepurnoy, Vasily Kharin, Dmitry Meshkov
2018/077 (PDF ) On the Bit Security of Cryptographic Primitives Daniele Micciancio, Michael Walter
2018/076 (PDF ) EM Analysis in the IoT Context: Lessons Learned from an Attack on Thread Daniel Dinu, Ilya Kizhvatov
2018/075 (PDF ) MILP-aided Cube-attack-like Cryptanalysis on Keccak Keyed Modes Wenquan Bi, Xiaoyang Dong, Zheng Li, Rui Zong, Xiaoyun Wang
2018/074 (PDF ) Secure Logistic Regression Based on Homomorphic Encryption: Design and Evaluation Miran Kim, Yongsoo Song, Shuang Wang, Yuhou Xia, Xiaoqian Jiang
2018/073 (PDF ) GAZELLE: A Low Latency Framework for Secure Neural Network Inference Chiraag Juvekar, Vinod Vaikuntanathan, Anantha Chandrakasan
2018/072 (PDF ) Template-based Fault Injection Analysis of Block Ciphers Ashrujit Ghoshal, Sikhar Patranabis, Debdeep Mukhopadhyay
2018/071 (PDF ) SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Stefan Mangard, Florian Mendel, Robert Primas
2018/070 (PDF ) A Unified Framework for Trapdoor-Permutation-Based Sequential Aggregate Signatures Craig Gentry, Adam O'Neill, Leonid Reyzin
2018/069 (PDF ) Reusing Nonces in Schnorr Signatures Marc Beunardeau, Aisling Connolly, Houda Ferradi, Rémi Géraud, David Naccache, Damien Vergnaud
2018/068 (PDF ) Simple Schnorr Multi-Signatures with Applications to Bitcoin Gregory Maxwell, Andrew Poelstra, Yannick Seurin, Pieter Wuille
2018/067 (PDF ) Homomorphic Lower Digits Removal and Improved FHE Bootstrapping Hao Chen, Kyoohyung Han
2018/066 (PDF ) Tweaking Generic OTR to Avoid Forgery Attacks Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong
2018/065 (PDF ) Non-Locality in Interactive Proofs Claude Crépeau, Nan Yang
2018/064 (PDF ) Systematization Of A 256-Bit Lightweight Block Cipher Marvin Sukanya Saha, Krishnendu Rarhi, Abhishek Bhattacharya
2018/063 (PDF ) The Viability of Post-quantum X.509 Certificates Panos Kampanakis, Peter Panburana, Ellie Daw, Daniel Van Geest
2018/062 (PDF ) Countermeasures against a side-channel attack in a kernel memory Na-Young Ahn, Dong Hoon Lee
2018/061 (PDF ) Full-Hiding (Unbounded) Multi-Input Inner Product Functional Encryption from the $k$-Linear Assumption Pratish Datta, Tatsuaki Okamoto, Junichi Tomida
2018/060 (PDF ) A Simple Reduction from State Machine Replication to Binary Agreement in Partially Synchronous or Asynchronous Networks Abhinav Aggarwal, Yue Guo
2018/059 (PDF ) New Insights into Divide-and-Conquer Attacks on the Round-Reduced Keccak-MAC Chen-Dong Ye, Tian Tian
2018/058 (PDF ) Leakage-resilient Algebraic Manipulation Detection Codes with Optimal Parameters Divesh Aggarwal, Tomasz Kazana, Maciej Obremski
2018/057 (PDF ) Efficient Noninteractive Certification of RSA Moduli and Beyond Sharon Goldberg, Leonid Reyzin, Omar Sagga, Foteini Baldimtsi
2018/056 (PDF ) SETLA: Signature and Encryption from Lattices François Gérard, Keno Merckx
2018/055 (PDF ) High-Resolution EM Attacks Against Leakage-Resilient PRFs Explained - And An Improved Construction Florian Unterstein, Johann Heyszl, Fabrizio De Santis, Robert Specht, Georg Sigl
2018/054 (PDF ) More Efficient (Almost) Tightly Secure Structure-Preserving Signatures Romain Gay, Dennis Hofheinz, Lisa Kohl, Jiaxin Pan
2018/053 (PDF ) Study of Deep Learning Techniques for Side-Channel Analysis and Introduction to ASCAD Database Emmanuel Prouff, Remi Strullu, Ryad Benadjila, Eleonora Cagli, Cecile Dumas
2018/052 (PDF ) Optimizing Trees for Static Searchable Encryption Mohammad Etemad, Mohammad Mahmoody, David Evans
2018/051 (PDF ) Semantic Security Invariance under Variant Computational Assumptions Eftychios Theodorakis, John C. Mitchell
2018/050 (PDF ) A Constructive Perspective on Signcryption Security Christian Badertscher, Fabio Banfi, Ueli Maurer
2018/049 (PDF ) Attacks and Countermeasures for White-box Designs Alex Biryukov, Aleksei Udovenko
2018/048 (PDF ) Impossible Differential Cryptanalysis on Deoxys-BC-256 Alireza mehrdad, Farokhlagha Moazami, Hadi Soleimany
2018/047 (PDF ) The distinguishing attack on Speck, Simon, Simeck, HIGHT and LEA Boris Ryabko, Aleksandr Soskov
2018/046 (PDF ) Scalable, transparent, and post-quantum secure computational integrity Eli Ben-Sasson, Iddo Bentov, Yinon Horesh, Michael Riabzev
2018/045 (PDF ) Efficient Batch Zero-Knowledge Arguments for Low Degree Polynomials Jonathan Bootle, Jens Groth
2018/044 (PDF ) Fast Lattice Basis Reduction Suitable for Massive Parallelization and Its Application to the Shortest Vector Problem Tadanori Teruya, Kenji Kashiwabara, Goichiro Hanaoka
2018/043 (PDF ) Efficient Adaptively Secure Zero-knowledge from Garbled Circuits Chaya Ganesh, Yashvanth Kondi, Arpita Patra, Pratik Sarkar
2018/042 (PDF ) Improved (Almost) Tightly-Secure Structure-Preserving Signatures Charanjit S. Jutla, Miyako Ohkubo, Arnab Roy
2018/041 (PDF ) Related Randomness Security for Public Key Encryption, Revisited Takahiro Matsuda, Jacob C. N. Schuldt
2018/040 (PDF ) An Analysis of Acceptance Policies For Blockchain Transactions Seb Neumayer, Mayank Varia, Ittay Eyal
2018/039 (PDF ) Faster AVX2 optimized NTT multiplication for Ring-LWE lattice cryptography Gregor Seiler
2018/038 (PDF ) On the Message Complexity of Secure Multiparty Computation Yuval Ishai, Manika Mittal, Rafail Ostrovsky
2018/037 (PDF ) Weakly Secure Equivalence-Class Signatures from Standard Assumptions Georg Fuchsbauer, Romain Gay
2018/036 (PDF ) Extending Oblivious Transfer with Low Communication via Key-Homomorphic PRFs Peter Scholl
2018/035 (PDF ) A Linearly Homomorphic Signature Scheme From Weaker Assumptions Lucas Schabhüser, Johannes Buchmann, Patrick Struck
2018/034 (PDF ) Constant-size Group Signatures from Lattices San Ling, Khoa Nguyen, Huaxiong Wang, Yanhong Xu
2018/033 (PDF ) Two-Factor Password-Authenticated Key Exchange with End-to-End Password Security Stanislaw Jarecki, Mohammed Jubur, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena
2018/031 (PDF ) Secure Remote Attestation Markus Jakobsson
2018/030 (PDF ) Tightly SIM-SO-CCA Secure Public Key Encryption from Standard Assumptions Lin Lyu, Shengli Liu, Shuai Han, Dawu Gu
2018/029 (PDF ) Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems Johannes Blömer, Fabian Eidens, Jakob Juhnke
2018/028 (PDF ) Compact Energy and Delay-Aware Authentication Muslum Ozgur Ozmen, Rouzbeh Behnia, Attila A. Yavuz
2018/027 (PDF ) A verifiable shuffle for the GSW cryptosystem Martin Strand
2018/026 (PDF ) Zero-Knowledge Proof of Decryption for FHE Ciphertexts Christopher Carr, Anamaria Costache, Gareth T. Davies, Kristian Gjøsteen, Martin Strand
2018/025 (PDF ) Hedged Nonce-Based Public-Key Encryption: Adaptive Security under Randomness Failures Zhengan Huang, Junzuo Lai, Wenbin Chen, Man Ho Au, Zhen Peng, Jin Li
2018/024 (PDF ) KEM Combiners Federico Giacon, Felix Heuer, Bertram Poettering
2018/023 (PDF ) Public-Key Encryption Resistant to Parameter Subversion and its Realization from Efficiently-Embeddable Groups Benedikt Auerbach, Mihir Bellare, Eike Kiltz
2018/022 (PDF ) Attribute-based Signatures for Unbounded Circuits in the ROM and Efficient Instantiations from Lattices Ali El Kaafarani, Shuichi Katsumata
2018/021 (PDF ) Regular Lossy Functions and Their Applications in Leakage-Resilient Cryptography Yu Chen, Baodong Qin, Haiyang Xue
2018/020 (PDF ) Ciphertext-Only Attacks against Compact-LWE Submitted to NIST PQC Project Haoyu Li, Renzhang Liu, Yanbin Pan, Tianyuan Xie
2018/019 (PDF ) Two Sides of the Same Coin: Counting and Enumerating Keys Post Side-Channel Attacks Revisited. Daniel P. Martin, Luke Mather, Elisabeth Oswald
2018/018 (PDF ) Multi-Key Searchable Encryption, Revisited Ariel Hamlin, abhi shelat, Mor Weiss, Daniel Wichs
2018/017 (PDF ) Verifiability of Helios Mixnet Ben Smyth
2018/016 (PDF ) New Techniques for Public Key Encryption with Sender Recovery Murali Godi, Roopa Vishwanathan
2018/015 (PDF ) On Composable Security for Digital Signatures Christian Badertscher, Ueli Maurer, Björn Tackmann
2018/014 (PDF ) Ubiquitous Weak-key Classes of BRW-polynomial Function Kaiyan Zheng, Peng Wang, Dingfeng Ye
2018/013 (PDF ) Hashing solutions instead of generating problems: On the interactive certification of RSA moduli Benedikt Auerbach, Bertram Poettering
2018/012 (PDF ) An Inside Job: Remote Power Analysis Attacks on FPGAs Falk Schellenberg, Dennis R. E. Gnad, Amir Moradi, Mehdi B. Tahoori
2018/011 (PDF ) Graded Encoding Schemes from Obfuscation Pooya Farshim, Julia Hesse, Dennis Hofheinz, Enrique Larraia
2018/010 (PDF ) Interactively Secure Groups from Obfuscation Thomas Agrikola, Dennis Hofheinz
2018/009 (PDF ) Evaluation of Resilience of randomized RNS implementation Jérôme Courtois, Lokman Abbas-Turki, Jean-Claude Bajard
2018/008 (PDF ) Quantum Algorithms for Boolean Equation Solving and Quantum Algebraic Attack on Cryptosystems Yu-Ao Chen, Xiao-Shan Gao
2018/007 (PDF ) An Efficient Public-Key Searchable Encryption Scheme Secure against Inside Keyword Guessing Attacks Qiong Huang, Hongbo Li
2018/006 (PDF ) Higher Order Side-Channel Attacks Resilient S-boxes Liran Lerman, Stjepan Picek, Nikita Veshchikov, Olivier Markowitch
2018/005 (PDF ) Simple and Efficient Two-Server ORAM S. Dov Gordon, Jonathan Katz, Xiao Wang
2018/004 (PDF ) On the Performance of Convolutional Neural Networks for Side-channel Analysis Stjepan Picek, Ioannis Petros Samiotis, Annelie Heuser, Jaehun Kim, Shivam Bhasin, Axel Legay
2018/003 (PDF ) How to (not) share a password: Privacy preserving protocols for finding heavy hitters with adversarial behavior Moni Naor, Benny Pinkas, Eyal Ronen
2018/002 (PDF ) The Multiplicative Complexity of 6-variable Boolean Functions Cagdas Calik, Meltem Sonmez Turan, Rene Peralta
2018/001 (PDF ) On the Power of Amortization in Secret Sharing: $d$-Uniform Secret Sharing and CDS with Constant Information Rate Benny Applebaum, Barak Arkis
2017/1262 (PDF ) A New Index Calculus Algorithm for the Elliptic Curve Discrete Logarithm Problem and Summation Polynomial Evaluation Gary McGuire, Daniela Mueller
2017/1261 (PDF ) A Comprehensive Performance Analysis of Hardware Implementations of CAESAR Candidates Sachin Kumar, Jawad Haj-Yahya, Mustafa Khairallah, Mahmoud A. Elmohr, Anupam Chattopadhyay
2017/1260 (PDF ) Collision Resistant Hashing from Sub-exponential Learning Parity with Noise Yu Yu, Jiang Zhang, Jian Weng, Chun Guo, Xiangxue Li
2017/1259 (PDF ) Cryptanalysis of HK17 Haoyu Li, Renzhang Liu, Yanbin Pan, Tianyuan Xie
2017/1258 (PDF ) Remarks on Quaternions/Octonion Based Diffie-Hellman Key Exchange Protocol Submitted to NIST PQC Project Yongge Wang, Qutaibah m. Malluhi
2017/1257 (PDF ) A first-order chosen-plaintext DPA attack on the third round of DES Oscar Reparaz, Benedikt Gierlichs
2017/1256 (PDF ) A Universally Composable Treatment of Network Time Ran Canetti, Kyle Hogan, Aanchal Malhotra, Mayank Varia
2017/1255 (PDF ) On the Strategy and Behavior of Bitcoin Mining with N-attackers Hanqing Liu, Na Ruan, Rongtian Du, Weijia Jia
2017/1254 (PDF ) Practical Applications of Improved Gaussian Sampling for Trapdoor Lattices Kamil Doruk Gür, Yuriy Polyakov, Kurt Rohloff, Gerard W. Ryan, Hadi Sajjadpour, Erkay Savaş
2017/1253 (PDF ) Micro-Architectural Power Simulator for Leakage Assessment of Cryptographic Software on ARM Cortex-M3 Processors Yann Le Corre, Johann Großschädl, Daniel Dinu
2017/1252 (PDF ) Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids Jacqueline Brendel, Marc Fischlin, Felix Günther
2017/1251 (PDF ) A toolbox for software optimization of QC-MDPC code-based cryptosystems Nir Drucker, Shay Gueron
2017/1250 (PDF ) Non-Interactive Delegation for Low-Space Non-Deterministic Computation Saikrishna Badrinarayanan, Yael Tauman Kalai, Dakshita Khurana, Amit Sahai, Daniel Wichs
2017/1249 (PDF ) Quantum cryptanalysis on some Generalized Feistel Schemes Xiaoyang Dong, Zheng Li, Xiaoyun Wang
2017/1248 (PDF ) Foundations of Homomorphic Secret Sharing Elette Boyle, Niv Gilboa, Yuval Ishai, Huijia Lin, Stefano Tessaro
2017/1247 (PDF ) Block encryption of quantum messages Min Liang, Li Yang
2017/1246 (PDF ) Verification of FPGA-augmented trusted computing mechanisms based on Applied Pi Calculus Alessandro Cilardo, Andrea Primativo
2017/1245 (PDF ) IntegriKey: End-to-End Integrity Protection of User Input Aritra Dhar, Der-Yeuan Yu, Kari Kostiainen, Srdjan Capkun
2017/1244 (PDF ) Corrections to ''Further Improving Efficiency of Higher-Order Masking Schemes by Decreasing Randomness Complexity'' Shuang Qiu, Rui Zhang, Yongbin Zhou, Wei Cheng
2017/1243 (PDF ) Augmented Black-Box Simulation and Zero Knowledge Argument for NP Li Hongda, Pan Dongxue, Ni Peifang
2017/1242 (PDF ) Designing Proof of Transaction Puzzles for Cryptocurrency Taotao Li, Parhat Abla, Mingsheng Wang, Qianwen Wei
2017/1241 (PDF ) A Public-key Encryption Scheme Based on Non-linear Indeterminate Equations (Giophantus) Koichiro Akiyama, Yasuhiro Goto, Shinya Okumura, Tsuyoshi Takagi, Koji Nuida, Goichiro Hanaoka, Hideo Shimizu, Yasuhiko Ikematsu
2017/1240 (PDF ) UWB with Pulse Reordering: Securing Ranging against Relay and Physical-Layer Attacks Mridula Singh, Patrick Leu, Srdjan Capkun
2017/1239 (PDF ) An Efficient NIZK Scheme for Privacy-Preserving Transactions over Account-Model Blockchain Shunli Ma, Yi Deng, Debiao He, Jiang Zhang, Xiang Xie
2017/1238 (PDF ) Efficient Oblivious Data Structures for Database Services on the Cloud Thang Hoang, Ceyhun D. Ozkaptan, Gabriel Hackebeil, Attila A. Yavuz
2017/1237 (PDF ) A High-Security Searchable Encryption Framework for Privacy-Critical Cloud Storage Services Thang Hoang, Attila A. Yavuz, Jorge Guajardo
2017/1236 (PDF ) Fast Quantum Algorithm for Solving Multivariate Quadratic Equations Jean-Charles Faugère, Kelsey Horan, Delaram Kahrobaei, Marc Kaplan, Elham Kashefi, Ludovic Perret
2017/1235 (PDF ) Practical Quantum-Safe Voting from Lattices Rafaël del Pino, Vadim Lyubashevsky, Gregory Neven, Gregor Seiler
2017/1234 (PDF ) High-Precision Privacy-Preserving Real-Valued Function Evaluation Christina Boura, Ilaria Chillotti, Nicolas Gama, Dimitar Jetchev, Stanislav Peceny, Alexander Petric
2017/1233 (PDF ) Provably secure compilation of side-channel countermeasures Gilles Barthe, Benjamin Grégoire, Vincent Laporte
2017/1232 (PDF ) Optimal Linear Secret Sharing Schemes for Graph Access Structures on Six Participants Motahhareh Gharahi, Shahram Khazaei
2017/1231 (PDF ) Integer Reconstruction Public-Key Encryption Houda Ferradi, David Naccache
2017/1230 (PDF ) Overdrive: Making SPDZ Great Again Marcel Keller, Valerio Pastro, Dragos Rotaru
2017/1229 (PDF ) Quantum Demiric-Selçuk Meet-in-the-Middle Attacks: Applications to 6-Round Generic Feistel Constructions Akinori Hosoyamada, Yu Sasaki
2017/1228 (PDF ) Speed-ups and time-memory trade-offs for tuple lattice sieving Gottfried Herold, Elena Kirshanova, Thijs Laarhoven
2017/1227 (PDF ) VerMI: Verification Tool for Masked Implementations Victor Arribas, Svetla Nikova, Vincent Rijmen
2017/1226 (PDF ) New (and Old) Proof Systems for Lattice Problems Navid Alamati, Chris Peikert, Noah Stephens-Davidowitz
2017/1225 (PDF ) Fast Garbling of Circuits over 3-Valued Logic Yehuda Lindell, Avishay Yanai
2017/1224 (PDF ) Practical Cryptanalysis of a Public-key Encryption Scheme Based on Non-linear Indeterminate Equations at SAC 2017 Keita Xagawa
2017/1223 (PDF ) Generic Low-Latency Masking in Hardware Hannes Gross, Rinat Iusupov, Roderick Bloem
2017/1222 (PDF ) Forward-Private Dynamic Searchable Symmetric Encryption with Efficient Search Muslum Ozgur Ozmen, Thang Hoang, Attila A. Yavuz
2017/1221 (PDF ) Weak-Unforgeable Tags for Secure Supply Chain Management Marten van Dijk, Chenglu Jin, Hoda Maleki, Phuong Ha Nguyen, Reza Rahaeimehr
2017/1220 (PDF ) Off-line Digital Cash Schemes Providing Unlinkability, Anonymity and Change Lynn Batten, Xun Yi
2017/1219 (PDF ) Correlations Between (Nonlinear) Combiners of Input and Output of Random Functions and Permutations Subhabrata Samajder, Palash Sarkar
2017/1218 (PDF ) TERMinator Suite: Benchmarking Privacy-Preserving Architectures Dimitris Mouris, Nektarios Georgios Tsoutsos, Michail Maniatakos
2017/1217 (PDF ) Linear Regression Side Channel Attack Applied on Constant XOR Shan Fu, Zongyue Wang, Fanxing Wei, Guoai Xu, An Wang
2017/1216 (PDF ) Probabilistic and Considerate Attestation of IoT Devices against Roving Malware Xavier Carpent, Norrathep Rattanavipanon, Gene Tsudik
2017/1215 (PDF ) Lattice-Based Public Key Searchable Encryption from Experimental Perspectives Rouzbeh Behnia, Muslum Ozgur Ozmen, Attila A. Yavuz
2017/1214 (PDF ) HILA5 Pindakaas: On the CCA security of lattice-based encryption with error correction Daniel J. Bernstein, Leon Groot Bruinderink, Tanja Lange, Lorenz Panny
2017/1213 (PDF ) On hybrid SIDH schemes using Edwards and Montgomery curve arithmetic Michael Meyer, Steffen Reith, Fabio Campos
2017/1212 (PDF ) A New Crypto-Classifier Service for Energy Efficiency in Smart Cities Oana Stan, Mohamed-Haykel Zayani, Renaud Sirdey, Amira Ben Hamida, Alessandro Ferreira Leite, Mallek Mziou-Sallami
2017/1211 (PDF ) Zero-Sum Partitions of PHOTON Permutations Qingju Wang, Lorenzo Grassi, Christian Rechberger
2017/1210 (PDF ) Two-Face: New Public Key Multivariate Schemes Gilles Macario-Rat, Jacques Patarin
2017/1209 (PDF ) Improvements for Finding Impossible Differentials of Block Cipher Structures Yiyuan Luo, Xuejia Lai
2017/1208 (PDF ) Security notions for cloud storage and deduplication Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Mohsen Toorani, Håvard Raddum
2017/1207 (PDF ) Unconditionally secure multi-party quantum commitment scheme Mingqiang Wang, Xue Wang, Tao Zhan
2017/1206 (PDF ) Asymptotically faster quantum algorithms to solve multivariate quadratic equations Daniel J. Bernstein, Bo-Yin Yang
2017/1205 (PDF ) Connecting Legendre with Kummer and Edwards Sabyasachi Karati, Palash Sarkar
2017/1204 (PDF ) Horizontal Clustering Side-Channel Attacks on Embedded ECC Implementations (Extended Version) Erick Nascimento, Lukasz Chmielewski
2017/1203 (PDF ) Short Double- and N-Times-Authentication-Preventing Signatures from ECDSA and More David Derler, Sebastian Ramacher, Daniel Slamanig
2017/1202 (PDF ) Faster Cryptographic Hash Function From Supersingular Isogeny Graphs Javad Doliskani, Geovandro C. C. F. Pereira, Paulo S. L. M. Barreto
2017/1201 (PDF ) Collusion Resistant Watermarking Schemes for Cryptographic Functionalities Rupeng Yang, Man Ho Au, Junzuo Lai, Qiuliang Xu, Zuoxia Yu
2017/1200 (PDF ) MixColumns Properties and Attacks on (round-reduced) AES with a Single Secret S-Box Lorenzo Grassi
2017/1199 (PDF ) Quantum Key-recovery Attack on Feistel Structures Xiaoyang Dong, Xiaoyun Wang
2017/1198 (PDF ) Computing isogenies between Montgomery curves using the action of (0,0) Joost Renes
2017/1197 (PDF ) Reassessing Security of Randomizable Signatures David Pointcheval, Olivier Sanders
2017/1196 (PDF ) Post-Quantum Secure Remote Password Protocol from RLWE Problem Xinwei Gao, Jintai Ding, Jiqiang Liu, Lin Li
2017/1195 (PDF ) CAPA: The Spirit of Beaver against Physical Attacks Oscar Reparaz, Lauren De Meyer, Begül Bilgin, Victor Arribas, Svetla Nikova, Ventzislav Nikov, Nigel Smart
2017/1194 (PDF ) Improved Differential Cryptanalysis on Generalized Feistel Schemes Ivan Tjuawinata, Tao Huang, Hongjun Wu
2017/1193 (PDF ) Rhythmic Keccak: SCA Security and Low Latency in HW Victor Arribas, Begül Bilgin, George Petrides, Svetla Nikova, Vincent Rijmen
2017/1192 (PDF ) Efficient Implementation of Password-Based Authenticated Key Exchange from RLWE and Post-Quantum TLS Xinwei Gao, Jintai Ding, Lin Li, Saraswathy RV, Jiqiang Liu
2017/1191 (PDF ) Data Is a Stream: Security of Stream-Based Channels Marc Fischlin, Felix Günther, Giorgia Azzurra Marson, Kenneth G. Paterson
2017/1190 (PDF ) EPIC: Efficient Private Image Classification (or: Learning from the Masters) Eleftheria Makri, Dragos Rotaru, Nigel P. Smart, Frederik Vercauteren
2017/1189 (PDF ) Return Of Bleichenbacher's Oracle Threat (ROBOT) Hanno Böck, Juraj Somorovsky, Craig Young
2017/1188 (PDF ) Signature Schemes with a Fuzzy Private Key Kenta Takahashi, Takahiro Matsuda, Takao Murakami, Goichiro Hanaoka, Masakatsu Nishigaki
2017/1187 (PDF ) On the Round Complexity of OT Extension Sanjam Garg, Mohammad Mahmoody, Daniel Masny, Izaak Meckler
2017/1186 (PDF ) On Multiparty Garbling of Arithmetic Circuits Aner Ben-Efraim
2017/1185 (PDF ) Complete Attack on RLWE Key Exchange with reused keys, without Signal Leakage Jintai Ding, Scott Fluhrer, Saraswathy RV
2017/1184 (PDF ) EFLASH: A New Multivariate Encryption Scheme Ryann Cartor, Daniel Smith-Tone
2017/1183 (PDF ) Round2: KEM and PKE based on GLWR Hayo Baan, Sauvik Bhattacharya, Oscar Garcia-Morchon, Ronald Rietman, Ludo Tolhuizen, Jose-Luis Torre-Arce, Zhenfei Zhang
2017/1182 (PDF ) Distributed Algorithms Made Secure: A Graph Theoretic Approach Merav Parter, Eylon Yogev
2017/1181 (PDF ) Implementing Joux-Vitse's Crossbred Algorithm for Solving MQ Systems over GF(2) on GPUs Ruben Niederhagen, Kai-Chun Ning, Bo-Yin Yang
2017/1180 (PDF ) FPGA-based Niederreiter Cryptosystem using Binary Goppa Codes Wen Wang, Jakub Szefer, Ruben Niederhagen
2017/1179 (PDF ) On the exponents of APN power functions and Sidon sets, sum-free sets, and Dickson polynomials Claude Carlet, Stjepan Picek
2017/1178 (PDF ) Comparison analysis and efficient implementation of reconciliation-based RLWE key exchange protocol Xinwei Gao, Jintai Ding, Saraswathy RV, Lin Li, Jiqiang Liu
2017/1177 (PDF ) Reusable Authentication from the Iris Benjamin Fuller, Sailesh Simhadri, James Steel
2017/1176 (PDF ) Cyclic Locking and Memristor-based Obfuscation Against CycSAT and Inside Foundry Attacks Amin Rezaei, Yuanqi Shen, Shuyu Kong, Jie Gu, Hai Zhou
2017/1175 (PDF ) Short Solutions to Nonlinear Systems of Equations Alan Szepieniec, Bart Preneel
2017/1174 (PDF ) Efficient Optimal Ate Pairing at 128-bit Security Level Md. Al-Amin Khandaker, Yuki Nanjo, Loubna Ghammam, Sylvain Duquesne, Yasuyuki Nogami, Yuta Kodera
2017/1173 (PDF ) Fully Verifiable Secure Delegation of Pairing Computation: Cryptanalysis and An Efficient Construction Osmanbey Uzunkol, Öznur Kalkar, İsa Sertkaya
2017/1172 (PDF ) A Note on Stream Ciphers that Continuously Use the IV Matthias Hamann, Matthias Krause, Willi Meier
2017/1171 (PDF ) Attacks on the AJPS Mersenne-based cryptosystem Koen de Boer, Léo Ducas, Stacey Jeffery, Ronald de Wolf
2017/1170 (PDF ) SAT-based Bit-flipping Attack on Logic Encryptions Yuanqi Shen, Amin Rezaei, Hai Zhou
2017/1169 (PDF ) There Goes Your PIN: Exploiting Smartphone Sensor Fusion Under Single and Cross User Setting David Berend, Bernhard Jungk, Shivam Bhasin
2017/1168 (PDF ) Itsuku: a Memory-Hardened Proof-of-Work Scheme Fabien Coelho, Arnaud Larroche, Baptiste Colin
2017/1167 (PDF ) Cryptocurrency Voting Games Sanjay Bhattacherjee, Palash Sarkar
2017/1166 (PDF ) SCADPA: Side-Channel Assisted Differential-Plaintext Attack on Bit Permutation Based Ciphers Jakub Breier, Dirmanto Jap, Shivam Bhasin
2017/1165 (PDF ) Fast and Universally-Composable Oblivious Transfer and Commitment Scheme with Adaptive Security Megha Byali, Arpita Patra, Divya Ravi, Pratik Sarkar
2017/1164 (PDF ) Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications M. Sadegh Riazi, Christian Weinert, Oleksandr Tkachenko, Ebrahim M. Songhori, Thomas Schneider, Farinaz Koushanfar
2017/1163 (PDF ) MILP-aided Cryptanalysis of Round Reduced ChaCha Najwa Aaraj, Florian Caullery, Marc Manzano
2017/1162 (PDF ) Kayawood, a Key Agreement Protocol Iris Anshel, Derek Atkins, Dorian Goldfeld, Paul E Gunnells
2017/1161 (PDF ) A Review of Existing 4-bit Crypto S-box cryptanalysis Techniques and Two New Techniques with 4-bit Boolean Functions for Cryptanalysis of 4-bit Crypto S-boxes. Sankhanil Dey, Ranjan Ghosh
2017/1160 (PDF ) A Practical Cryptanalysis of WalnutDSA Daniel Hart, DoHoon Kim, Giacomo Micheli, Guillermo Pascual Perez, Christophe Petit, Yuxuan Quek
2017/1159 (PDF ) Cryptanalysis of indistinguishability obfuscation using GGH13 without ideals Gu Chunsheng
2017/1158 (PDF ) Oblivious Dynamic Searchable Encryption via Distributed PIR and ORAM Thang Hoang, Attila A. Yavuz, Betul F. Durak, Jorge Guajardo
2017/1157 (PDF ) ARM2GC: Succinct Garbled Processor for Secure Computation Ebrahim M Songhori, M Sadegh Riazi, Siam U Hussain, Ahmad-Reza Sadeghi, Farinaz Koushanfar
2017/1156 (PDF ) Two-Round Multiparty Secure Computation from Minimal Assumptions Sanjam Garg, Akshayaram Srinivasan
2017/1155 (PDF ) A Survey and Refinement of Repairable Threshold Schemes Thalia M. Laing, Douglas R. Stinson
2017/1154 (PDF ) Post-Quantum Zero-Knowledge Proofs for Accumulators with Applications to Ring Signatures from Symmetric-Key Primitives David Derler, Sebastian Ramacher, Daniel Slamanig
2017/1153 (PDF ) Tesseract: Real-Time Cryptocurrency Exchange using Trusted Hardware Iddo Bentov, Yan Ji, Fan Zhang, Yunqi Li, Xueyuan Zhao, Lorenz Breidenbach, Philip Daian, Ari Juels
2017/1152 (PDF ) Symbolic Security Criteria for Blockwise Adaptive Secure Modes of Encryption Catherine Meadows
2017/1151 (PDF ) Shorter Linear Straight-Line Programs for MDS Matrices Thorsten Kranz, Gregor Leander, Ko Stoffelen, Friedrich Wiemer
2017/1150 (PDF ) SWiM: Secure Wildcard Pattern Matching From OT Extension Vladimir Kolesnikov, Mike Rosulek, Ni Trieu
2017/1149 (PDF ) Improved Cryptanalysis of HFEv- via Projection Jintai Ding, Ray Perlner, Albrecht Petzoldt, Daniel Smith-Tone
2017/1148 (PDF ) Improvements to the Linear Operations of LowMC: A Faster Picnic Daniel Kales, Léo Perrin, Angela Promitzer, Sebastian Ramacher, Christian Rechberger
2017/1147 (PDF ) Under Pressure: Security of Caesar Candidates beyond their Guarantees Serge Vaudenay, Damian Vizár
2017/1146 (PDF ) A Zero-Knowledge Version of vSQL Yupeng Zhang, Daniel Genkin, Jonathan Katz, Dimitrios Papadopoulos, Charalampos Papamanthou
2017/1145 (PDF ) vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases Yupeng Zhang, Daniel Genkin, Jonathan Katz, Dimitrios Papadopoulos, Charalampos Papamanthou
2017/1144 (PDF ) How Far Can We Reach? Breaking Masked AES Smartcard Implementation Using One Trace Wei Cheng, Chao Zheng, Yuchen Cao, Yongbin Zhou, Hailong Zhang, Sylvain Guilley, Laurent Sauvage
2017/1143 (PDF ) Faster key compression for isogeny-based cryptosystems Gustavo H. M. Zanon, Marcos A. Simplicio Jr, Geovandro C. C. F. Pereira, Javad Doliskani, Paulo S. L. M. Barreto
2017/1142 (PDF ) PIR with compressed queries and amortized query processing Sebastian Angel, Hao Chen, Kim Laine, Srinath Setty
2017/1141 (PDF ) Cryptanalysis of Bivium using a Boolean all solution solver Virendra Sule, Anmol Yadav
2017/1140 (PDF ) Lattice Klepto: Turning Post-Quantum Crypto Against Itself Robin Kwant, Tanja Lange, Kimberley Thissen
2017/1139 (PDF ) Decoding Linear Codes with High Error Rate and its Impact for LPN Security Leif Both, Alexander May
2017/1138 (PDF ) The Parallel Repetition of Non-Signaling Games: Counterexamples and Dichotomy Justin Holmgren, Lisa Yang
2017/1137 (PDF ) Note on the Robustness of CAESAR Candidates Daniel Kales, Maria Eichlseder, Florian Mendel
2017/1136 (PDF ) Clustering Related-Tweak Characteristics: Application to MANTIS-6 Maria Eichlseder, Daniel Kales
2017/1135 (PDF ) On the Complexity of the Hybrid Approach on HFEv- Albrecht Petzoldt
2017/1134 (PDF ) Machine-Learning Attacks on PolyPUFs, OB-PUFs, RPUFs, LHS-PUFs, and PUF–FSMs Jeroen Delvaux
2017/1133 (PDF ) Sentiment Protocol: A Decentralized Protocol Leveraging Crowd Sourced Wisdom Anton Muehlemann
2017/1132 (PDF ) Doubly-efficient zkSNARKs without trusted setup Riad S. Wahby, Ioanna Tzialla, abhi shelat, Justin Thaler, Michael Walfish
2017/1131 (PDF ) A Certain Family of Subgroups of $\mathbb Z_n^\star$ Is Weakly Pseudo-Free under the General Integer Factoring Intractability Assumption Mikhail Anokhin
2017/1130 (PDF ) Information-Theoretic Secret-Key Agreement: The Asymptotically Tight Relation Between the Secret-Key Rate and the Channel Quality Ratio Daniel Jost, Ueli Maurer, Joao L. Ribeiro
2017/1129 (PDF ) Probabilistic solution of Yao's millionaires' problem Mariya Bessonov, Dima Grigoriev, Vladimir Shpilrain
2017/1128 (PDF ) Forward Secure Efficient Group Signature in Dynamic Setting using Lattices Meenakshi Kansal, Ratna Dutta, Sourav Mukhopadhyay
2017/1127 (PDF ) On the Leakage Resilience of Ring-LWE Based Public Key Encryption Dana Dachman-Soled, Huijing Gong, Mukul Kulkarni, Aria Shahverdi
2017/1126 (PDF ) Privacy Games for Syntactic Privacy Notions Robin Ankele, Andrew Simpson
2017/1125 (PDF ) k-Round MPC from k-Round OT via Garbled Interactive Circuits Fabrice Benhamouda, Huijia Lin
2017/1124 (PDF ) A formal model of Bitcoin transactions Nicola Atzei, Massimo Bartoletti, Stefano Lande, Roberto Zunino
2017/1123 (PDF ) Relaxed Lattice-Based Signatures with Short Zero-Knowledge Proofs Cecilia Boschini, Jan Camenisch, Gregory Neven
2017/1122 (PDF ) On post-processing in the quantum algorithm for computing short discrete logarithms Martin Ekerå
2017/1121 (PDF ) Differential Attacks on LILLIPUT Cipher Valérie Nachef, Nicolas Marrière, Emmanuel Volte
2017/1120 (PDF ) A Ciphertext-Size Lower Bound for Order-Preserving Encryption with Limited Leakage David Cash, Cong Zhang
2017/1119 (PDF ) Detection of cryptographic algorithms with grap Léonard Benedetti, Aurélien Thierry, Julien Francq
2017/1118 (PDF ) Solida: A Blockchain Protocol Based on Reconfigurable Byzantine Consensus Ittai Abraham, Dahlia Malkhi, Kartik Nayak, Ling Ren, Alexander Spiegelman
2017/1117 (PDF ) Risky Traitor Tracing and New Differential Privacy Negative Results Rishab Goyal, Venkata Koppula, Andrew Russell, Brent Waters
2017/1116 (PDF ) A Constant-Size Signature Scheme with a Tighter Reduction from the CDH Assumption Kaisei Kajita, Kazuto Ogawa, Eiichiro Fujisaki
2017/1115 (PDF ) Hardware Aspects of Montgomery Modular Multiplication Colin D. Walter
2017/1114 (PDF ) Fast Homomorphic Evaluation of Deep Discretized Neural Networks Florian Bourse, Michele Minelli, Matthias Minihold, Pascal Paillier
2017/1113 (PDF ) The Discrete-Logarithm Problem with Preprocessing Henry Corrigan-Gibbs, Dmitry Kogan
2017/1112 (PDF ) Manifold Learning Towards Masking Implementations: A First Study Changhai Ou, Degang Sun, Zhu Wang, Xinping Zhou, Wei Cheng
2017/1111 (PDF ) Fuzzy Password Authenticated Key Exchange Pierre-Alain Dupont, Julia Hesse, David Pointcheval, Leonid Reyzin, Sophia Yakoubov
2017/1110 (PDF ) A Systematic Evaluation of Profiling Through Focused Feature Selection Stjepan Picek, Annelie Heuser, Alan Jovic, Lejla Batina
2017/1109 (PDF ) EzPC: Programmable, Efficient, and Scalable Secure Two-Party Computation for Machine Learning Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma, Shardul Tripathi
2017/1108 (PDF ) Cryptographic Pairings Kristin Lauter, Michael Naehrig
2017/1107 (PDF ) Hardness of Non-Interactive Differential Privacy from One-Way Functions Lucas Kowalczyk, Tal Malkin, Jonathan Ullman, Daniel Wichs
2017/1106 (PDF ) Formal Analysis of a TTP-Free Blacklistable Anonymous Credentials System (Full Version) Weijin Wang, Yu Qin, Jingbin Liu, Dengguo Feng
2017/1105 (PDF ) FFSSE: Flexible Forward Secure Searchable Encryption with Efficient Performance Zheli Liu, Siyi Lv, Yu Wei, Jin Li, Joseph K. Liu, Yang Xiang
2017/1104 (PDF ) Efficient provable-secure NTRUEncrypt over any cyclotomic field Yang Wang, Mingqiang Wang
2017/1103 (PDF ) A new chosen IV statistical distinguishing framework to attack symmetric ciphers, and its application to ACORN-v3 and Grain-128a Vahid Amin Ghafari, Honggang Hu
2017/1102 (PDF ) ID-HABE: Incorporating ID-based Revocation, Delegation, and Authority Hierarchy into Attribute-Based Encryption Qiuxiang Dong, Dijiang Huang, Jim Luo, Myong Kang
2017/1101 (PDF ) HIR-CP-ABE: Hierarchical Identity Revocable Ciphertext-Policy Attribute-Based Encryption for Secure and Flexible Data Sharing Qiuxiang Dong, Dijiang Huang, Jim Luo, Myong Kang
2017/1100 (PDF ) IR-CP-ABE: Identity Revocable Ciphertext-Policy Attribute-Based Encryption for Flexible Secure Group-Based Communication Weijia Wang, Zhijie Wang, Bing Li, Qiuxiang Dong, Dijiang Huang
2017/1099 (PDF ) Security Analysis of a Dynamic Threshold Secret Sharing Scheme Using Linear Subspace Method Sadegh Jamshidpour, Zahra Ahmadian
2017/1098 (PDF ) The Strength of Weak Randomization: Efficiently Searchable Encryption with Minimal Leakage David Pouliot, Scott Griffy, Charles V. Wright
2017/1097 (PDF ) Non-malleable Randomness Encoders and their Applications Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar
2017/1096 (PDF ) IND-CCA-secure Key Encapsulation Mechanism in the Quantum Random Oracle Model, Revisited Haodong Jiang, Zhenfeng Zhang, Long Chen, Hong Wang, Zhi Ma
2017/1095 (PDF ) Analysis of the Bitcoin UTXO set Sergi Delgado-Segura, Cristina Pérez-Solà, Guillermo Navarro-Arribas, Jordi Herrera-Joancomartí
2017/1094 (PDF ) Privately Constraining and Programming PRFs, the LWE Way Chris Peikert, Sina Shiehian
2017/1093 (PDF ) Proposal for Protocol on a Quorum Blockchain with Zero Knowledge Thomas Espel, Laurent Katz, Guillaume Robin
2017/1092 (PDF ) Universally Composable Secure Computation with Corrupted Tokens Nishanth Chandran, Wutichai Chongchitmate, Rafail Ostrovsky, Ivan Visconti
2017/1091 (PDF ) Fairness in an Unfair World: Fair Multiparty Computation from public Bulletin Boards Arka Rai Choudhuri, Matthew Green, Abhishek Jain, Gabriel Kaptchuk, Ian Miers
2017/1090 (PDF ) Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts Lorenz Breidenbach, Philip Daian, Florian Tramèr, Ari Juels
2017/1089 (PDF ) Secure Deduplication of Encrypted Data: Refined Model and New Constructions Jian Liu, Li Duan, Yong Li, N. Asokan
2017/1088 (PDF ) Promise Zero Knowledge and its Applications to Round Optimal MPC Saikrishna Badrinarayanan, Vipul Goyal, Abhishek Jain, Yael Tauman Kalai, Dakshita Khurana, Amit Sahai
2017/1087 (PDF ) General purpose integer factoring Arjen K. Lenstra
2017/1086 (PDF ) Order-Revealing Encryption: File-Injection Attack and Forward Security Xingchen Wang, Yunlei Zhao
2017/1085 (PDF ) Improving Side-channel Analysis through Semi-supervised Learning Stjepan Picek, Annelie Heuser, Alan Jovic, Karlo Knezevic, Tania Richmond
2017/1084 (PDF ) Lightweight MDS Serial-type Matrices with Minimal Fixed XOR Count (Full version) Dylan Toh, Jacob Teo, Khoongming Khoo, Siang Meng Sim
2017/1083 (PDF ) CAMFAS: A Compiler Approach to Mitigate Fault Attacks via Enhanced SIMDization Zhi Chen, Junjie Shen, Alex Nicolau, Alex Veidenbaum, Nahid Farhady Ghalaty, Rosario Cammarota
2017/1082 (PDF ) Instruction Duplication: Leaky and Not Too Fault-Tolerant! Lucian Cojocar, Kostas Papagiannopoulos, Niek Timmers
2017/1081 (PDF ) The Montgomery and Joye Powering Ladders are Dual Colin D. Walter
2017/1080 (PDF ) Quantum Lightning Never Strikes the Same State Twice Mark Zhandry
2017/1079 (PDF ) Entropy Reduction for the Correlation-Enhanced Power Analysis Collision Attack Andreas Wiemers, Dominik Klein
2017/1078 (PDF ) The Tao of Inference in Privacy-Protected Databases Vincent Bindschaedler, Paul Grubbs, David Cash, Thomas Ristenpart, Vitaly Shmatikov
2017/1077 (PDF ) A New Generalization of the KMOV Cryptosystem Maher Boudabra, Abderrahmane Nitaj
2017/1076 (PDF ) A generalized attack on RSA type cryptosystems Martin Bunder, Abderrahmane Nitaj, Willy Susilo, Joseph Tonien
2017/1075 (PDF ) XHX - A Framework for Optimally Secure Tweakable Block Ciphers from Classical Block Ciphers and Universal Hashing Ashwin Jha, Eik List, Kazuhiko Minematsu, Sweta Mishra, Mridul Nandi
2017/1074 (PDF ) A Practical Fault Attack on ARX-like Ciphers with a Case Study on ChaCha20 S V Dilip Kumar, Sikhar Patranabis, Jakub Breier, Debdeep Mukhopadhyay, Shivam Bhasin, Anupam Chattopadhyay, Anubhab Baksi
2017/1073 (PDF ) One Plus One is More than Two: A Practical Combination of Power and Fault Analysis Attacks on PRESENT and PRESENT-like Block Ciphers Sikhar Patranabis, Jakub Breier, Debdeep Mukhopadhyay, Shivam Bhasin
2017/1072 (PDF ) Settling the mystery of $Z_r=r$ in RC4 Sabyasachi Dey, Santanu Sarkar
2017/1071 (PDF ) Meet-in-the-Middle Attacks on 3-Line Generalized Feistel Networks Le Dong, Yongxia Mao
2017/1070 (PDF ) The Transaction Graph for Modeling Blockchain Semantics Christian Cachin, Angelo De Caro, Pedro Moreno-Sanchez, Björn Tackmann, Marko Vukolić
2017/1069 (PDF ) Non-Malleability vs. CCA-Security: The Case of Commitments Brandon Broadnax, Valerie Fetzer, Jörn Müller-Quade, Andy Rupp
2017/1068 (PDF ) Frequency-smoothing encryption: preventing snapshot attacks on deterministically encrypted data Marie-Sarah Lacharité, Kenneth G. Paterson
2017/1067 (PDF ) Regulating Storage Overhead in Existing PoW-based Blockchains Frederik Armknecht, Jens-Matthias Bohli, Ghassan O. Karame, Wenting Li
2017/1066 (PDF ) Bulletproofs: Short Proofs for Confidential Transactions and More Benedikt Bünz, Jonathan Bootle, Dan Boneh, Andrew Poelstra, Pieter Wuille, Greg Maxwell
2017/1064 (PDF ) An Algebraic Approach to Maliciously Secure Private Set Intersection Satrajit Ghosh, Tobias Nilges
2017/1063 (PDF ) Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly (Full Version) Qingju Wang, Yonglin Hao, Yosuke Todo, Chaoyun Li, Takanori Isobe, Willi Meier
2017/1062 (PDF ) Towards Breaking the Exponential Barrier for General Secret Sharing Tianren Liu, Vinod Vaikuntanathan, Hoeteck Wee
2017/1061 (PDF ) Non-Malleable Codes from Average-Case Hardness: AC0, Decision Trees, and Streaming Space-Bounded Tampering Marshall Ball, Dana Dachman-Soled, Mukul Kulkarni, Tal Malkin
2017/1060 (PDF ) Thwarting Leakage Abuse Attacks against Searchable Encryption -- A Formal Approach and Applications to Database Padding Raphael Bost, Pierre-Alain Fouque
2017/1059 (PDF ) CP-consensus: a Blockchain Protocol Based on Synchronous Timestamps of Compass Satellite Lijing Zhou, Licheng Wang, Yiru Sun
2017/1058 (PDF ) Optimal Key Consensus in Presence of Noise Zhengzhong Jin, Yunlei Zhao
2017/1057 (PDF ) Montgomery Arithmetic from a Software Perspective Joppe W. Bos, Peter L. Montgomery
2017/1056 (PDF ) Round-Optimal Secure Multi-Party Computation Shai Halevi, Carmit Hazay, Antigoni Polychroniadou, Muthuramakrishnan Venkitasubramaniam
2017/1055 (PDF ) Cellular Automata Based S-boxes Luca Mariot, Stjepan Picek, Alberto Leporati, Domagoj Jakobovic
2017/1054 (PDF ) On the security of another CRC based ultralightweight RFID authentication protocol Seyed Farhad Aghili, Hamid Mala
2017/1053 (PDF ) A Note on 'Further Improving Efficiency of Higher-Order Masking Scheme by Decreasing Randomness Complexity' Gilles Barthe, François Dupressoir, Benjamin Grégoire
2017/1052 (PDF ) Early Detection and Analysis of Leakage Abuse Vulnerabilities Charles V. Wright, David Pouliot
2017/1051 (PDF ) A Novel Use of Kernel Discriminant Analysis as a Higher-Order Side-Channel Distinguisher Xinping Zhou, Carolyn Whitnall, Elisabeth Oswald, Degang Sun, Zhu Wang
2017/1050 (PDF ) Scalable Multi-party Computation for zk-SNARK Parameters in the Random Beacon Model Sean Bowe, Ariel Gabizon, Ian Miers
2017/1049 (PDF ) A Practical Implementation of Identity-Based Encryption over NTRU Lattices Sarah McCarthy, Neil Smyth, Elizabeth O’Sullivan
2017/1048 (PDF ) Non-malleable Codes against Lookahead Tampering Divya Gupta, Hemanta K. Maji, Mingyuan Wang
2017/1047 (PDF ) Consolidating Inner Product Masking Josep Balasch, Sebastian Faust, Benedikt Gierlichs, Clara Paglialonga, François-Xavier Standaert
2017/1046 (PDF ) Approximate Thumbnail Preserving Encryption Byron Marohn, Charles V. Wright, Wu-chi Feng, Mike Rosulek, Rakesh B. Bobba
2017/1045 (PDF ) Tightly-Secure PAK(E) José Becerra, Vincenzo Iovino, Dimiter Ostrev, Petra Šala, Marjan Škrobot
2017/1044 (PDF ) Strain: A Secure Auction for Blockchains Erik-Oliver Blass, Florian Kerschbaum
2017/1043 (PDF ) An E-voting Protocol Based on Blockchain Yi Liu, Qi Wang
2017/1042 (PDF ) On one-round reliable message transmission René Bødker Christensen
2017/1041 (PDF ) Compact Zero-Knowledge Proofs of Small Hamming Weight Ivan Damgård, Ji Luo, Sabine Oechsner, Peter Scholl, Mark Simkin
2017/1039 (PDF ) Dronecrypt - An Efficient Cryptographic Framework for Small Aerial Drones Muslum Ozgur Ozmen, Attila A. Yavuz
2017/1038 (PDF ) Embedded Proofs for Verifiable Neural Networks Hervé Chabanne, Julien Keuffer, Refik Molva
2017/1037 (PDF ) DAGS: Key Encapsulation using Dyadic GS Codes Gustavo Banegas, Paulo S. L. M. Barreto, Brice Odilon Boidje, Pierre-Louis Cayrel, Gilbert Ndollane Dione, Kris Gaj, Cheikh Thiecoumba Gueye, Richard Haeussler, Jean Belo Klamti, Ousmane N'diaye, Duc Tri Nguyen, Edoardo Persichetti, Jefferson E. Ricardini
2017/1036 (PDF ) Rotational-XOR Cryptanalysis of Reduced-round SPECK Yunwen Liu, Glenn De Witte, Adrián Ranea, Tomer Ashur
2017/1035 (PDF ) Privacy-respecting Reward Generation and Accumulation for Participatory Sensing Applications Tassos Dimitriou
2017/1034 (PDF ) Tight on Budget? Tight Bounds for r-Fold Approximate Differential Privacy Sebastian Meiser, Esfandiar Mohammadi
2017/1033 (PDF ) Foundations of Differentially Oblivious Algorithms T-H. Hubert Chan, Kai-Min Chung, Bruce Maggs, Elaine Shi
2017/1032 (PDF ) Performing Computations on Hierarchically Shared Secrets Giulia Traverso, Denise Demirel, Johannes Buchmann
2017/1031 (PDF ) Lightweight Design Choices for LED-like Block Ciphers Sumanta Sarkar, Habeeb Syed, Rajat Sadhukhan, Debdeep Mukhopadhyay
2017/1030 (PDF ) New MILP Modeling: Improved Conditional Cube Attacks on Keccak-based Constructions Ling Song, Jian Guo, Danping Shi, San Ling
2017/1029 (PDF ) Efficient Designated-Verifier Non-Interactive Zero-Knowledge Proofs of Knowledge Pyrros Chaidos, Geoffroy Couteau
2017/1028 (PDF ) Cryptanalysis of 1-Round KECCAK Rajendra Kumar, Mahesh Sreekumar Rajasree, Hoda AlKhzaimi
2017/1027 (PDF ) Eliminating Variables in Boolean Equation Systems Bjørn Møller Greve, Håvard Raddum, Gunnar Fløystad, Øyvind Ytrehus
2017/1025 (PDF ) Rounded Gaussians -- Fast and Secure Constant-Time Sampling for Lattice-Based Crypto Andreas Hülsing, Tanja Lange, Kit Smeets
2017/1024 (PDF ) Revisiting a Masked Lookup-Table Compression Scheme Srinivas Vivek
2017/1023 (PDF ) Several Masked Implementations of the Boyar-Peralta AES S-Box Ashrujit Ghoshal, Thomas De Cnudde
2017/1022 (PDF ) Direct Anonymous Attestation from Lattices Rachid El Bansarkhani, Ali El Kaafarani
2017/1021 (PDF ) Bricklayer Attack: A Side-Channel Analysis on the ChaCha Quarter Round Alexandre Adomnicai, Jacques J. A. Fournier, Laurent Masson
2017/1020 (PDF ) A Novel Pre-Computation Scheme of Window $\tau$NAF for Koblitz Curves Wei Yu, Saud Al Musa, Guangwu Xu, Bao Li
2017/1019 (PDF ) Looting the LUTs : FPGA Optimization of AES and AES-like Ciphers for Authenticated Encryption Mustafa Khairallah, Anupam Chattopadhyay, Thomas Peyrin
2017/1018 (PDF ) A Fair Protocol for Data Trading Based on Bitcoin Transactions Sergi Delgado-Segura, Cristina Pérez-Solà, Guillermo Navarro-Arribas, Jordi Herrera-Joancomart\'ı
2017/1017 (PDF ) Differential Cryptanalysis of 18-Round PRIDE Virginie Lallemand, Shahram Rasoolzadeh
2017/1016 (PDF ) Differentially Private Access Patterns in Secure Computation Sahar Mazloom, S. Dov Gordon
2017/1015 (PDF ) A Faster Software Implementation of the Supersingular Isogeny Diffie-Hellman Key Exchange Protocol Armando Faz-Hernández, Julio López, Eduardo Ochoa-Jiménez, Francisco Rodríguez-Henríquez
2017/1014 (PDF ) Attacking Deterministic Signature Schemes using Fault Attacks Damian Poddebniak, Juraj Somorovsky, Sebastian Schinzel, Manfred Lochter, Paul Rösler
2017/1013 (PDF ) Homomorphic SIM$^2$D Operations: Single Instruction Much More Data Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren
2017/1012 (PDF ) Conditional Cube Attack on Round-Reduced River Keyak Wenquan Bi, Zheng Li, Xiaoyang Dong, Lu Li, Xiaoyun Wang
2017/1011 (PDF ) Efficient and Universally Composable Protocols for Oblivious Transfer from the CDH Assumption Eduard Hauck, Julian Loss
2017/1009 (PDF ) Architecture level Optimizations for Kummer based HECC on FPGAs Gabriel Gallin, Turku Ozlum Celik, Arnaud Tisserand
2017/1008 (PDF ) Automatic Characterization of Exploitable Faults: A Machine Learning Approach Sayandeep Saha, Dirmanto Jap, Sikhar Patranabis, Debdeep Mukhopadhyay, Shivam Bhasin, Pallab Dasgupta
2017/1007 (PDF ) Malware encryption schemes - rerandomizable ciphertexts encrypted using environmental keys Herman Galteland, Kristian Gjøsteen
2017/1006 (PDF ) Round and Communication Efficient Unconditionally-secure MPC with $t < n/3$ in Partially Synchronous Network Ashish Choudhury, Arpita Patra, Divya Ravi
2017/1005 (PDF ) Tightly-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model Tsunekazu Saito, Keita Xagawa, Takashi Yamakawa
2017/1004 (PDF ) Garbled Protocols and Two-Round MPC from Bilinear Maps Sanjam Garg, Akshayaram Srinivasan
2017/1003 (PDF ) Secure Multi-Party Computation in Large Networks Varsha Dani, Valerie King, Mahnush Movahedi, Jared Saia, Mahdi Zamani
2017/1002 (PDF ) On the Closest Vector Problem for Lattices Constructed from Polynomials and Their Cryptographic Applications Zhe Li, San Ling, Chaoping Xing, Sze Ling Yeo
2017/1001 (PDF ) Impossibility of Order-Revealing Encryption in Idealized Models Mark Zhandry, Cong Zhang
2017/1000 (PDF ) No right to remain silent: Isolating Malicious Mixes Hemi Leibowitz, Ania Piotrowska, George Danezis, Amir Herzberg
2017/999 (PDF ) Shortest Vector from Lattice Sieving: a Few Dimensions for Free Léo Ducas
2017/998 (PDF ) A Comparative Investigation of Approximate Attacks on Logic Encryptions Yuanqi Shen, Amin Rezaei, Hai Zhou
2017/997 (PDF ) Hash Proof Systems over Lattices Revisited Fabrice Benhamouda, Olivier Blazy, Léo Ducas, Willy Quach
2017/996 (PDF ) Large FHE gates from Tensored Homomorphic Accumulator Guillaume Bonnoron, Léo Ducas, Max Fillinger
2017/995 (PDF ) A signature scheme from Learning with Truncation Jeffrey Hoffstein, Jill Pipher, William Whyte, Zhenfei Zhang
2017/994 (PDF ) Separable Statistics and Multidimensional Linear Cryptanalysis S. Fauskanger, I. Semaev
2017/993 (PDF ) A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM Paulo S. L. M. Barreto, Bernardo David, Rafael Dowsley, Kirill Morozov, Anderson C. A. Nascimento
2017/992 (PDF ) Leakage Bounds for Gaussian Side Channels Thomas Unterluggauer, Thomas Korak, Stefan Mangard, Robert Schilling, Luca Benini, Frank Gürkaynak, Michael Muehlberghuber
2017/991 (PDF ) Secure Code Updates for Smart Embedded Devices based on PUFs Wei Feng, Yu Qin, Shijun Zhao, Ziwen Liu, Xiaobo Chu, Dengguo Feng
2017/990 (PDF ) Bounds on Differential and Linear Branch Number of Permutations Sumanta Sarkar, Habeeb Syed
2017/989 (PDF ) Decentralized Multi-Client Functional Encryption for Inner Product Jérémy Chotard, Edouard Dufour-Sans, Romain Gay, Duong Hieu Phan, David Pointcheval
2017/988 (PDF ) On Rejection Sampling Algorithms for Centered Discrete Gaussian Distribution over Integers Yusong Du, Baodian Wei
2017/987 (PDF ) Key Dependent Message Security and Receiver Selective Opening Security for Identity-Based Encryption Fuyuki Kitagawa, Keisuke Tanaka
2017/986 (PDF ) On the Hardness of Computing Endomorphism Rings of Supersingular Elliptic Curves Kirsten Eisentraeger, Sean Hallgren, Travis Morrison
2017/985 (PDF ) Breaking Ed25519 in WolfSSL Niels Samwel, Lejla Batina, Guido Bertoni, Joan Daemen, Ruggero Susella
2017/984 (PDF ) Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks Marc Fischlin, Sogol Mazaheri
2017/983 (PDF ) Attribute-Based Encryption in the Generic Group Model: Automated Proofs and New Constructions Miguel Ambrona, Gilles Barthe, Romain Gay, Hoeteck Wee
2017/982 (PDF ) Mind the Gap: Where Provable Security and Real-World Messaging Don't Quite Meet Katriel Cohn-Gordon, Cas Cremers
2017/981 (PDF ) Efficient Maliciously Secure Multiparty Computation for RAM Marcel Keller, Avishay Yanai
2017/980 (PDF ) Yoyo Tricks with AES Sondre Rønjom, Navid Ghaedi Bardeh, Tor Helleseth
2017/979 (PDF ) Privacy-Preserving Ridge Regression with only Linearly-Homomorphic Encryption Irene Giacomelli, Somesh Jha, Marc Joye, C. David Page, Kyonghwan Yoon
2017/978 (PDF ) New Constructions of Identity-Based and Key-Dependent Message Secure Encryption Schemes Nico Döttling, Sanjam Garg, Mohammad Hajiabadi, Daniel Masny
2017/977 (PDF ) Cryptanalysis against Symmetric-Key Schemes with Online Classical Queries and Offline Quantum Computations Akinori Hosoyamada, Yu Sasaki
2017/976 (PDF ) Improvements for Gate-Hiding Garbled Circuits Mike Rosulek
2017/975 (PDF ) Differential Attacks on Deterministic Signatures Christopher Ambrose, Joppe W. Bos, Björn Fay, Marc Joye, Manfred Lochter, Bruce Murray
2017/974 (PDF ) Obscuro: A Bitcoin Mixer using Trusted Execution Environments Muoi Tran, Loi Luu, Min Suk Kang, Iddo Bentov, Prateek Saxena
2017/973 (PDF ) Symmetric Searchable Encryption with Sharing and Unsharing Sarvar Patel, Giuseppe Persiano, Kevin Yeo
2017/972 (PDF ) Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions without Pairings Michel Abdalla, Dario Catalano, Dario Fiore, Romain Gay, Bogdan Ursu
2017/971 (PDF ) A Fast, Practical and Simple Shortest Path Protocol for Multiparty Computation Abdelrahaman Aly, Sara Cleemput
2017/970 (PDF ) A New Functional Encryption for Multidimensional Range Query Jia Xu, Ee-Chien Chang, Jianying Zhou
2017/969 (PDF ) Fast and Adaptively Secure Signatures in the Random Oracle Model from Indistinguishability Obfuscation Bei Liang, Aikaterini Mitrokotsa
2017/968 (PDF ) Template Attack on Blinded Scalar Multiplication with Asynchronous perf-ioctl Calls Sarani Bhattacharya, Clementine Maurice, Shivam Bhasin, Debdeep Mukhopadhyay
2017/967 (PDF ) Anonymous IBE, Leakage Resilience and Circular Security from New Assumptions Zvika Brakerski, Alex Lombardi, Gil Segev, Vinod Vaikuntanathan
2017/966 (PDF ) Optimal Parameters for XMSS^MT Andreas Hülsing, Lea Rausch, Johannes Buchmann
2017/965 (PDF ) WOTS+ -- Shorter Signatures for Hash-Based Signature Schemes Andreas Hülsing
2017/964 (PDF ) Recursive ORAMs with Practical Constructions Sarvar Patel, Giuseppe Persiano, Kevin Yeo
2017/963 (PDF ) Non-Interactive Proofs of Proof-of-Work Aggelos Kiayias, Andrew Miller, Dionysis Zindros
2017/962 (PDF ) Hard and Easy Problems for Supersingular Isogeny Graphs Christophe Petit, Kristin Lauter
2017/961 (PDF ) An Offline Dictionary Attack against zkPAKE Protocol Jose Becerra, Peter Y. A. Ryan, Petra Sala, Marjan Skrobot
2017/960 (PDF ) Unforgeable Quantum Encryption Gorjan Alagic, Tommaso Gagliardoni, Christian Majenz
2017/959 (PDF ) Choosing Parameters for the Subfield Lattice Attack against overstretched NTRU Dung Hoang Duong, Masaya Yasuda, Tsuyoshi Takagi
2017/958 (PDF ) Two-Message, Oblivious Evaluation of Cryptographic Functionalities Nico Döttling, Nils Fleischhacker, Johannes Krupp, Dominique Schröder
2017/957 (PDF ) From Selective IBE to Full IBE and Selective HIBE Nico Döttling, Sanjam Garg
2017/956 (PDF ) Threshold Cryptosystems From Threshold Fully Homomorphic Encryption Dan Boneh, Rosario Gennaro, Steven Goldfeder, Aayush Jain, Sam Kim, Peter M. R. Rasmussen, Amit Sahai
2017/955 (PDF ) Towards Practical Privacy-Preserving Genome-Wide Association Study Charlotte Bonte, Eleftheria Makri, Amin Ardeshirdavani, Jaak Simm, Yves Moreau, Frederik Vercauteren
2017/954 (PDF ) Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency---Choose Two Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, Aniket Kate
2017/953 (PDF ) Threshold Kleptographic Attacks on Discrete Logarithm Based Signatures George Teseleanu
2017/952 (PDF ) Secure Two-Party Computation with Fairness -- A Necessary Design Principle Yehuda Lindell, Tal Rabin
2017/951 (PDF ) Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics Nina Bindel, Johannes Buchmann, Juliane Krämer, Heiko Mantel, Johannes Schickel, Alexandra Weber
2017/950 (PDF ) Blockwise $p$-Tampering Attacks on Cryptographic Primitives, Extractors, and Learners Saeed Mahloujifar, Mohammad Mahmoody
2017/949 (PDF ) Practical and Robust Secure Logging from Fault-Tolerant Sequential Aggregate Signatures Gunnar Hartung, Björn Kaidel, Alexander Koch, Jessica Koch, Dominik Hartmann
2017/948 (PDF ) Evolving Secret Sharing: Dynamic Thresholds and Robustness Ilan Komargodski, Anat Paskin-Cherniavsky
2017/947 (PDF ) Actively Secure Garbled Circuits with Constant Communication Overhead in the Plain Model Carmit Hazay, Yuval Ishai, Muthuramakrishnan Venkitasubramaniam
2017/946 (PDF ) The MMap Strikes Back: Obfuscation and New Multilinear Maps Immune to CLT13 Zeroizing Attacks Fermi Ma, Mark Zhandry
2017/945 (PDF ) Moderately Hard Functions: Definition, Instantiations, and Applications Joël Alwen, Björn Tackmann
2017/944 (PDF ) A Unified Approach to Constructing Black-box UC Protocols in Trusted Setup Models Susumu Kiyoshima, Huijia Lin, Muthuramakrishnan Venkitasubramaniam
2017/943 (PDF ) When does Functional Encryption Imply Obfuscation? Sanjam Garg, Mohammad Mahmoody, Ameer Mohammed
2017/942 (PDF ) On Secure Two-Party Computation in Three Rounds Prabhanjan Ananth, Abhishek Jain
2017/940 (PDF ) Linear Secret-Sharing Schemes for Forbidden Graph Access Structures Amos Beimel, Oriol Farràs, Yuval Mintz, Naty Peter
2017/939 (PDF ) Towards Optimal Pre-processing in Leakage Detection Changhai Ou, Degang Sun, Zhu Wang, Xinping Zhou
2017/938 (PDF ) On the security of the WOTS-PRF signature scheme Philip Lafrance, Alfred Menezes
2017/937 (PDF ) Random Oracles and Non-Uniformity Sandro Coretti, Yevgeniy Dodis, Siyao Guo, John Steinberger
2017/936 (PDF ) A tight security reduction in the quantum random oracle model for code-based signature schemes André Chailloux, Thomas Debris-Alazard
2017/935 (PDF ) Overcoming Cryptographic Impossibility Results using Blockchains Rishab Goyal, Vipul Goyal
2017/934 (PDF ) Adaptively Indistinguishable Garbled Circuits Zahra Jafargholi, Alessandra Scafuro, Daniel Wichs
2017/933 (PDF ) Improving Stateless Hash-Based Signatures Jean-Philippe Aumasson, Guillaume Endignoux
2017/932 (PDF ) Why Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs Nils Wisiol, Christoph Graebnitz, Marian Margraf, Manuel Oswald, Tudor A. A. Soroceanu, Benjamin Zengin
2017/931 (PDF ) Delayed-Input Non-Malleable Zero Knowledge and Multi-Party Coin Tossing in Four Rounds Michele Ciampi, Rafail Ostrovsky, Luisa Siniscalchi, Ivan Visconti
2017/930 (PDF ) Four-state Non-malleable Codes with Explicit Constant Rate Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar
2017/929 (PDF ) How to Securely Compute with Noisy Leakage in Quasilinear Complexity Dahmun Goudarzi, Antoine Joux, Matthieu Rivain
2017/928 (PDF ) Environmental Authentication in Malware Jeremy Blackthorne, Benjamin Kaiser, Benjamin Fuller, Bulent Yener
2017/927 (PDF ) Near-Optimal Secret Sharing and Error Correcting Codes in AC0 Kuan Cheng, Yuval Ishai, Xin Li
2017/926 (PDF ) How to Construct a Leakage-Resilient (Stateless) Trusted Party Daniel Genkin, Yual Ishai, Mor Weiss
2017/925 (PDF ) Resettably-Sound Resettable Zero Knowledge in Constant Rounds Wutichai Chongchitmate, Rafail Ostrovsky, Ivan Visconti
2017/924 (PDF ) Oblivious Hashing Revisited, and Applications to Asymptotically Efficient ORAM and OPRAM T-H. Hubert Chan, Yue Guo, Wei-Kai Lin, Elaine Shi
2017/923 (PDF ) Batched Multi-hop Multi-key FHE from ring-LWE with Compact Ciphertext Extension Long Chen, Zhenfeng Zhang, Xueqing Wang
2017/922 (PDF ) On the impossibility of entropy reversal, and its application to zero-knowledge proofs Shachar Lovett, Jiapeng Zhang
2017/921 (PDF ) RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero Shi-Feng Sun, Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Dawu Gu
2017/920 (PDF ) Round-Optimal Secure Two-Party Computation from Trapdoor Permutations Michele Ciampi, Rafail Ostrovsky, Luisa Siniscalchi, Ivan Visconti
2017/919 (PDF ) Improving the Linear Programming Technique in the Search for Lower Bounds in Secret Sharing Oriol Farràs, Tarik Kaced, Sebastià Martín, Carles Padró
2017/918 (PDF ) Linear Repairing Codes and Side-Channel Attacks Hervé Chabanne, Houssem Maghrebi, Emmanuel Prouff
2017/917 (PDF ) A practical, perfectly secure password scheme in the bounded retrieval model Moses Liskov
2017/916 (PDF ) A Concrete Treatment of Fiat-Shamir Signatures in the Quantum Random-Oracle Model Eike Kiltz, Vadim Lyubashevsky, Christian Schaffner
2017/915 (PDF ) Efficient Algorithms for Broadcast and Consensus Based on Proofs of Work Lisa Eckey, Sebastian Faust, Julian Loss
2017/914 (PDF ) Cache-Oblivious and Data-Oblivious Sorting and Applications T-H. Hubert Chan, Yue Guo, Wei-Kai Lin, Elaine Shi
2017/913 (PDF ) Thunderella: Blockchains with Optimistic Instant Confirmation Rafael Pass, Elaine Shi
2017/912 (PDF ) On Two Round Rerunnable MPC Protocols Paul Laird
2017/911 (PDF ) Variable-Length Bit Mapping and Error-Correcting Codes for Higher-Order Alphabet PUFs Vincent Immler, Matthias Hiller, Qinzhi Liu, Andreas Lenz, Antonia Wachter-Zeh
2017/910 (PDF ) Thwarting Fault Attacks using the Internal Redundancy Countermeasure (IRC) Benjamin Lac, Anne Canteaut, Jacques J. A. Fournier, Renaud Sirdey
2017/909 (PDF ) Clarifying the subset-resilience problem Jean-Philippe Aumasson, Guillaume Endignoux
2017/908 (PDF ) Yet Another Compiler for Active Security or: Efficient MPC Over Arbitrary Rings Ivan Damgård, Claudio Orlandi, Mark Simkin
2017/907 (PDF ) On the differential equivalence of APN functions Anastasiya Gorodilova
2017/906 (PDF ) Notes On GGH13 Without The Presence Of Ideals Martin R. Albrecht, Alex Davidson, Enrique Larraia, Alice Pellet--Mary
2017/905 (PDF ) Shorter Ring Signatures from Standard Assumptions Alonso González
2017/904 (PDF ) On Iterative Collision Search for LPN and Subset Sum Srinivas Devadas, Ling Ren, Hanshen Xiao
2017/903 (PDF ) On Zero-Testable Homomorphic Encryption and Publicly Verifiable Non-Interactive Arguments Omer Paneth, Guy N. Rothblum
2017/902 (PDF ) How Low Can You Go? Short Structure-Preserving Signatures for Diffie-Hellman Vectors Essam Ghadafi
2017/901 (PDF ) Stateful Multi-Client Verifiable Computation Christian Cachin, Esha Ghosh, Dimitrios Papadopoulos, Björn Tackmann
2017/900 (PDF ) Proof of a shuffle for lattice-based cryptography (Full version) Núria Costa, Ramiro Martínez, Paz Morillo
2017/899 (PDF ) Kaleidoscope: An Efficient Poker Protocol with Payment Distribution and Penalty Enforcement Bernardo David, Rafael Dowsley, Mario Larangeira
2017/898 (PDF ) Putting Wings on SPHINCS Stefan Kölbl
2017/897 (PDF ) Formal Verification of Masked Hardware Implementations in the Presence of Glitches Roderick Bloem, Hannes Gross, Rinat Iusupov, Bettina Könighofer, Stefan Mangard, Johannes Winter
2017/896 (PDF ) Design, Implementation and Performance Analysis of Highly Efficient Algorithms for AES Key Retrieval in Access-driven Cache-based Side Channel Attacks Ashokkumar C, M. Bhargav Sri Venkatesh, Ravi Prakash Giri, Bernard Menezes
2017/895 (PDF ) Linear Cryptanalysis of DES with Asymmetries Andrey Bogdanov, Philip S. Vejre
2017/894 (PDF ) An Efficient Pairing-Based Shuffle Argument Prastudy Fauzi, Helger Lipmaa, Janno Siim, Michal Zajac
2017/893 (PDF ) Beyond Hellman's Time-Memory Trade-Offs with Applications to Proofs of Space Hamza Abusalah, Joël Alwen, Bram Cohen, Danylo Khilko, Krzysztof Pietrzak, Leonid Reyzin
2017/892 (PDF ) The Iterated Random Function Problem Ritam Bhaumik, Nilanjan Datta, Avijit Dutta, Nicky Mouha, Mridul Nandi
2017/891 (PDF ) Finding Bugs in Cryptographic Hash Function Implementations Nicky Mouha, Mohammad S Raunak, D. Richard Kuhn, Raghu Kacker
2017/890 (PDF ) On the One-Per-Message Unforgeability of (EC)DSA and its Variants Manuel Fersch, Eike Kiltz, Bertram Poettering
2017/889 (PDF ) On Fast Multiplication in Binary Finite Fields and Optimal Primitive Polynomials over GF(2) Alexander Maximov, Helena Sjoberg
2017/888 (PDF ) Asynchronous provably-secure hidden services Philippe Camacho, Fernando Krell
2017/887 (PDF ) Succinct Spooky Free Compilers Are Not Black Box Sound Zvika Brakerski, Yael Tauman Kalai, Renen Perlman
2017/886 (PDF ) Compression for trace zero points on twisted Edwards curves Giulia Bianco, Elisa Gorla
2017/885 (PDF ) PermuteRam: Optimizing Oblivious Computation for Efficiency Shruti Tople, Hung Dang, Prateek Saxena, Ee-Chien Chang
2017/884 (PDF ) Scalar multiplication in compressed coordinates in the trace-zero subgroup Giulia Bianco, Elisa Gorla
2017/883 (PDF ) Strengthening the Security of Encrypted Databases: Non-Transitive JOINs Ilya Mironov, Gil Segev, Ido Shahaf
2017/882 (PDF ) Towards an in-depth understanding of privacy parameters for randomized sanitization mechanisms Baptiste Olivier, Tony Quertier
2017/881 (PDF ) Möbius: Trustless Tumbling for Transaction Privacy Sarah Meiklejohn, Rebekah Mercer
2017/880 (PDF ) Using the Estonian Electronic Identity Card for Authentication to a Machine (Extended Version) Danielle Morgan, Arnis Parsovs
2017/879 (PDF ) Formal Verification of Side-channel Countermeasures via Elementary Circuit Transformations Jean-Sebastien Coron
2017/878 (PDF ) Raziel: Private and Verifiable Smart Contracts on Blockchains David Cerezo Sánchez
2017/877 (PDF ) Identity-Based Format-Preserving Encryption Mihir Bellare, Viet Tung Hoang
2017/876 (PDF ) All-But-Many Lossy Trapdoor Functions and Selective Opening Chosen-Ciphertext Security from LWE Benoit Libert, Amin Sakzad, Damien Stehle, Ron Steinfeld
2017/875 (PDF ) Instantaneous Decentralized Poker Iddo Bentov, Ranjit Kumaresan, Andrew Miller
2017/874 (PDF ) Non-Trivial Witness Encryption and Null-iO from Standard Assumptions Zvika Brakerski, Aayush Jain, Ilan Komargodski, Alain Passelegue, Daniel Wichs
2017/873 (PDF ) Cycle Slicer: An Algorithm for Building Permutations on Special Domains Sarah Miracle, Scott Yilek
2017/872 (PDF ) Linear-Time Zero-Knowledge Proofs for Arithmetic Circuit Satisfiability Jonathan Bootle, Andrea Cerulli, Essam Ghadafi, Jens Groth, Mohammad Hajiabadi, Sune K. Jakobsen
2017/871 (PDF ) Non-Interactive Multiparty Computation without Correlated Randomness Shai Halevi, Yuval Ishai, Abhishek Jain, Ilan Komargodski, Amit Sahai, Eylon Yogev
2017/870 (PDF ) Tightly-Secure Signatures from Five-Move Identification Protocols Eike Kiltz, Julian Loss, Jiaxin Pan
2017/869 (PDF ) Amortizing Randomness Complexity in Private Circuits Sebastian Faust, Clara Paglialonga, Tobias Schneider
2017/868 (PDF ) New Key Recovery Attacks on Minimal Two-Round Even-Mansour Ciphers Takanori Isobe, Kyoji Shibutani
2017/867 (PDF ) On the security of a Certificateless Proxy Re-Encryption Scheme without Pairing Arinjita Paul, S. Sharmila Deva Selvi, C. Pandu Rangan
2017/866 (PDF ) Enhanced Modelling of Authenticated Key Exchange Security Papa B. Seye, Augustin P. Sarr
2017/865 (PDF ) The First Thorough Side-Channel Hardware Trojan Maik Ender, Samaneh Ghandali, Amir Moradi, Christof Paar
2017/864 (PDF ) Quantum Multicollision-Finding Algorithm Akinori Hosoyamada, Yu Sasaki, Keita Xagawa
2017/863 (PDF ) The Minimum Number of Cards in Practical Card-based Protocols Julia Kastner, Alexander Koch, Stefan Walzer, Daiki Miyahara, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone
2017/862 (PDF ) Efficient Scalable Constant-Round MPC via Garbled Circuits Aner Ben-Efraim, Yehuda Lindell, Eran Omri
2017/861 (PDF ) On the Depth of Oblivious Parallel RAM T-H. Hubert Chan, Kai-Min Chung, Elaine Shi
2017/860 (PDF ) Automatic Search of Bit-Based Division Property for ARX Ciphers and Word-Based Division Property Ling Sun, Wei Wang, Meiqin Wang
2017/859 (PDF ) ABE with Tag Made Easy: Concise Framework and New Instantiations in Prime-order Groups Jie Chen, Junqing Gong
2017/858 (PDF ) Differential Fault Analysis of SHA-3 under Relaxed Fault Models Pei Luo, Yunsi Fei, Liwei Zhang, A. Adam Ding
2017/857 (PDF ) Image Classification using non-linear Support Vector Machines on Encrypted Data Anthony Barnett, Jay Santokhi, Michael Simpson, Nigel P. Smart, Charlie Stainton-Bygrave, Srnivas Vivek, Adrian Waller
2017/856 (PDF ) Zero-Knowledge Arguments for Lattice-Based PRFs and Applications to E-Cash Benoît Libert, San Ling, Khoa Nguyen, Huaxiong Wang
2017/855 (PDF ) Fault Attack on ACORN v3 Xiaojuan Zhang, Xiutao Feng, Dongdai Lin
2017/854 (PDF ) Zero-Knowledge Password Policy Check from Lattices Khoa Nguyen, Benjamin Hong Meng Tan, Huaxiong Wang
2017/853 (PDF ) Generic Forward-Secure Key Agreement Without Signatures Cyprien de Saint Guilhem, Nigel P. Smart, Bogdan Warinschi
2017/852 (PDF ) Blockcipher-based MACs: Beyond the Birthday Bound without Message Length Yusuke Naito
2017/851 (PDF ) How to Use Metaheuristics for Design of Symmetric-Key Primitives Ivica Nikolić
2017/850 (PDF ) Breaking and Fixing Secure Similarity Approximations: Dealing with Adversarially Perturbed Inputs Evgenios M. Kornaropoulos, Petros Efstathopoulos
2017/849 (PDF ) FAST: Disk Encryption and Beyond Debrup Chakraborty, Sebati Ghosh, Cuauhtemoc Mancillas Lopez, Palash Sarkar
2017/848 (PDF ) Single Key Variant of PMAC_Plus Nilanjan Datta, Avijit Dutta, Mridul Nandi, Goutam Paul, Liting Zhang
2017/847 (PDF ) An Efficient Quantum Collision Search Algorithm and Implications on Symmetric Cryptography André Chailloux, María Naya-Plasencia, André Schrottenloher
2017/846 (PDF ) How to Prove Megabytes (Per Second) Yaron Gvili
2017/845 (PDF ) Improved Security for OCB3 Ritam Bhaumik, Mridul Nandi
2017/844 (PDF ) Implementing Conjunction Obfuscation under Entropic Ring LWE David Bruce Cousins, Giovanni Di Crescenzo, Kamil Doruk Gür, Kevin King, Yuriy Polyakov, Kurt Rohloff, Gerard W. Ryan, Erkay Savaş
2017/843 (PDF ) Hybrid Encryption in a Multi-User Setting, Revisited Federico Giacon, Eike Kiltz, Bertram Poettering
2017/842 (PDF ) Quam Bene Non Quantum: Bias in a Family of Quantum Random Number Generators Darren Hurley-Smith, Julio Hernandez-Castro
2017/841 (PDF ) Efficient Length Doubling From Tweakable Block Ciphers Yu Long Chen, Atul Luykx, Bart Mennink, Bart Preneel
2017/840 (PDF ) Fast Scalar Multiplication for Elliptic Curves over Binary Fields by Efficiently Computable Formulas Saud Al Musa, Guangwu Xu
2017/839 (PDF ) Noiseless Fully Homomorphic Encryption Jing Li, Licheng Wang
2017/838 (PDF ) Two-Round PAKE from Approximate SPH and Instantiations from Lattices Jiang Zhang, Yu Yu
2017/837 (PDF ) Tight Security Analysis of EHtM MAC Avijit Dutta, Ashwin Jha, Mridul Nandi
2017/836 (PDF ) Efficient Square-based Montgomery Multiplier for All Type C.1 Pentanomials Yin Li, Xingpo Ma, Qin Chen, Chuanda Qi
2017/835 (PDF ) Coppersmith's lattices and ``focus groups'': an attack on small-exponent RSA Stephen D. Miller, Bhargav Narayanan, Ramarathnam Venkatesan
2017/834 (PDF ) Authentication from Weak PRFs with Hidden Auxiliary Input Daniel Masny
2017/833 (PDF ) Efficient Hybrid Proxy Re-Encryption for Practical Revocation and Key Rotation Steven Myers, Adam Shull
2017/832 (PDF ) Mixture Differential Cryptanalysis and Structural Truncated Differential Attacks on round-reduced AES Lorenzo Grassi
2017/831 (PDF ) Security Proof of JAMBU under Nonce Respecting and Nonce Misuse Cases Geng Wang, Haiyang Zhang, Fengmei Liu
2017/830 (PDF ) Security proof for Round Robin Differential Phase Shift QKD Daan Leermakers, Boris Skoric
2017/829 (PDF ) Fault Attacks Made Easy: Differential Fault Analysis Automation on Assembly Code Jakub Breier, Xiaolu Hou, Yang Liu
2017/827 (PDF ) Scaling ORAM for Secure Computation Jack Doerner, abhi shelat
2017/826 (PDF ) 5Gen-C: Multi-input Functional Encryption and Program Obfuscation for Arithmetic Circuits Brent Carmer, Alex J. Malozemoff, Mariana Raykova
2017/825 (PDF ) Querying for Queries: Indexes of Queries for Efficient and Expressive IT-PIR Syed Mahbub Hafiz, Ryan Henry
2017/824 (PDF ) Improved Security Notions for Proxy Re-Encryption to Enforce Access Control Ela Lee
2017/823 (PDF ) Revive: Rebalancing Off-Blockchain Payment Networks Rami Khalil, Arthur Gervais
2017/822 (PDF ) On the Power of Optical Contactless Probing: Attacking Bitstream Encryption of FPGAs Shahin Tajik, Heiko Lohrke, Jean-Pierre Seifert, Christian Boit
2017/821 (PDF ) A Fast and Verified Software Stack for Secure Function Evaluation José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir, Benjamin Grégoire, Vincent Laporte, Vitor Pereira
2017/820 (PDF ) Concurrency and Privacy with Payment-Channel Networks Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei, Srivatsan Ravi
2017/819 (PDF ) S3ORAM: A Computation-Efficient and Constant Client Bandwidth Blowup ORAM with Shamir Secret Sharing Thang Hoang, Ceyhun D. Ozkaptan, Attila A. Yavuz, Jorge Guajardo, Tam Nguyen
2017/818 (PDF ) No-Match Attacks and Robust Partnering Definitions – Defining Trivial Attacks for Security Protocols is Not Trivial Yong Li, Sven Schäge
2017/816 (PDF ) A Framework for Constructing Fast MPC over Arithmetic Circuits with Malicious Adversaries and an Honest-Majority Yehuda Lindell, Ariel Nof
2017/815 (PDF ) Revisiting the Expected Cost of Solving uSVP and Applications to LWE Martin R. Albrecht, Florian Göpfert, Fernando Virdia, Thomas Wunderer
2017/814 (PDF ) Fast FPGA Implementations of Diffie-Hellman on the Kummer Surface of a Genus-2 Curve Philipp Koppermann, Fabrizio De Santis, Johann Heyszl, Georg Sigl
2017/813 (PDF ) Industrial Feasibility of Private Information Retrieval Angela Jäschke, Björn Grohmann, Frederik Armknecht, Andreas Schaad
2017/812 (PDF ) Optimal PRFs from Blockcipher Designs Bart Mennink, Samuel Neves
2017/811 (PDF ) Reassessing Grover's Algorithm Scott Fluhrer
2017/810 (PDF ) The TypTop System: Personalized Typo-Tolerant Password Checking Rahul Chatterjee, Joanne Woodage, Yuval Pnueli, Anusha Chowdhury, Thomas Ristenpart
2017/809 (PDF ) High-Precision Arithmetic in Homomorphic Encryption Hao Chen, Kim Laine, Rachel Player, Yuhou Xia
2017/808 (PDF ) On the Untapped Potential of Encoding Predicates by Arithmetic Circuits and Their Applications Shuichi Katsumata
2017/807 (PDF ) FAME: Fast Attribute-based Message Encryption Shashank Agrawal, Melissa Chase
2017/806 (PDF ) May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519 Daniel Genkin, Luke Valenta, Yuval Yarom
2017/805 (PDF ) Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives Raphael Bost, Brice Minaud, Olga Ohrimenko
2017/804 (PDF ) Improved Conditional Cube Attacks on Keccak Keyed Modes with MILP Method Zheng Li, Wenquan Bi, Xiaoyang Dong, Xiaoyun Wang
2017/803 (PDF ) Role-Based Ecosystem for Design, Development, and Deployment of Secure Multi-Party Data Analytics Applications Andrei Lapets, Kinan Dak Albab, Rawane Issa, Lucy Qin, Mayank Varia, Azer Bestavros, Frederick Jansen
2017/802 (PDF ) New Techniques for Structural Batch Verification in Bilinear Groups with Applications to Groth-Sahai Proofs Gottfried Herold, Max Hoffmann, Michael Kloo\ss, Carla Ràfols, Andy Rupp
2017/801 (PDF ) Short Attribute-Based Signatures for Arbitrary Turing Machines from Standard Assumptions Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
2017/800 (PDF ) Collisions and Semi-Free-Start Collisions for Round-Reduced RIPEMD-160 Fukang Liu, Florian Mendel, Gaoli Wang
2017/799 (PDF ) Practical Multi-party Private Set Intersection from Symmetric-Key Techniques Vladimir Kolesnikov, Naor Matania, Benny Pinkas, Mike Rosulek, Ni Trieu
2017/798 (PDF ) More Efficient Universal Circuit Constructions Daniel Günther, Ágnes Kiss, Thomas Schneider
2017/796 (PDF ) Lightweight Symmetric-Key Hidden Vector Encryption without Pairings Sikhar Patranabis, Debdeep Mukhopadhyay
2017/795 (PDF ) Private Constrained PRFs (and More) from LWE Zvika Brakerski, Rotem Tsabary, Vinod Vaikuntanathan, Hoeteck Wee
2017/794 (PDF ) Anonymous Single-Round Server-Aided Verification Elena Pagnin, Aikaterini Mitrokotsa, Keisuke Tanaka
2017/793 (PDF ) McBits Revisited Tung Chou
2017/792 (PDF ) Gimli, Lord of the Glittering TRS-80 Jean-Marie Chauvet
2017/791 (PDF ) Merged Mining: Curse of Cure? Aljosha Judmayer, Alexei Zamyatin, Nicholas Stifter, Artemios G. Voyiatzis, Edgar Weippl
2017/790 (PDF ) TinyOLE: Efficient Actively Secure Two-Party Computation from Oblivious Linear Function Evaluation Nico Döttling, Satrajit Ghosh, Jesper Buus Nielsen, Tobias Nilges, Roberto Trifiletti
2017/789 (PDF ) Low-communication parallel quantum multi-target preimage search Gustavo Banegas, Daniel J. Bernstein
2017/788 (PDF ) Attack on AES Implementation Exploiting Publicly-visible Partial Result William Diehl
2017/787 (PDF ) When Are Opaque Predicates Useful? Lukas Zobernig, Steven D. Galbraith, Giovanni Russello
2017/786 (PDF ) A Cryptographic Look at Multi-Party Channels Patrick Eugster, Giorgia Azzurra Marson, Bertram Poettering
2017/785 (PDF ) What about Bob? The Inadequacy of CPA Security for Proxy Reencryption Aloni Cohen
2017/784 (PDF ) Secure Channels and Termination: The Last Word on TLS Colin Boyd, Britta Hale
2017/783 (PDF ) HAL — The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion Marc Fyrbiak, Sebastian Wallat, Pawel Swierczynski, Max Hoffmann, Sebastian Hoppach, Matthias Wilhelm, Tobias Weidlich, Russell Tessier, Christof Paar
2017/782 (PDF ) Efficient Attribute-Based Secure Keyword Search on the Cloud Storage Wanfen Guo, Xiaolei Dong, Zhenfu Cao, Jiachen Shen
2017/781 (PDF ) Lattice-Based Techniques for Accountable Anonymity: Composition of Abstract Stern’s Protocols and Weak PRF with Efficient Protocols from LWR Rupeng Yang, Man Ho Au, Junzuo Lai, Qiuliang Xu, Zuoxia Yu
2017/780 (PDF ) New Algorithms for Solving LPN Bin Zhang, Xinxin Gong
2017/779 (PDF ) Efficient Random Grid Visual Cryptographic Schemes having Essential Members Bibhas Chandra Das, Md Kutubuddin Sardar, Avishek Adhikari
2017/778 (PDF ) MCMix: Anonymous Messaging via Secure Multiparty Computation Nikolaos Alexopoulos, Aggelos Kiayias, Riivo Talviste, Thomas Zacharias
2017/777 (PDF ) Encrypting Messages for Incomplete Chains of Certificates Sanjit Chatterjee, Deepak Garg, Aniket Kate, Tobias Theobald
2017/776 (PDF ) Field lifting for smaller UOV public keys Ward Beullens, Bart Preneel
2017/775 (PDF ) Consensus from Signatures of Work Juan A. Garay, Aggelos Kiayias, Giorgos Panagiotakos
2017/774 (PDF ) Computational problems in supersingular elliptic curve isogenies Steven D. Galbraith, Frederik Vercauteren
2017/773 (PDF ) A Novel Cryptographic Framework for Cloud File Systems and CryFS, a Provably-Secure Construction Sebastian Messmer, Jochen Rill, Dirk Achenbach, Jörn Müller-Quade
2017/772 (PDF ) Locality-Preserving Oblivious RAM Gilad Asharov, T-H. Hubert Chan, Kartik Nayak, Rafael Pass, Ling Ren, Elaine Shi
2017/771 (PDF ) Post-quantum security of the sponge construction Jan Czajkowski, Leon Groot Bruinderink, Andreas Hülsing, Christian Schaffner, Dominique Unruh
2017/770 (PDF ) PAPEETE: Private, Authorized, and Fast Personal Genomic Testing Angelo Massimo Perillo, Emiliano De Cristofaro
2017/769 (PDF ) Malicious-Secure Private Set Intersection via Dual Execution Peter Rindal, Mike Rosulek
2017/768 (PDF ) An Efficient Certificateless Proxy Re-Encryption Scheme without Pairing S. Sharmila Deva Selvi, Arinjita Paul, C. Pandu Rangan
2017/767 (PDF ) Quantum Key-Recovery on full AEZ Xavier Bonnetain
2017/766 (PDF ) GLYPH: A New Instantiation of the GLP Digital Signature Scheme Arjun Chopra
2017/765 (PDF ) Necessary conditions for designing secure stream ciphers with the minimal internal states Vahid Amin Ghafari, Honggang Hu, Mohammadsadegh alizadeh
2017/764 (PDF ) Categorising and Comparing Cluster-Based DPA Distinguishers Xinping Zhou, Carolyn Whitnall, Elisabeth Oswald, Degang Sun, Zhu Wang
2017/763 (PDF ) Improved Fully Homomorphic Encryption without Bootstrapping Masahiro Yagisawa
2017/762 (PDF ) Private Collaborative Neural Network Learning Melissa Chase, Ran Gilad-Bachrach, Kim Laine, Kristin Lauter, Peter Rindal
2017/761 (PDF ) Anti-SAT: Mitigating SAT Attack on Logic Locking Yang Xie, Ankur Srivastava
2017/759 (PDF ) Simple Amortized Proofs of Shortness for Linear Relations over Polynomial Rings Carsten Baum, Vadim Lyubashevsky
2017/758 (PDF ) On Improving Integer Factorization and Discrete Logarithm Computation using Partial Triangulation Fabrice Boudot
2017/757 (PDF ) CAKE: Code-based Algorithm for Key Encapsulation Paulo S. L. M. Barreto, Shay Gueron, Tim Gueneysu, Rafael Misoczki, Edoardo Persichetti, Nicolas Sendrier, Jean-Pierre Tillich
2017/756 (PDF ) Verifiable Private Polynomial Evaluation Xavier Bultel, Manik Lal Das, Hardik Gajera, David Gérault, Matthieu Giraud, Pascal Lafourcade
2017/755 (PDF ) Efficient, Reusable Fuzzy Extractors from LWE Daniel Apon, Chongwon Cho, Karim Eldefrawy, Jonathan Katz
2017/754 (PDF ) Long-Term Secure Time-Stamping using Preimage-Aware Hash Functions Ahto Buldas, Matthias Geihs, Johannes Buchmann
2017/753 (PDF ) CryptHOL: Game-based Proofs in Higher-order Logic David A. Basin, Andreas Lochbihler, S. Reza Sefidgar
2017/752 (PDF ) A Note on Attribute-Based Group Homomorphic Encryption Michael Clear, Ciaran McGoldrick
2017/751 (PDF ) Twisting Lattice and Graph Techniques to Compress Transactional Ledgers Rémi Géraud, David Naccache, Răzvan Roşie
2017/750 (PDF ) Adaptive-Secure VRFs with Shorter Keys from Static Assumptions Răzvan Roşie
2017/749 (PDF ) Searchable Encryption with Optimal Locality: Achieving Sublogarithmic Read Efficiency Ioannis Demertzis, Dimitrios Papadopoulos, Charalampos Papamanthou
2017/748 (PDF ) Efficient reductions in cyclotomic rings - Application to R-LWE based FHE schemes Jean-Claude Bajard, Julien Eynard, Anwar Hasan, Paulo Martins, Leonel Sousa, Vincent Zucca
2017/747 (PDF ) sLiSCP: Simeck-based Permutations for Lightweight Sponge Cryptographic Primitives Riham AlTawy, Raghvendra Rohit, Morgan He, Kalikinkar Mandal, Gangqiang Yang, Guang Gong
2017/746 (PDF ) On the Tightness of Forward-Secure Signature Reductions Michel Abdalla, Fabrice Benhamouda, David Pointcheval
2017/745 (PDF ) A Quantum ``Magic Box'' for the Discrete Logarithm Problem Burton S. Kaliski Jr.
2017/744 (PDF ) Binary Hash Tree based Certificate Access Management Virendra Kumar, Jonathan Petit, William Whyte
2017/743 (PDF ) Cryptanalysis of 22 1/2 rounds of Gimli Mike Hamburg
2017/742 (PDF ) Cryptanalysis of Compact-LWE Jonathan Bootle, Mehdi Tibouchi
2017/741 (PDF ) Dynamic Searchable Public-Key Ciphertexts with Fast Performance and Practical Security Peng Xu, Xia Gao, Wei Wang, Willy Susilo, Qianhong Wu, Hai Jin
2017/740 (PDF ) Convolutional Neural Networks with Data Augmentation against Jitter-Based Countermeasures -- Profiling Attacks without Pre-Processing -- Eleonora Cagli, Cécile Dumas, Emmanuel Prouff
2017/738 (PDF ) Private Intersection-Sum Protocol with Applications to Attributing Aggregate Ad Conversions Mihaela Ion, Ben Kreuter, Erhan Nergiz, Sarvar Patel, Shobhit Saxena, Karn Seth, David Shanahan, Moti Yung
2017/737 (PDF ) SecReach: Secure Reachability Computation on Encrypted Location Check-in Data Hanyu Quan, Boyang Wang, Iraklis Leontiadis, Ming Li, Yuqing Zhang
2017/736 (PDF ) SGX Remote Attestation is not Sufficient Yogesh Swami
2017/735 (PDF ) Faster Bootstrapping with Multiple Addends TanPing ZHOU, XiaoYuan YANG, LongFei LIU, Wei ZHANG, YiTao DING
2017/734 (PDF ) Round Optimal Concurrent Non-Malleability from Polynomial Hardness Dakshita Khurana
2017/733 (PDF ) Decoding Generalized Reed-Solomon Codes and Its Application to RLCE Encryption Scheme Yongge Wang
2017/732 (PDF ) Privacy-Preserving Ridge Regression Without Garbled Circuits Marc Joye
2017/731 (PDF ) Revisiting Difficulty Control for Blockchain Systems Dmitry Meshkov, Alexander Chepurnoy, Marc Jansen
2017/730 (PDF ) Second Order Statistical Behavior of LLL and BKZ Yang Yu, Léo Ducas
2017/729 (PDF ) Success Probability of Multiple/Multidimensional Linear Cryptanalysis Under General Key Randomisation Hypotheses Subhabrata Samajder, Palash Sarkar
2017/728 (PDF ) Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems Giulia Traverso, Carlos Garcia Cordero, Mehrdad Nojoumian, Reza Azarderakhsh, Denise Demirel, Sheikh Mahbub Habib, Johannes Buchmann
2017/727 (PDF ) A note on the implementation of the Number Theoretic Transform Michael Scott
2017/726 (PDF ) Proposal of primitive polynomials for Linux kernel PRNG David FONTAINE, Olivier VIVOLO
2017/725 (PDF ) AS$^3$: Adaptive Social Secret Sharing for Distributed Storage Systems Giulia Traverso, Denise Demirel, Sheikh Mahbub Habib, Johannes Buchmann
2017/724 (PDF ) Dynamic and Verifiable Hierarchical Secret Sharing Giulia Traverso, Denise Demirel, Johannes Buchmann
2017/723 (PDF ) An Equivalence Between Attribute-Based Signatures and Homomorphic Signatures, and New Constructions for Both Rotem Tsabary
2017/722 (PDF ) A Simpler Rate-Optimal CPIR Protocol Helger Lipmaa, Kateryna Pavlyk
2017/721 (PDF ) On Making U2F Protocol Leakage-Resilient via Re-keying Donghoon Chang, Sweta Mishra, Somitra Kumar Sanadhya, Ajit Pratap Singh
2017/720 (PDF ) Computing Low-Weight Discrete Logarithms Bailey Kacsmar, Sarah Plosker, Ryan Henry
2017/719 (PDF ) Efficient Proactive Secret Sharing Jacqueline Brendel, Denise Demirel
2017/718 (PDF ) Conditionally Secure Secrecy Computation using Secret Sharing Scheme for n<2k-1 (full paper) Ahmad Akmal Aminuddin Mohd Kamal, Keiichi Iwamura
2017/717 (PDF ) Fault Attacks on XEX Mode with Application to certain Authenticated Encryption Modes Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong
2017/716 (PDF ) Anonymous Post-Quantum Cryptocash Huang Zhang, Fangguo Zhang, Haibo Tian, Man Ho Au
2017/715 (PDF ) Privacy-Preserving Deep Learning via Additively Homomorphic Encryption Le Trieu Phong, Yoshinori Aono, Takuya Hayashi, Lihua Wang, Shiho Moriai
2017/714 (PDF ) The Edited Truth Shafi Goldwasser, Saleet Klein, Daniel Wichs
2017/713 (PDF ) More is Less: On the End-to-End Security of Group Chats in Signal, WhatsApp, and Threema Paul Rösler, Christian Mainka, Jörg Schwenk
2017/712 (PDF ) On desynchronised El Gamal algorithm Vasyl Ustimenko
2017/711 (PDF ) Composable Masking Schemes in the Presence of Physical Defaults and the Robust Probing Model Sebastian Faust, Vincent Grosso, Santos Merino Del Pozo, Clara Paglialonga, François-Xavier Standaert
2017/710 (PDF ) Distributed Computing with Channel Noise Abhinav Aggarwal, Varsha Dani, Thomas P. Hayes, Jared Saia
2017/709 (PDF ) spKEX: An optimized lattice-based key exchange Sauvik Bhattacharya, Oscar Garcia-Morchon, Ronald Rietman, Ludo Tolhuizen
2017/708 (PDF ) Reconsidering the Security Bound of AES-GCM-SIV Tetsu Iwata, Yannick Seurin
2017/707 (PDF ) Privacy-Preserving Ridge Regression on Distributed Data Irene Giacomelli, Somesh Jha, C. David Page, Kyonghwan Yoon
2017/706 (PDF ) SCATTER : A New Dimension in Side-Channel Hugues Thiebeauld, Georges Gagnerot, Antoine Wurcker, Christophe Clavier
2017/705 (PDF ) Multi-Hop Distance Estimation: How Far are You? Aikaterini Mitrokotsa, Cristina Onete, Elena Pagnin, Mahesh Perera
2017/704 (PDF ) A Key Backup Scheme Based on Bitcoin Zhongxiang Zheng, Chunhuan Zhao, Haining Fan, Xiaoyun Wang
2017/703 (PDF ) Optimally Sound Sigma Protocols Under DCRA Helger Lipmaa
2017/702 (PDF ) Better Bounds for Block Cipher Modes of Operation via Nonce-Based Key Derivation Shay Gueron, Yehuda Lindell
2017/701 (PDF ) Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage Marie-Sarah Lacharité, Brice Minaud, Kenneth G. Paterson
2017/700 (PDF ) Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability Johannes Buchmann, Denise Demirel, Lucas Schabhüser, Patrick Struck
2017/699 (PDF ) Runtime Code Polymorphism as a Protection Against Side Channel Attacks Damien Couroussé, Thierno Barry, Bruno Robisson, Philippe Jaillon, Olivier Potin, Jean-Louis Lanet
2017/698 (PDF ) δ-subgaussian Random Variables in Cryptography Sean Murphy, Rachel Player
2017/697 (PDF ) On Internal Re-keying Liliya R. Ahmetzyanova, Evgeny K. Alekseev, Igor B. Oshkin, Stanislav V. Smyshlyaev
2017/696 (PDF ) A Humble Theory and Application for Logic Encryption Hai Zhou
2017/695 (PDF ) Updatable Tokenization: Formal Definitions and Provably Secure Constructions Christian Cachin, Jan Camenisch, Eduarda Freire-Stoegbuchner, Anja Lehmann
2017/694 (PDF ) Atomically Trading with Roger: Gambling on the success of a hardfork Patrick McCorry, Ethan Heilman, Andrew Miller
2017/693 (PDF ) Cryptanalysis of Deoxys and its Internal Tweakable Block Ciphers Carlos Cid, Tao Huang, Thomas Peyrin, Yu Sasaki, Ling Song
2017/692 (PDF ) Towards Characterizing Securely Computable Two-Party Randomized Functions Deepesh Data, Manoj Prabhakaran
2017/691 (PDF ) Universal Forgery and Key Recovery Attacks: Application to FKS, FKD and Keyak Fanbao Liu, Fengmei Liu
2017/690 (PDF ) High Performance Post-Quantum Key Exchange on FPGAs Po-Chun Kuo, Wen-Ding Li, Yu-Wei Chen, Yuan-Che Hsu, Bo-Yuan Peng, Chen-Mou Cheng, Bo-Yin Yang
2017/689 (PDF ) On the security of HMFEv Yasufumi Hashimoto
2017/688 (PDF ) Quantum Collision-Finding in Non-Uniform Random Functions Marko Balogh, Edward Eaton, Fang Song
2017/686 (PDF ) On the Necessity of a Prescribed Block Validity Consensus: Analyzing Bitcoin Unlimited Mining Protocol Ren Zhang, Bart Preneel
2017/685 (PDF ) Compact-LWE: Enabling Practically Lightweight Public Key Encryption for Leveled IoT Device Authentication Dongxi Liu, Nan Li, Jongkil Kim, Surya Nepal
2017/684 (PDF ) Z-Channel: Scalable and Efficient Scheme in Zerocash Yuncong Zhang, Yu Long, Zhen Liu, Zhiqiang Liu, Dawu Gu
2017/683 (PDF ) Efficient Privacy-Preserving General Edit Distance and Beyond Ruiyu Zhu, Yan Huang
2017/682 (PDF ) Conditional Blind Signatures Alexandros Zacharakis, Panagiotis Grontas, Aris Pagourtzis
2017/681 (PDF ) Logical loophole in random 3-bit sequence generator Alexandre de Castro
2017/680 (PDF ) SOFIA: MQ-based signatures in the QROM Ming-Shing Chen, Andreas Hülsing, Joost Rijneveld, Simona Samardjiska, Peter Schwabe
2017/679 (PDF ) Searchable Encryption with Access Control Nils Löken
2017/678 (PDF ) Differential Fault Attack on Grain v1, ACORN v3 and Lizard Akhilesh Anilkumar Siddhanti, Santanu Sarkar, Subhamoy Maitra, Anupam Chattopadhyay
2017/677 (PDF ) Faster Unbalanced Private Set Intersection Amanda Cristina Davi Resende, Diego de Freitas Aranha
2017/676 (PDF ) Dynamic Verifiable Encrypted Keyword Search Using Bitmap Index and Homomorphic MAC Rajkumar Ramasamy, S. Sree Vivek, Praveen George, Bharat S. Rawal Kshatriya
2017/675 (PDF ) Memory-Tight Reductions Benedikt Auerbach, David Cash, Manuel Fersch, Eike Kiltz
2017/674 (PDF ) Transparent Memory Encryption and Authentication Mario Werner, Thomas Unterluggauer, Robert Schilling, David Schaffenrath, Stefan Mangard
2017/673 (PDF ) Differential Fault Analysis Automation Sayandeep Saha, Ujjawal Kumar, Debdeep Mukhopadhyay, Pallab Dasgupta
2017/672 (PDF ) Coding for interactive communication beyond threshold adversaries Anat Paskin-Cherniavsky, Slava Radune
2017/671 (PDF ) Guru: Universal Reputation Module for Distributed Consensus Protocols Alex Biryukov, Daniel Feher, Dmitry Khovratovich
2017/670 (PDF ) Private Set Intersection for Unequal Set Sizes with Mobile Applications Ágnes Kiss, Jian Liu, Thomas Schneider, N. Asokan, Benny Pinkas
2017/669 (PDF ) Speeding up Elliptic Curve Scalar Multiplication without Precomputation Kwang Ho Kim, Junyop Choe, Song Yun Kim, Namsu Kim, Sekung Hong
2017/668 (PDF ) Spot the Black Hat in a Dark Room: Parallelized Controlled Access Searchable Encryption on FPGAs Sikhar Patranabis, Debdeep Mukhopadhyay
2017/667 (PDF ) High-speed key encapsulation from NTRU Andreas Hülsing, Joost Rijneveld, John M. Schanck, Peter Schwabe
2017/666 (PDF ) On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees Katriel Cohn-Gordon, Cas Cremers, Luke Garratt, Jon Millican, Kevin Milner
2017/665 (PDF ) Lower bounds on communication for multiparty computation of multiple «AND» instances with secret sharing Michael Raskin
2017/664 (PDF ) Message Franking via Committing Authenticated Encryption Paul Grubbs, Jiahui Lu, Thomas Ristenpart
2017/663 (PDF ) Securing Memory Encryption and Authentication Against Side-Channel Attacks Using Unprotected Primitives Thomas Unterluggauer, Mario Werner, Stefan Mangard
2017/662 (PDF ) The problem with the SURF scheme Thomas Debris-Alazard, Nicolas Sendrier, Jean-Pierre Tillich
2017/661 (PDF ) MuSE: Multimodal Searchable Encryption for Cloud Applications Bernardo Ferreira, João Leitão, Henrique Domingos
2017/660 (PDF ) Profiling Good Leakage Models For Masked Implementations Changhai Ou, Zhu Wang, Degang Sun, Xinping Zhou
2017/659 (PDF ) Forward-Secure Searchable Encryption on Labeled Bipartite Graphs Russell W. F. Lai, Sherman S. M. Chow
2017/658 (PDF ) Privacy for Targeted Advertising Avradip Mandal, John Mitchell, Hart Montgomery, Arnab Roy
2017/657 (PDF ) CCA-secure Predicate Encryption from Pair Encoding in Prime Order Groups: Generic and Efficient Sanjit Chatterjee, Sayantan Mukherjee, Tapas Pandit
2017/656 (PDF ) A Scalable Proof-of-Stake Blockchain in the Open Setting (or, How to Mimic Nakamoto's Design via Proof-of-Stake) Lei Fan, Hong-Sheng Zhou
2017/655 (PDF ) A Real-time Inversion Attack on the GMR-2 Cipher Used in the Satellite Phones Jiao Hu, Ruilin Li, Chaojing Tang
2017/654 (PDF ) A Secure and Private Billing Protocol for Smart Metering Tom Eccles, Basel Halak
2017/653 (PDF ) Universal Forgery with Birthday Paradox: Application to Blockcipher-based Message Authentication Codes and Authenticated Encryptions Fanbao Liu, Fengmei Liu
2017/652 (PDF ) Pseudorandom Functions: Three Decades Later Andrej Bogdanov, Alon Rosen
2017/650 (PDF ) Efficient Public Trace and Revoke from Standard Assumptions Shweta Agrawal, Sanjay Bhattacherjee, Duong Hieu Phan, Damien Stehle, Shota Yamada
2017/649 (PDF ) Blockcipher-based Authenticated Encryption: How Small Can We Go? Avik Chakraborti, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi
2017/648 (PDF ) CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds Kirill Nikitin, Eleftherios Kokoris-Kogias, Philipp Jovanovic, Linus Gasser, Nicolas Gailly, Ismail Khoffi, Justin Cappos, Bryan Ford
2017/647 (PDF ) A TMDTO Attack Against Lizard Subhamoy Maitra, Nishant Sinha, Akhilesh Siddhanti, Ravi Anand, Sugata Gangopadhyay
2017/646 (PDF ) Rational Trust Modeling Mehrdad Nojoumian
2017/645 (PDF ) SPHINCS-Simpira: Fast Stateless Hash-based Signatures with Post-quantum Security Shay Gueron, Nicky Mouha
2017/643 (PDF ) Private Data Aggregation on a Budget Morten Dahl, Valerio Pastro, Mathieu Poumeyrol
2017/642 (PDF ) Reducing Multi-Secret Sharing Problem to Sharing a Single Secret Based on Cellular Automata Nasrollah Pakniat, Mahnaz Noroozi, Ziba Eslami
2017/641 (PDF ) Integer Version of Ring-LWE and its Applications Gu Chunsheng
2017/640 (PDF ) Non-Interactive Provably Secure Attestations for Arbitrary RSA Prime Generation Algorithms Fabrice Benhamouda, Houda Ferradi, Rémi Géraud, David Naccache
2017/639 (PDF ) One TPM to Bind Them All: Fixing TPM 2.0 for Provably Secure Anonymous Attestation Jan Camenisch, Liqun Chen, Manu Drijvers, Anja Lehmann, David Novick, Rainer Urian
2017/638 (PDF ) From Single-Key to Collusion-Resistant Secret-Key Functional Encryption by Leveraging Succinctness Fuyuki Kitagawa, Ryo Nishimaki, Keisuke Tanaka
2017/637 (PDF ) Very High Order Masking: Efficient Implementation and Security Evaluation Anthony Journault, François-Xavier Standaert
2017/636 (PDF ) Implementing 128-bit Secure MPKC Signatures Ming-Shing Chen, Wen-Ding Li, Bo-Yuan Peng, Bo-Yin Yang, Chen-Mou Cheng
2017/635 (PDF ) Perun: Virtual Payment Hubs over Cryptocurrencies Stefan Dziembowski, Lisa Eckey, Sebastian Faust, Daniel Malinowski
2017/634 (PDF ) CRYSTALS -- Kyber: a CCA-secure module-lattice-based KEM Joppe Bos, Léo Ducas, Eike Kiltz, Tancrède Lepoint, Vadim Lyubashevsky, John M. Schanck, Peter Schwabe, Gregor Seiler, Damien Stehlé
2017/633 (PDF ) CRYSTALS -- Dilithium: Digital Signatures from Module Lattices Leo Ducas, Tancrede Lepoint, Vadim Lyubashevsky, Peter Schwabe, Gregor Seiler, Damien Stehle
2017/632 (PDF ) Generalized Polynomial Decomposition for S-boxes with Application to Side-Channel Countermeasures Dahmun Goudarzi, Matthieu Rivain, Damien Vergnaud, Srinivas Vivek
2017/631 (PDF ) Certifying Trapdoor Permutations, Revisited Ran Canetti, Amit Lichtenberg
2017/630 (PDF ) Gimli: a cross-platform permutation Daniel J. Bernstein, Stefan Kölbl, Stefan Lucks, Pedro Maat Costa Massolino, Florian Mendel, Kashif Nawaz, Tobias Schneider, Peter Schwabe, François-Xavier Standaert, Yosuke Todo, Benoît Viguier
2017/629 (PDF ) A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks Romain Poussier, Yuanyuan Zhou, François-Xavier Standaert
2017/628 (PDF ) Middle-Product Learning With Errors Miruna Rosca, Amin Sakzad, Ron Steinfeld, Damien Stehle
2017/627 (PDF ) Sliding right into disaster: Left-to-right sliding windows leak Daniel J. Bernstein, Joachim Breitner, Daniel Genkin, Leon Groot Bruinderink, Nadia Heninger, Tanja Lange, Christine van Vredendaal, Yuval Yarom
2017/626 (PDF ) CycSAT: SAT-Based Attack on Cyclic Logic Encryptions Hai Zhou, Ruifeng Jiang, Shuyu Kong
2017/625 (PDF ) How to Break Secure Boot on FPGA SoCs through Malicious Hardware Nisha Jacob, Johann Heyszl, Andreas Zankl, Carsten Rolfes, Georg Sigl
2017/624 (PDF ) Fast Leakage Assessment Oscar Reparaz, Benedikt Gierlichs, Ingrid Verbauwhede
2017/623 (PDF ) Back to Massey: Impressively fast, scalable and tight security evaluation tools Marios O. Choudary, P. G. Popescu
2017/622 (PDF ) GIFT: A Small Present Subhadeep Banik, Sumit Kumar Pandey, Thomas Peyrin, Yu Sasaki, Siang Meng Sim, Yosuke Todo
2017/621 (PDF ) Novel Bypass Attack and BDD-based Tradeoff Analysis Against all Known Logic Locking Attacks Xiaolin Xu, Bicky Shakya, Mark M. Tehranipoor, Domenic Forte
2017/620 (PDF ) The Algebraic Group Model and its Applications Georg Fuchsbauer, Eike Kiltz, Julian Loss
2017/619 (PDF ) Black-Box Constructions of Signature Schemes in the Bounded Leakage Setting Qiong Huang, Jianye Huang
2017/618 (PDF ) CacheZoom: How SGX Amplifies The Power of Cache Attacks Ahmad Moghimi, Gorka Irazoqui, Thomas Eisenbarth
2017/617 (PDF ) Secure Arithmetic Computation with Constant Computational Overhead Benny Applebaum, Ivan Damgård, Yuval Ishai, Michael Nielsen, Lior Zichron
2017/616 (PDF ) Statement Voting Bingsheng Zhang, Hong-Sheng Zhou
2017/615 (PDF ) A Framework to Select Parameters for Lattice-Based Cryptography Nabil Alkeilani Alkadri, Johannes Buchmann, Rachid El Bansarkhani, Juliane Krämer
2017/614 (PDF ) Brute–Force Search Strategies for Single–Trace and Few–Traces Template Attacks on the DES Round Keys of a Recent Smart Card Mathias Wagner, Stefan Heyse, Charles Guillemet
2017/613 (PDF ) Illusion and Dazzle: Adversarial Optical Channel Exploits against Lidars for Automotive Applications Hocheol Shin, Dohyun Kim, Yujin Kwon, Yongdae Kim
2017/612 (PDF ) Large Modulus Ring-LWE $\geq$ Module-LWE Martin R. Albrecht, Amit Deo
2017/611 (PDF ) Multi-Rate Threshold FlipThem David Leslie, Chris Sherfield, Nigel P. Smart
2017/610 (PDF ) Differential Attacks: Using Alternative Operations Céline Blondeau, Roberto Civino, Massimiliano Sala
2017/609 (PDF ) On the discrete logarithm problem for prime-field elliptic curves Alessandro Amadori, Federico Pintore, Massimiliano Sala
2017/608 (PDF ) Your Rails Cannot Hide From Localized EM: How Dual-Rail Logic Fails on FPGAs Vincent Immler, Robert Specht, Florian Unterstein
2017/607 (PDF ) Leighton-Micali Hash-Based Signatures in the Quantum Random-Oracle Model Edward Eaton
2017/606 (PDF ) Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge Johannes Buchmann, Niklas Büscher, Florian Göpfert, Stefan Katzenbeisser, Juliane Krämer, Daniele Micciancio, Sander Siim, Christine van Vredendaal, Michael Walter
2017/605 (PDF ) Unlinkable and Strongly Accountable Sanitizable Signatures from Verifiable Ring Signatures Xavier Bultel, Pascal Lafourcade
2017/604 (PDF ) A Modular Analysis of the Fujisaki-Okamoto Transformation Dennis Hofheinz, Kathrin Hövelmanns, Eike Kiltz
2017/603 (PDF ) Cryptanalytic Time-Memory Tradeoff for Password Hashing Schemes Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya
2017/602 (PDF ) A multi-party protocol for constructing the public parameters of the Pinocchio zk-SNARK Sean Bowe, Ariel Gabizon, Matthew D. Green
2017/601 (PDF ) Implementation and Evaluation of a Lattice-Based Key-Policy ABE Scheme Wei Dai, Yarkın Doröz, Yuriy Polyakov, Kurt Rohloff, Hadi Sajjadpour, Erkay Savaş, Berk Sunar
2017/600 (PDF ) Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives -- Applications to AES, PRESENT and SKINNY Jeremy Jean, Amir Moradi, Thomas Peyrin, Pascal Sasdrich
2017/599 (PDF ) A Subversion-Resistant SNARK Behzad Abdolmaleki, Karim Baghery, Helger Lipmaa, Michal Zajac
2017/598 (PDF ) Quantum Resource Estimates for Computing Elliptic Curve Discrete Logarithms Martin Roetteler, Michael Naehrig, Krysta M. Svore, Kristin Lauter
2017/597 (PDF ) Round Optimal Concurrent MPC via Strong Simulation Saikrishna Badrinarayanan, Vipul Goyal, Abhishek Jain, Dakshita Khurana, Amit Sahai
2017/596 (PDF ) A Side-Channel Assisted Cryptanalytic Attack Against QcBits Mélissa Rossi, Mike Hamburg, Michael Hutter, Mark E. Marson
2017/595 (PDF ) FPGA-based Key Generator for the Niederreiter Cryptosystem using Binary Goppa Codes Wen Wang, Jakub Szefer, Ruben Niederhagen
2017/594 (PDF ) Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption Robert Primas, Peter Pessl, Stefan Mangard
2017/593 (PDF ) Solving multivariate polynomial systems and an invariant from commutative algebra Alessio Caminata, Elisa Gorla
2017/592 (PDF ) Speeding up lattice sieve with Xeon Phi coprocessor Anja Becker, Dusan Kostic
2017/591 (PDF ) On the Security of Carrier Phase-based Ranging Hildur Olafsdottir, Aanjhan Ranganathan, Srdjan Capkun
2017/590 (PDF ) Constant bandwidth ORAM with small block size using PIR operations Linru Zhang, Gongxian Zeng, Yuechen Chen, Siu-Ming Yiu, Nairen Cao, Zheli Liu
2017/589 (PDF ) An Attempt to Cryptanalyze A Partially Known Cipher Algorithm Juay Guan Hee
2017/588 (PDF ) Renyi Entropy Estimation Revisited Maciej Obremski, Maciej Skorski
2017/587 (PDF ) Subversion-zero-knowledge SNARKs Georg Fuchsbauer
2017/586 (PDF ) Deterministic, Stash-Free Write-Only ORAM Daniel S. Roche, Adam J. Aviv, Seung Geol Choi, Travis Mayberry
2017/585 (PDF ) Internet Voting Using Zcash Pavel Tarasov, Hitesh Tewari
2017/584 (PDF ) Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks Luka Malisa, Kari Kostiainen, Thomas Knell, David Sommer, Srdjan Capkun
2017/582 (PDF ) (Finite) Field Work: Choosing the Best Encoding of Numbers for FHE Computation Angela Jäschke, Frederik Armknecht
2017/581 (PDF ) Time-Memory Trade-offs for Parallel Collision Search Algorithms Monika Trimoska, Sorina Ionica, Gilles Dequen
2017/580 (PDF ) Analysing Relations involving small number of Monomials in AES S- Box Riddhi Ghosal
2017/579 (PDF ) Birthday Attack on Dual EWCDM Mridul Nandi
2017/578 (PDF ) TLS-N: Non-repudiation over TLS Enabling - Ubiquitous Content Signing for Disintermediation Hubert Ritzdorf, Karl Wüst, Arthur Gervais, Guillaume Felley, Srdjan Capkun
2017/577 (PDF ) Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT Sensors Steffen Schulz, André Schaller, Florian Kohnhäuser, Stefan Katzenbeisser
2017/576 (PDF ) The Security of SIMON-like Ciphers Against Linear Cryptanalysis Zhengbin Liu, Yongqiang Li, Mingsheng Wang
2017/575 (PDF ) Quantum Collision-Resistance of Non-uniformly Distributed Functions: Upper and Lower Bounds Ehsan Ebrahimi, Dominique Unruh
2017/573 (PDF ) Ouroboros Praos: An adaptively-secure, semi-synchronous proof-of-stake protocol Bernardo David, Peter Ga{ž}i, Aggelos Kiayias, Alexander Russell
2017/572 (PDF ) MXPUF: Secure PUF Design against State-of-the-art Modeling Attacks Phuong Ha Nguyen, Durga Prasad Sahoo, Chenglu Jin, Kaleel Mahmood, Marten van Dijk
2017/571 (PDF ) Faster Algorithms for Isogeny Problems using Torsion Point Images Christophe Petit
2017/570 (PDF ) Can You Trust Your Encrypted Cloud? An Assessment of SpiderOakONE’s Security Anders P. K. Dalskov, Claudio Orlandi
2017/569 (PDF ) Enforcing Input Correctness via Certification in Garbled Circuit Evaluation Yihua Zhang, Marina Blanton, Fattaneh Bayatbabolghani
2017/568 (PDF ) Towards Doubly Efficient Private Information Retrieval Ran Canetti, Justin Holmgren, Silas Richelson
2017/567 (PDF ) Can We Access a Database Both Locally and Privately? Elette Boyle, Yuval Ishai, Rafael Pass, Mary Wootters
2017/566 (PDF ) Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services Matteo Campanelli, Rosario Gennaro, Steven Goldfeder, Luca Nizzardo
2017/565 (PDF ) A Formal Foundation for Secure Remote Execution of Enclaves Pramod Subramanyan, Rohit Sinha, Ilia Lebedev, Srinivas Devadas, Sanjit Seshia
2017/564 (PDF ) Performance Counters to Rescue: A Machine Learning based safeguard against Micro-architectural Side-Channel-Attacks Manaar Alam, Sarani Bhattacharya, Debdeep Mukhopadhyay, Sourangshu Bhattacharya
2017/563 (PDF ) Weak is Better: Tightly Secure Short Signatures from Weak PRFs Jacob Alperin-Sheriff, Daniel Apon
2017/562 (PDF ) Making Password Authenticated Key Exchange Suitable For Resource-Constrained Industrial Control Devices Björn Haase, Benoît Labrique
2017/561 (PDF ) Privacy-Free Garbled Circuits for Formulas: Size Zero and Information-Theoretic Yashvanth Kondi, Arpita Patra
2017/560 (PDF ) Notes on the design and analysis of SIMON and SPECK Ray Beaulieu, Douglas Shors, Jason Smith, Stefan Treatman-Clark, Bryan Weeks, Louis Wingers
2017/559 (PDF ) Human Computing for Handling Strong Corruptions in Authenticated Key Exchange Alexandra Boldyreva, Shan Chen, Pierre-Alain Dupont, David Pointcheval
2017/557 (PDF ) Watermarking Public-key Cryptographic Functionalities and Implementations Foteini Baldimtsi, Aggelos Kiayias, Katerina Samari
2017/556 (PDF ) Multiplication and Division over Extended Galois Field GF($p^q$): A new Approach to find Monic Irreducible Polynomials over any Galois Field GF($p^q$). Sankhanil Dey, Ranjan Ghosh
2017/555 (PDF ) Robust Non-Interactive Multiparty Computation Against Constant-Size Collusion Fabrice Benhamouda, Hugo Krawczyk, Tal Rabin
2017/554 (PDF ) Trapping ECC with Invalid Curve Bug Attacks Renaud Dubois
2017/553 (PDF ) Further Analysis of a Proposed Hash-Based Signature Standard Scott Fluhrer
2017/552 (PDF ) Fast Secure Two-Party ECDSA Signing Yehuda Lindell
2017/551 (PDF ) A Fourier Analysis Based Attack against Physically Unclonable Functions Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert
2017/550 (PDF ) Committed MPC - Maliciously Secure Multiparty Computation from Homomorphic Commitments Tore Kasper Frederiksen, Benny Pinkas, Avishay Yanai
2017/549 (PDF ) ZeroTrace : Oblivious Memory Primitives from Intel SGX Sajin Sasy, Sergey Gorbunov, Christopher W. Fletcher
2017/548 (PDF ) Fully Homomorphic Encryption from the Finite Field Isomorphism Problem Yarkın Doröz, Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman, Berk Sunar, William Whyte, Zhenfei Zhang
2017/547 (PDF ) Security Analysis of an Ultra-lightweight RFID Authentication Protocol for M-commerce Seyed Farhad Aghili, Hamid Mala
2017/546 (PDF ) X509CLOUD - FRAMEWORK FOR A UBIQUITOUS PKI Hitesh Tewari, Arthur Hughes, Stefan Weber, Tomas Barry
2017/545 (PDF ) Resource-efficient OT combiners with active security Ignacio Cascudo, Ivan Damgård, Oriol Farràs, Samuel Ranellucci
2017/544 (PDF ) Securing Abe's Mix-net Against Malicious Verifiers via Witness Indistinguishability Elette Boyle, Saleet Klein, Alon Rosen, Gil Segev
2017/543 (PDF ) Identity-Based Encryption from the Diffie-Hellman Assumption Nico Döttling, Sanjam Garg
2017/542 (PDF ) A New Distribution-Sensitive Secure Sketch and Popularity-Proportional Hashing Joanne Woodage, Rahul Chatterjee, Yevgeniy Dodis, Ari Juels, Thomas Ristenpart
2017/541 (PDF ) Lower Bounds on Obfuscation from All-or-Nothing Encryption Primitives Sanjam Garg, Mohammad Mahmoody, Ameer Mohammed
2017/540 (PDF ) Snarky Signatures: \\ Minimal Signatures of Knowledge from Simulation-Extractable SNARKs Jens Groth, Mary Maller
2017/539 (PDF ) Public-Seed Pseudorandom Permutations Pratik Soni, Stefano Tessaro
2017/538 (PDF ) New security notions and feasibility results for authentication of quantum data Sumegha Garg, Henry Yuen, Mark Zhandry
2017/537 (PDF ) Information-theoretic Indistinguishability via the Chi-squared Method Wei Dai, Viet Tung Hoang, Stefano Tessaro
2017/536 (PDF ) HACL*: A Verified Modern Cryptographic Library Jean Karim Zinzindohoué, Karthikeyan Bhargavan, Jonathan Protzenko, Benjamin Beurdouche
2017/535 (PDF ) ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication Tetsu Iwata, Kazuhiko Minematsu, Thomas Peyrin, Yannick Seurin
2017/534 (PDF ) Functional Graph Revisited: Updates on (Second) Preimage Attacks on Hash Combiners Zhenzhen Bao, Lei Wang, Jian Guo, Dawu Gu
2017/533 (PDF ) Quantum non-malleability and authentication Gorjan Alagic, Christian Majenz
2017/532 (PDF ) All-But-Many Lossy Trapdoor Functions from Lattices and Applications Xavier Boyen, Qinyi Li
2017/531 (PDF ) Template Attack vs Bayes Classifier Stjepan Picek, Annelie Heuser, Sylvain Guilley
2017/530 (PDF ) Non-Malleable Codes for Space-Bounded Tampering Sebastian Faust, Kristina Hostakova, Pratyay Mukherjee, Daniele Venturi
2017/529 (PDF ) Non-Full Sbox Linearization: Applications to Collision Attacks on Round-Reduced Keccak Ling Song, Guohong Liao, Jian Guo
2017/528 (PDF ) Componentwise APNness, Walsh uniformity of APN functions and cyclic-additive difference sets Claude Carlet
2017/527 (PDF ) Key Rotation for Authenticated Encryption Adam Everspaugh, Kenneth Paterson, Thomas Ristenpart, Sam Scott
2017/526 (PDF ) Evaluating web PKIs - A Survey Jiangshan Yu, Mark Ryan
2017/525 (PDF ) Kurosawa-Desmedt Meets Tight Security Romain Gay, Dennis Hofheinz, Lisa Kohl
2017/524 (PDF ) Compact Structure-preserving Signatures with Almost Tight Security Masayuki Abe, Dennis Hofheinz, Ryo Nishimaki, Miyako Ohkubo, Jiaxin Pan
2017/523 (PDF ) Short, Invertible Elements in Partially Splitting Cyclotomic Rings and Applications to Lattice-Based Zero-Knowledge Proofs Vadim Lyubashevsky, Gregor Seiler
2017/522 (PDF ) On the Hardness of the Mersenne Low Hamming Ratio Assumption Marc Beunardeau, Aisling Connolly, Rémi Géraud, David Naccache
2017/521 (PDF ) Breaking the FF3 Format-Preserving Encryption Standard Over Small Domains F. Betül Durak, Serge Vaudenay
2017/520 (PDF ) The Price of Low Communication in Secure Multi-Party Computation Juan Garay, Yuval Ishai, Rafail Ostrovsky, Vassilis Zikas
2017/519 (PDF ) Efficient, Constant-Round and Actively Secure MPC: Beyond the Three-Party Case Nishanth Chandran, Juan A. Garay, Payman Mohassel, Satyanarayana Vusirikala
2017/518 (PDF ) qDSA: Small and Secure Digital Signatures with Curve-based Diffie-Hellman Key Pairs Joost Renes, Benjamin Smith
2017/517 (PDF ) PRF-ODH: Relations, Instantiations, and Impossibility Results Jacqueline Brendel, Marc Fischlin, Felix Günther, Christian Janson
2017/516 (PDF ) Characterizations of the differential uniformity of vectorial functions by the Walsh transform Claude Carlet
2017/515 (PDF ) Be Adaptive, Avoid Overcommitting Zahra Jafargholi, Chethan Kamath, Karen Klein, Ilan Komargodski, Krzysztof Pietrzak, Daniel Wichs
2017/514 (PDF ) Identity-based Encryption from Codes with Rank Metric Philippe Gaborit, Adrien Hauteville, Duong Hieu Phan, Jean-Pierre Tillich
2017/513 (PDF ) Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor $p^\alpha q^\beta$ Patrick Holzer, Thomas Wunderer
2017/511 (PDF ) State of the Art in Lightweight Symmetric Cryptography Alex Biryukov, Leo Perrin
2017/510 (PDF ) Hedging Public-Key Encryption in the Real World Alexandra Boldyreva, Christopher Patton, Thomas Shrimpton
2017/509 (PDF ) Quantum Security of NMAC and Related Constructions Fang Song, Aaram Yun
2017/508 (PDF ) Generalized Distinguishing Attack: A New Cryptanalysis of AES-like Permutations Victor Cauchois, Clément Gomez, Reynald Lercier
2017/507 (PDF ) Inverted Leftover Hash Lemma Maciej Obremski, Maciej Skórski
2017/505 (PDF ) Side-Channel Attacks on BLISS Lattice-Based Signatures -- Exploiting Branch Tracing Against strongSwan and Electromagnetic Emanations in Microcontrollers Thomas Espitau, Pierre-Alain Fouque, Benoit Gerard, Mehdi Tibouchi
2017/504 (PDF ) A simple and compact algorithm for SIDH with arbitrary degree isogenies Craig Costello, Huseyin Hisil
2017/503 (PDF ) Encryption Switching Protocols Revisited: Switching modulo $p$ Guilhem Castagnos, Laurent Imbert, Fabien Laguillaumie
2017/502 (PDF ) DeepSecure: Scalable Provably-Secure Deep Learning Bita Darvish Rouhani, M. Sadegh Riazi, Farinaz Koushanfar
2017/501 (PDF ) A Formal Treatment of Multi-key Channels Felix Günther, Sogol Mazaheri
2017/500 (PDF ) Algebraic XOR-RKA-Secure Pseudorandom Functions from Post-Zeroizing Multilinear Maps Michel Abdalla, Fabrice Benhamouda, Alain Passelègue
2017/499 (PDF ) Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with A Counterexample Fuchun Guo, Rongmao Chen, Willy Susilo, Jianchang Lai, Guomin Yang, Yi Mu
2017/498 (PDF ) Full-State Keyed Duplex With Built-In Multi-User Support Joan Daemen, Bart Mennink, Gilles Van Assche
2017/497 (PDF ) Time-Memory Tradeoff Attacks on the MTP Proof-of-Work Scheme Itai Dinur, Niv Nadler
2017/496 (PDF ) Modes of Operation Suitable for Computing on Encrypted Data Dragos Rotaru, Nigel P. Smart, Martijn Stam
2017/495 (PDF ) Multi-Key Authenticated Encryption with Corruptions: Reductions are Lossy Tibor Jager, Martijn Stam, Ryan Stanley-Oakes, Bogdan Warinschi
2017/494 (PDF ) A Reaction Attack on the QC-LDPC McEliece Cryptosystem Tomas Fabsic, Viliam Hromada, Paul Stankovski, Pavol Zajac, Qian Guo, Thomas Johansson
2017/493 (PDF ) Robust Fuzzy Extractors and Helper Data Manipulation Attacks Revisited: Theory vs Practice Georg T. Becker
2017/492 (PDF ) Reducing Communication Channels in MPC Marcel Keller, Dragos Rotaru, Nigel P. Smart, Tim Wood
2017/491 (PDF ) Laconic Oblivious Transfer and its Applications Chongwon Cho, Nico Döttling, Sanjam Garg, Divya Gupta, Peihan Miao, Antigoni Polychroniadou
2017/490 (PDF ) To BLISS-B or not to be - Attacking strongSwan's Implementation of Post-Quantum Signatures Peter Pessl, Leon Groot Bruinderink, Yuval Yarom
2017/489 (PDF ) Multi Collision Resistant Hash Functions and their Applications Itay Berman, Akshay Degwekar, Ron D. Rothblum, Prashant Nalini Vasudevan
2017/488 (PDF ) Multi-Collision Resistance: A Paradigm for Keyless Hash Functions Nir Bitansky, Yael Tauman Kalai, Omer Paneth
2017/487 (PDF ) New Linear Attacks on Block Cipher GOST Yi LU
2017/486 (PDF ) Collision Resistant Hashing for Paranoids: Dealing with Multiple Collisions Ilan Komargodski, Moni Naor, Eylon Yogev
2017/485 (PDF ) Authenticating compromisable storage systems Jiangshan Yu, Mark Ryan, Liqun Chen
2017/484 (PDF ) Cryptanalysis of Middle Lattice on the Overstretched NTRU Problem for General Modulus Polynomial Jung Hee Cheon, Minki Hhan, Changmin Lee
2017/483 (PDF ) A multi-start heuristic for multiplicative depth minimization of boolean circuits Sergiu Carpov, Pascal Aubry, Renaud Sirdey
2017/482 (PDF ) On the Statistical Leak of the GGH13 Multilinear Map and some Variants Léo Ducas, Alice Pellet--Mary
2017/481 (PDF ) A New Public-Key Cryptosystem via Mersenne Numbers Divesh Aggarwal, Antoine Joux, Anupam Prakash, Miklos Santha
2017/480 (PDF ) Sharper Bounds in Lattice-Based Cryptography using the Rényi Divergence Thomas Prest
2017/479 (PDF ) Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions Keita Emura
2017/478 (PDF ) Refined Probability of Differential Characteristics Including Dependency Between Multiple Rounds Anne Canteaut, Eran Lambooij, Samuel Neves, Shahram Rasoolzadeh, Yu Sasaki, Marc Stevens
2017/477 (PDF ) Constrained Keys for Invertible Pseudorandom Functions Dan Boneh, Sam Kim, David J. Wu
2017/476 (PDF ) Forward-Security under Continual Leakage Mihir Bellare, Adam O'Neill, Igors Stepanovs
2017/475 (PDF ) Security of Even--Mansour Ciphers under Key-Dependent Messages Pooya Farshim, Louiza Khati, Damien Vergnaud
2017/474 (PDF ) Insuperability of the Standard Versus Ideal Model Gap for Tweakable Blockcipher Security Bart Mennink
2017/473 (PDF ) Encrypted Davies-Meyer and Its Dual: Towards Optimal Security Using Mirror Theory Bart Mennink, Samuel Neves
2017/472 (PDF ) A Unified Framework for Secure Search Over Encrypted Cloud Data Cengiz Orencik, Erkay Savas, Mahmoud Alewiwi
2017/471 (PDF ) Total Break of the Fully Homomorphic Multivariate Encryption Scheme of 2017/458: Decryption can not be of low degree Jacob Alperin-Sheriff, Jintai Ding, Albrecht Petzoldt, Daniel Smith Tone
2017/470 (PDF ) On the Relation Between SIM and IND-RoR Security Models for PAKEs José Becerra, Vincenzo Iovino, Dimiter Ostrev, Marjan Skrobot
2017/469 (PDF ) Short CCA-Secure Attribute-Based Encryption Hiroaki Anada, Seiko Arita
2017/468 (PDF ) Why Your Encrypted Database Is Not Secure Paul Grubbs, Thomas Ristenpart, Vitaly Shmatikov
2017/467 (PDF ) Access Control Encryption for General Policies from Standard Assumptions Sam Kim, David J. Wu
2017/466 (PDF ) Tweakable Blockciphers for Efficient Authenticated Encryptions with Beyond the Birthday-Bound Security Yusuke Naito
2017/465 (PDF ) Lelantos: A Blockchain-based Anonymous Physical Delivery System Riham AlTawy, Muhammad ElSheikh, Amr M. Youssef, Guang Gong
2017/464 (PDF ) On the Structure of Unconditional UC Hybrid Protocols Mike Rosulek, Morgan Shirley
2017/463 (PDF ) Proving Resistance against Invariant Attacks: How to Choose the Round Constants Christof Beierle, Anne Canteaut, Gregor Leander, Yann Rotella
2017/462 (PDF ) Leakage-Resilient Tweakable Encryption from One-Way Functions Suvradip Chakraborty, Chester Rebeiro, Debdeep Mukhopadhyay, C. Pandu Rangan
2017/461 (PDF ) Security Definitions For Hash Functions: Combining UCE and Indifferentiability Daniel Jost, Ueli Maurer
2017/460 (PDF ) Transitioning to a Quantum-Resistant Public Key Infrastructure Nina Bindel, Udyani Herath, Matthew McKague, Douglas Stebila
2017/459 (PDF ) Security Analysis of Arbiter PUF and Its Lightweight Compositions Under Predictability Test Phuong Ha Nguyen, Durga Prasad Sahoo, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay
2017/457 (PDF ) Universal Construction of Cheater-Identifiable Secret Sharing Against Rushing Cheaters without Honest Majority Masahito Hayashi, Takeshi Koshiba
2017/456 (PDF ) Proxy Re-Encryption and Re-Signatures from Lattices Xiong Fan, Feng-Hao Liu
2017/455 (PDF ) Vector Encoding over Lattices and Its Applications Daniel Apon, Xiong Fan, Feng-Hao Liu
2017/454 (PDF ) Algorand: Scaling Byzantine Agreements for Cryptocurrencies Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, Nickolai Zeldovich
2017/453 (PDF ) Subtleties in Security Definitions for Predicate Encryption with Public Index Johannes Blömer, Gennadij Liske
2017/452 (PDF ) Oblivious Neural Network Predictions via MiniONN transformations Jian Liu, Mika Juuti, Yao Lu, N. Asokan
2017/451 (PDF ) Efficient Compilers for After-the-Fact Leakage: from CPA to CCA-2 secure PKE to AKE Suvradip Chakraborty, Goutam Paul, C. Pandu Rangan
2017/450 (PDF ) Privacy-preserving biometric authentication: challenges and directions Elena Pagnin, Aikaterini Mitrokotsa
2017/449 (PDF ) Differentially 4-Uniform Permutations with the Best Known Nonlinearity from Butterflies Shihui Fu, Xiutao Feng, Baofeng Wu
2017/447 (PDF ) Block Chain based Searchable Symmetric Encryption Huige Li, Haibo Tian, Fangguo Zhang
2017/446 (PDF ) Secretly Embedding Trapdoors into Contract Signing Protocols Diana Maimut, George Teseleanu
2017/445 (PDF ) Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures Michael Till Beck, Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
2017/444 (PDF ) CrowdBC: A Blockchain-based Decentralized Framework for Crowdsourcing Ming Li, Jian Weng, Anjia Yang, Wei Lu, Yue Zhang, Lin Hou, Jia-Nan Liu, Yang Xiang, Robert H. Deng
2017/443 (PDF ) Practical Graphs for Optimal Side-Channel Resistant Memory-Hard Functions Joel Alwen, Jeremiah Blocki, Ben Harsha
2017/442 (PDF ) On the Depth-Robustness and Cumulative Pebbling Cost of Argon2i Jeremiah Blocki, Samson Zhou
2017/441 (PDF ) New Approach to Practical Leakage-Resilient Public-Key Cryptography Suvradip Chakraborty, Janaka Alawatugoda, C. Pandu Rangan
2017/440 (PDF ) Cryptographic Security Analysis of T-310 Nicolas T. Courtois, Klaus Schmeh, Jörg Drobick, Jacques Patarin, Maria-Bristena Oprisanu, Matteo Scarlata, Om Bhallamudi
2017/439 (PDF ) Practically Efficient Secure Single-Commodity Multi-Market Auctions Abdelrahaman Aly, Mathieu Van Vyve
2017/438 (PDF ) GLITCH: A Discrete Gaussian Testing Suite For Lattice-Based Cryptography James Howe, Máire O'Neill
2017/437 (PDF ) Slothful reduction Michael Scott
2017/436 (PDF ) A Uniform Class of Weak Keys for Universal Hash Functions Kaiyan Zheng, Peng Wang
2017/435 (PDF ) Analyzing Multi-Key Security Degradation Atul Luykx, Bart Mennink, Kenneth G. Paterson
2017/434 (PDF ) FourQ on embedded devices with strong countermeasures against side-channel attacks Zhe Liu, Patrick Longa, Geovandro Pereira, Oscar Reparaz, Hwajeong Seo
2017/433 (PDF ) Two-Message Witness Indistinguishability and Secure Computation in the Plain Model from New Assumptions Saikrishna Badrinarayanan, Sanjam Garg, Yuval Ishai, Amit Sahai, Akshay Wadia
2017/432 (PDF ) Statistical and Linear Independence of Binary Random Variables Kaisa Nyberg
2017/431 (PDF ) Understanding RUP Integrity of COLM Nilanjan Datta, Atul Luykx, Bart Mennink, Mridul Nandi
2017/430 (PDF ) Improving TFHE: faster packed homomorphic operations and efficient circuit bootstrapping Ilaria Chillotti, Nicolas Gama, Mariya Georgieva, Malika Izabachène
2017/429 (PDF ) Strengthening Access Control Encryption Christian Badertscher, Christian Matt, Ueli Maurer
2017/428 (PDF ) Optimal Ramp Schemes and Related Combinatorial Objects Douglas R. Stinson
2017/427 (PDF ) Grover Meets Simon - Quantumly Attacking the FX-construction Gregor Leander, Alexander May
2017/426 (PDF ) FHPKE based on multivariate discrete logarithm problem Masahiro Yagisawa
2017/425 (PDF ) Card-Based Protocols Using Unequal Division Shuffles Akihiro Nishimura, Takuya Nishida, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone
2017/424 (PDF ) HILA5: On Reliability, Reconciliation, and Error Correction for Ring-LWE Encryption Markku-Juhani O. Saarinen
2017/423 (PDF ) Foundations for Actively Secure Card-based Cryptography Alexander Koch, Stefan Walzer
2017/422 (PDF ) PUF+IBE: Blending Physically Unclonable Functions with Identity Based Encryption for Authentication and Key Exchange in IoTs Urbi Chatterjee, Vidya Govindan, Rajat Sadhukhan, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Debashis Mahata, Mukesh Prabhu
2017/421 (PDF ) Exploring Naccache-Stern Knapsack Encryption Éric Brier, Rémi Géraud, David Naccache
2017/420 (PDF ) Construction and Filtration of Lightweight Formalized MDS Matrices Shiyi Zhang, Yongjuan Wang, Yang Gao, Tao Wang
2017/419 (PDF ) Efficient hash maps to \mathbb{G}_2 on BLS curves Alessandro Budroni, Federico Pintore
2017/418 (PDF ) Strong Authenticated Key Exchange with Auxiliary Inputs Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo
2017/417 (PDF ) A Proof-of-Stake protocol for consensus on Bitcoin subchains Massimo Bartoletti, Stefano Lande, Alessandro Sebastian Podda
2017/416 (PDF ) Breaking and Fixing the HB+DB protocol Ioana Boureanu, David Gerault, Pascal Lafourcade, Cristina Onete
2017/415 (PDF ) Towards Practical PFE: An Efficient 2-Party Private Function Evaluation Protocol Based on Half Gates Osman Bicer, Muhammed Ali Bingol, Mehmet Sabir Kiraz, Albert Levi
2017/414 (PDF ) Symmetrically and Asymmetrically Hard Cryptography (Full Version) Alex Biryukov, Leo Perrin
2017/413 (PDF ) Correlation Power Analysis Attack against STT-MRAM Based Cyptosystems Abhishek Chakraborty, Ankit Mondal, Ankur Srivastava
2017/412 (PDF ) Improved Attack on Full-round Grain-128 Ximing Fu, Xiaoyun Wang, Jiazhe Chen, Marc Stevens, Xiaoyang Dong
2017/411 (PDF ) A New Algorithm for Inversion mod $p^k$ Çetin Kaya Koç
2017/410 (PDF ) Fast Proxy Re-Encryption for Publish/Subscribe Systems Yuriy Polyakov, Kurt Rohloff, Gyana Sahu, Vinod Vaikuntanthan
2017/409 (PDF ) Maliciously Secure Oblivious Linear Function Evaluation with Constant Overhead Satrajit Ghosh, Jesper Buus Nielsen, Tobias Nilges
2017/408 (PDF ) Combinatorial Subset Difference Public Key Broadcast Encryption Scheme for Secure Multicast Jihye Kim, Jiwon Lee, Seunghwa Lee, Hyunok Oh
2017/407 (PDF ) SplitCommit: Implementing and Analyzing Homomorphic UC Commitments Peter Rindal, Roberto Trifiletti
2017/406 (PDF ) OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding Eleftherios Kokoris-Kogias, Philipp Jovanovic, Linus Gasser, Nicolas Gailly, Ewa Syta, Bryan Ford
2017/405 (PDF ) Security Analysis of ``PSLP: Privacy-Preserving Single-Layer Perceptron Learning for e-Healthcare'' Jingjing Wang, Xiaoyu Zhang, Jingjing guo, Jianfeng Wang
2017/404 (PDF ) Short generators without quantum computers: the case of multiquadratics Jens Bauch, Daniel J. Bernstein, Henry de Valence, Tanja Lange, Christine van Vredendaal
2017/403 (PDF ) Condition on composite numbers easily factored with elliptic curve method Masaaki Shirase
2017/402 (PDF ) A New Approach to Round-Optimal Secure Multiparty Computation Prabhanjan Ananth, Arka Rai Choudhuri, Abhishek Jain
2017/401 (PDF ) Synthesis of Adaptive Side-Channel Attacks Quoc-Sang Phan, Lucas Bang, Corina S. Păsăreanu, Pasquale Malacaria, Tevfik Bultan
2017/400 (PDF ) A Leakage-Abuse Attack Against Multi-User Searchable Encryption Cédric Van Rompay, Refik Molva, Melek Önen
2017/399 (PDF ) Practical Evaluation of Masking Software Countermeasures on an IoT processor David McCann, Elisabeth Oswald
2017/398 (PDF ) Post-Quantum Security of Fiat-Shamir Dominique Unruh
2017/397 (PDF ) Efficient One-Time Signatures from Quasi-Cyclic Codes: a Full Treatment Edoardo Persichetti
2017/396 (PDF ) SecureML: A System for Scalable Privacy-Preserving Machine Learning Payman Mohassel, Yupeng Zhang
2017/395 (PDF ) Higher-Order Side-Channel Protected Implementations of Keccak Hannes Gross, David Schaffenrath, Stefan Mangard
2017/394 (PDF ) Double-spending Prevention for Bitcoin zero-confirmation transactions Cristina Pérez-Solà, Sergi Delgado-Segura, Guillermo Navarro-Arribas, Jordi Herrera-Joancomartı́
2017/393 (PDF ) Privacy-Preserving Interdomain Routing at Internet Scale Gilad Asharov, Daniel Demmler, Michael Schapira, Thomas Schneider, Gil Segev, Scott Shenker, Michael Zohner
2017/392 (PDF ) Running compression algorithms in the encrypted domain: a case-study on the homomorphic execution of RLE Sébastien Canard, Sergiu Carpov, Donald Nokam Kuate, Renaud Sirdey
2017/391 (PDF ) Another Look at Success Probability in Linear Cryptanalysis Subhabrata Samajder, Palash Sarkar
2017/390 (PDF ) On the Security of Classic Protocols for Unique Witness Relations Yi Deng, Xuyang Song, Jingyue Yu, Yu Chen
2017/389 (PDF ) Decentralized Blacklistable Anonymous Credentials with Reputation Rupeng Yang, Man Ho Au, Qiuliang Xu, Zuoxia Yu
2017/388 (PDF ) Post-Quantum Key Exchange on ARMv8-A -- A New Hope for NEON made Simple Silvan Streit, Fabrizio De Santis
2017/387 (PDF ) Homomorphically Encrypted Arithmetic Operations over the Integer Ring Chen Xu, Jingwei Chen, Wenyuan Wu, Yong Feng
2017/386 (PDF ) Four Round Secure Computation without Setup Zvika Brakerski, Shai Halevi, Antigoni Polychroniadou
2017/385 (PDF ) Garbled Circuits as Randomized Encodings of Functions: a Primer Benny Applebaum
2017/384 (PDF ) Time-Memory-Data Tradeoff Attacks against Small-State Stream Ciphers Matthias Hamann, Matthias Krause, Willi Meier, Bin Zhang
2017/383 (PDF ) Super-Isolated Elliptic Curves and Abelian Surfaces in Cryptography Travis Scholl
2017/382 (PDF ) A General Degenerate Grouping Power Attack with Specific Application to SIMON and SPECK Steven Cavanaugh
2017/381 (PDF ) Quantum one-way permutation over the finite field of two elements Alexandre de Castro
2017/380 (PDF ) Watermarking Cryptographic Functionalities from Standard Lattice Assumptions Sam Kim, David J. Wu
2017/379 (PDF ) Fault attack on Supersingular Isogeny Cryptosystems Yan Bo Ti
2017/378 (PDF ) Faster Secure Multi-Party Computation of AES and DES Using Lookup Tables Marcel Keller, Emmanuela Orsini, Dragos Rotaru, Peter Scholl, Eduardo Soria-Vazquez, Srinivas Vivek
2017/377 (PDF ) Privacy-Preserving Multi-Party Bartering Secure Against Active Adversaries Stefan Wüller, Ulrike Meyer, Susanne Wetzel
2017/375 (PDF ) Do you need a Blockchain? Karl Wüst, Arthur Gervais
2017/374 (PDF ) Loop-abort faults on supersingular isogeny cryptosystems Alexandre Gélin, Benjamin Wesolowski
2017/373 (PDF ) Fully Dynamic Multi Target Homomorphic Attribute-Based Encryption Ryo Hiromasa, Yutaka Kawai
2017/372 (PDF ) A crossbred algorithm for solving Boolean polynomial systems Antoine Joux, Vanessa Vitse
2017/371 (PDF ) On the Construction of Lightweight Orthogonal MDS Matrices Lijing Zhou, Licheng Wang, Yiru Sun
2017/370 (PDF ) "The Simplest Protocol for Oblivious Transfer'' Revisited Ziya Alper Genç, Vincenzo Iovino, Alfredo Rial
2017/368 (PDF ) Analysis of Toeplitz MDS Matrices Sumanta Sarkar, Habeeb Syed
2017/367 (PDF ) Fork-Free Hybrid Consensus with Flexible Proof-of-Activity Zhiqiang Liu, Shuyang Tang, Sherman S. M. Chow, Zhen Liu, Yu Long
2017/366 (PDF ) BitFlip: A Randomness-Rich Cipher Gideon Samid, Serguei Popov
2017/365 (PDF ) The Complexity of Public-Key Cryptography Boaz Barak
2017/364 (PDF ) Round-Preserving Parallel Composition of Probabilistic-Termination Cryptographic Protocols Ran Cohen, Sandro Coretti, Juan Garay, Vassilis Zikas
2017/363 (PDF ) TOPPSS: Cost-minimal Password-Protected Secret Sharing based on Threshold OPRF Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk, Jiayu Xu
2017/362 (PDF ) Universally Composable Zero-Knowledge Proof of Membership Jesper Buus Nielsen
2017/361 (PDF ) Indistinguishability Obfuscation for All Circuits from Secret-Key Functional Encryption Fuyuki Kitagawa, Ryo Nishimaki, Keisuke Tanaka
2017/360 (PDF ) Provably Secure Three-party Password Authenticated Key Exchange Protocol Based On Ring Learning With Error Dongqing Xu, Debiao He, Kim-Kwang Raymond Choo, Jianhua Chen
2017/359 (PDF ) Conditional Disclosure of Secrets via Non-Linear Reconstruction Tianren Liu, Vinod Vaikuntanathan, Hoeteck Wee
2017/358 (PDF ) Almost Optimal Oblivious Transfer from QA-NIZK Olivier Blazy, Céline Chevalier, Paul Germouty
2017/357 (PDF ) Continuous Non-Malleable Codes in the 8-Split-State Model Divesh Aggarwal, Nico Dottling, Jesper Buus Nielsen, Maciej Obremski, Erick Purwanto
2017/356 (PDF ) XOR of PRPs in a Quantum World Bart Mennink, Alan Szepieniec
2017/355 (PDF ) White-Box Cryptography: Don't Forget About Grey Box Attacks Estuardo Alpirez Bock, Joppe W. Bos, Chris Brzuska, Charles Hubain, Wil Michiels, Cristofaro Mune, Eloi Sanfelix Gonzalez, Philippe Teuwen, Alexander Treff
2017/354 (PDF ) Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts Martin R. Albrecht, Emmanuela Orsini, Kenneth G. Paterson, Guy Peer, Nigel P. Smart
2017/353 (PDF ) Lattice-Based Group Signatures: Achieving Full Dynamicity with Ease San Ling, Khoa Nguyen, Huaxiong Wang, Yanhong Xu
2017/352 (PDF ) A low-resource quantum factoring algorithm Daniel J. Bernstein, Jean-François Biasse, Michele Mosca
2017/351 (PDF ) Post-quantum RSA Daniel J. Bernstein, Nadia Heninger, Paul Lou, Luke Valenta
2017/350 (PDF ) The Montgomery ladder on binary elliptic curves Thomaz Oliveira, Julio López, Francisco Rodríguez-Henríquez
2017/349 (PDF ) LMS vs XMSS: Comparion of two Hash-Based Signature Standards Panos Kampanakis, Scott Fluhrer
2017/348 (PDF ) Removal Attacks on Logic Locking and Camouflaging Techniques Muhammad Yasin, Bodhisatwa Mazumdar, Ozugr Sinanoglu, Jeyavijayan Rajendran
2017/347 (PDF ) Predictive Aging of Reliability of two Delay PUFs Naghmeh Karimi, Jean-Luc Danger, Florent Lozac'h, Sylvain Guilley
2017/346 (PDF ) Some cryptanalytic results on Lizard Subhadeep Banik, Takanori Isobe
2017/345 (PDF ) Mind the Gap: Towards Secure 1st-order Masking in Software Kostas Papagiannopoulos, Nikita Veshchikov
2017/344 (PDF ) DUPLO: Unifying Cut-and-Choose for Garbled Circuits Vladimir Kolesnikov, Jesper Buus Nielsen, Mike Rosulek, Ni Trieu, Roberto Trifiletti
2017/343 (PDF ) Towards a Classification of Non-interactive Computational Assumptions in Cyclic Groups Essam Ghadafi, Jens Groth
2017/342 (PDF ) Multilinear Maps Using a Variant of Ring-LWE Gu Chunsheng
2017/341 (PDF ) Steganography techniques Dragoş Dumitrescu, Ioan-Mihail Stan, Emil Simion
2017/339 (PDF ) ElsieFour: A Low-Tech Authenticated Encryption Algorithm For Human-to-Human Communication Alan Kaminsky
2017/338 (PDF ) A Traceability Analysis of Monero's Blockchain Amrit Kumar, Clément Fischer, Shruti Tople, Prateek Saxena
2017/337 (PDF ) Authentication of Outsourced Linear Function Query with Efficient Updates Gang Sheng, Chunming Tang, Wei Gao, Yunlu Cai, Xing Hu
2017/336 (PDF ) NIST RANDOMNESS TESTS (IN)DEPENDENCE Carmina GEORGESCU, Alina PETRESCU-NITA, Emil SIMION, Antonela TOMA
2017/334 (PDF ) Updating key size estimations for pairings Razvan Barbulescu, Sylvain Duquesne
2017/333 (PDF ) Faster Homomorphic Function Evaluation using Non-Integral Base Encoding Charlotte Bonte, Carl Bootland, Joppe W. Bos, Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren
2017/332 (PDF ) Reforgeability of Authenticated Encryption Schemes Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel
2017/331 (PDF ) Optimal attacks on qubit-based Quantum Key Recycling Daan Leermakers, Boris Skoric
2017/330 (PDF ) Distinguisher-Dependent Simulation in Two Rounds and its Applications Abhishek Jain, Yael Tauman Kalai, Dakshita Khurana, Ron Rothblum
2017/329 (PDF ) Maliciously Secure Multi-Client ORAM Matteo Maffei, Giulio Malavolta, Manuel Reinert, Dominique Schröder
2017/328 (PDF ) Evaluating Bernstein-Rabin-Winograd Polynomials Sebati Ghosh, Palash Sarkar
2017/327 (PDF ) MQ Signatures for PKI Alan Szepieniec, Ward Beullens, Bart Preneel
2017/326 (PDF ) Labeled Homomorphic Encryption: Scalable and Privacy-Preserving Processing of Outsourced Data Manuel Barbosa, Dario Catalano, Dario Fiore
2017/325 (PDF ) CHVote Protocol Specification Rolf Haenni, Reto E. Koenig, Philipp Locher, Eric Dubuis
2017/324 (PDF ) Family of PRGs based on Collections of Arithmetic Progressions Ch. Srikanth, C. E. Veni Madhavan
2017/323 (PDF ) Revocable Identity-based Encryption with Bounded Decryption Key Exposure Resistance: Lattice-based Construction and More Atsushi Takayasu, Yohei Watanabe
2017/321 (PDF ) How Fast Can We Obfuscate Using Ideal Graded Encoding Schemes Dingfeng Ye, Peng Liu, Jun Xu
2017/320 (PDF ) Speeding up Huff Form of Elliptic Curves Neriman Gamze Orhon, Huseyin Hisil
2017/319 (PDF ) Embed-Augment-Recover: Function Private Predicate Encryption from Minimal Assumptions in the Public-Key Setting Sikhar Patranabis, Debdeep Mukhopadhyay
2017/317 (PDF ) Solidus: Confidential Distributed Ledger Transactions via PVORM Ethan Cecchetti, Fan Zhang, Yan Ji, Ahmed Kosba, Ari Juels, Elaine Shi
2017/316 (PDF ) Exploring Potential 6LoWPAN Traffic Side Channels Yan Yan, Elisabeth Oswald, Theo Tryfonas
2017/315 (PDF ) Multimodal Indexable Encryption for Mobile Cloud-based Applications (Extended Version) Bernardo Ferreira, Joaão Leitão, Henrique Domingos
2017/314 (PDF ) Post-quantum cryptography---dealing with the fallout of physics success Daniel J. Bernstein, Tanja Lange
2017/312 (PDF ) Limits on Low-Degree Pseudorandom Generators (Or: Sum-of-Squares Meets Program Obfuscation) Boaz Barak, Zvika Brakerski, Ilan Komargodski, Pravesh K. Kothari
2017/311 (PDF ) Constructing Multidimensional Differential Addition Chains and their Applications Aaron Hutchinson, Koray Karabina
2017/310 (PDF ) KDM-Secure Public-Key Encryption from Constant-Noise LPN Shuai Han, Shengli Liu
2017/309 (PDF ) Perfectly Secure Message Transmission Scheme against Rational Adversaries Maiki Fujita, Takeshi Koshiba
2017/308 (PDF ) Faster Gaussian Sampling for Trapdoor Lattices with Arbitrary Modulus Nicholas Genise, Daniele Micciancio
2017/307 (PDF ) Efficient Synchronous Byzantine Consensus Ittai Abraham, Srinivas Devadas, Danny Dolev, Kartik Nayak, Ling Ren
2017/306 (PDF ) Cube Attacks on Non-Blackbox Polynomials Based on Division Property (Full Version) Yosuke Todo, Takanori Isobe, Yonglin Hao, Willi Meier
2017/305 (PDF ) A Zero Knowledge Sumcheck and its Applications Alessandro Chiesa, Michael A. Forbes, Nicholas Spooner
2017/304 (PDF ) Provably Secure NTRUEncrypt over More General Cyclotomic Rings Yang Yu, Guangwu Xu, Xiaoyun Wang
2017/303 (PDF ) Locally Decodable and Updatable Non-Malleable Codes in the Bounded Retrieval Model Dana Dachman-Soled, Mukul Kulkarni, Aria Shahverdi
2017/301 (PDF ) Limits on the Locality of Pseudorandom Generators and Applications to Indistinguishability Obfuscation Alex Lombardi, Vinod Vaikuntanathan
2017/300 (PDF ) Tortoise and Hares Consensus: the Meshcash Framework for Incentive-Compatible, Scalable Cryptocurrencies Iddo Bentov, Pavel Hubáček, Tal Moran, Asaf Nadler
2017/299 (PDF ) Fast Private Set Intersection from Homomorphic Encryption Hao Chen, Kim Laine, Peter Rindal
2017/298 (PDF ) An Investigation of Sources of Randomness Within Discrete Gaussian Sampling Séamus Brannigan, Neil Smyth, Tobias Oder, Felipe Valencia, Elizabeth O’Sullivan, Tim Güneysu, Francesco Regazzoni
2017/297 (PDF ) A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol Gildas Avoine, Xavier Bultel, Sébastien Gambs, David Gérault, Pascal Lafourcade, Cristina Onete, Jean-Marc Robert
2017/296 (PDF ) Topology-Hiding Computation on all Graphs Adi Akavia, Rio LaVigne, Tal Moran
2017/295 (PDF ) Improved key-reconciliation method Ludo Tolhuizen, Ronald Rietman, Oscar Garcia-Morchon
2017/294 (PDF ) Secure searching of biomarkers through hybrid homomorphic encryption scheme Miran Kim, Yongsoo Song, Jung Hee Cheon
2017/293 (PDF ) Montgomery curves and the Montgomery ladder Daniel J. Bernstein, Tanja Lange
2017/292 (PDF ) Involutory Differentially 4-Uniform Permutations from Known Constructions Shihui Fu, Xiutao Feng
2017/291 (PDF ) How to Achieve Non-Malleability in One or Two Rounds Dakshita Khurana, Amit Sahai
2017/290 (PDF ) Double DIP: Re-Evaluating Security of Logic Encryption Algorithms Yuanqi Shen, Hai Zhou
2017/289 (PDF ) On the Hardness of Trivium and Grain with respect to Generic Time-Memory-Data Tradeoff Attacks Matthias Krause
2017/288 (PDF ) Security of Symmetric Primitives under Incorrect Usage of Keys Pooya Farshim, Claudio Orlandi, Răzvan Roşie
2017/287 (PDF ) Towards Sound and Optimal Leakage Detection Procedure Liwei Zhang, A. Adam Ding, Francois Durvaux, Francois-Xavier Standaert, Yunsi Fei
2017/285 (PDF ) Implementation and Evaluation of Improved Gaussian Sampling for Lattice Trapdoors Kamil Doruk Gür, Yuriy Polyakov, Kurt Rohloff, Gerard W. Ryan, Erkay Savaş
2017/284 (PDF ) SafeDRP: Yet Another Way Toward Power-Equalized Designs in FPGA Maik Ender, Alexander Wild, Amir Moradi
2017/283 (PDF ) On the Easiness of Turning Higher-Order Leakages into First-Order Thorben Moos, Amir Moradi
2017/282 (PDF ) Collapsing sponges: Post-quantum security of the sponge construction Dominique Unruh
2017/281 (PDF ) Practical Secure Aggregation for Privacy Preserving Machine Learning Keith Bonawitz, Vladimir Ivanov, Ben Kreuter, Antonio Marcedone, H. Brendan McMahan, Sarvar Patel, Daniel Ramage, Aaron Segal, Karn Seth
2017/280 (PDF ) Amortization with Fewer Equations for Proving Knowledge of Small Secrets Rafael del Pino, Vadim Lyubashevsky
2017/279 (PDF ) Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives Melissa Chase, David Derler, Steven Goldfeder, Claudio Orlandi, Sebastian Ramacher, Christian Rechberger, Daniel Slamanig, Greg Zaverucha
2017/278 (PDF ) New Observations on Invariant Subspace Attack Yunwen Liu, Vincent Rijmen
2017/277 (PDF ) Minimizing the Complexity of Goldreich's Pseudorandom Generator Alex Lombardi, Vinod Vaikuntanathan
2017/276 (PDF ) Obfuscating Compute-and-Compare Programs under LWE Daniel Wichs, Giorgos Zirdelis
2017/275 (PDF ) Simple and Generic Constructions of Succinct Functional Encryption Fuyuki Kitagawa, Ryo Nishimaki, Keisuke Tanaka
2017/274 (PDF ) Lockable Obfuscation Rishab Goyal, Venkata Koppula, Brent Waters
2017/273 (PDF ) Two-Round and Non-Interactive Concurrent Non-Malleable Commitments from Time-Lock Puzzles Huijia Lin, Rafael Pass, Pratik Soni
2017/272 (PDF ) Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks - A Practical Security Evaluation on FPGA Florian Unterstein, Johann Heyszl, Fabrizio De Santis, Robert Specht
2017/271 (PDF ) High Order Masking of Look-up Tables with Common Shares Jean-Sebastien Coron, Franck Rondepierre, Rina Zeitoun
2017/270 (PDF ) Rational Proofs against Rational Verifiers Keita Inasawa, Kenji Yasunaga
2017/269 (PDF ) Extending Glitch-Free Multiparty Protocols to Resist Fault Injection Attacks Okan Seker, Thomas Eisenbarth, Rainer Steinwandt
2017/268 (PDF ) Efficient Sanitizable Signatures without Random Oracles Russell W. F. Lai, Tao Zhang, Sherman S. M. Chow, Dominique Schröder
2017/267 (PDF ) A Masked White-box Cryptographic Implementation for Protecting against Differential Computation Analysis Seungkwang Lee
2017/266 (PDF ) From Higher-Order Differentials to Polytopic Cryptanalysis Tyge Tiessen
2017/265 (PDF ) Enhanced Outsider-anonymous Broadcast Encryption with Subset Difference Revocation Kamalesh Acharya, Ratna Dutta
2017/264 (PDF ) A note on how to (pre-)compute a ladder Thomaz Oliveira, Julio López, Hüseyin Hışıl, Armando Faz-Hernández, Francisco Rodrıíguez-Henrıíquez
2017/263 (PDF ) Bivariate attacks and confusion coefficients Sylvain Guilley, Liran Lerman
2017/262 (PDF ) When It’s All Just Too Much: Outsourcing MPC-Preprocessing Peter Scholl, Nigel P. Smart, Tim Wood
2017/261 (PDF ) Side-channel Analysis of Lightweight Ciphers: Does Lightweight Equal Easy? Annelie Heuser, Stjepan Picek, Sylvain Guilley, Nele Mentens
2017/260 (PDF ) Message-Recovery MACs and Verification-Unskippable AE Shoichi Hirose, Yu Sasaki, Kan Yasuda
2017/259 (PDF ) Gaussian Sampling over the Integers: Efficient, Generic, Constant-Time Daniele Micciancio, Michael Walter
2017/258 (PDF ) Pseudorandomness of Ring-LWE for Any Ring and Modulus Chris Peikert, Oded Regev, Noah Stephens-Davidowitz
2017/257 (PDF ) Threshold Fully Homomorphic Encryption Aayush Jain, Peter M. R. Rasmussen, Amit Sahai
2017/256 (PDF ) A Framework for Universally Composable Diffie-Hellman Key Exchange Ralf Kuesters, Daniel Rausch
2017/255 (PDF ) New and Old Limits for AES Known-Key Distinguishers Lorenzo Grassi, Christian Rechberger
2017/254 (PDF ) Towards Easy Key Enumeration Changhai Ou, Degang Sun, Zhu Wang, Xinping Zhou
2017/253 (PDF ) A Modular Security Analysis of EAP and IEEE 802.11 Chris Brzuska, Håkon Jacobsen
2017/252 (PDF ) High-Order Conversion From Boolean to Arithmetic Masking Jean-Sebastien Coron
2017/251 (PDF ) A Lattice-Based Universal Thresholdizer for Cryptographic Systems Dan Boneh, Rosario Gennaro, Steven Goldfeder, Sam Kim
2017/250 (PDF ) Indistinguishability Obfuscation from Trilinear Maps and Block-Wise Local PRGs Huijia Lin, Stefano Tessaro
2017/249 (PDF ) Proof of Luck: an Efficient Blockchain Consensus Protocol Mitar Milutinovic, Warren He, Howard Wu, Maxinder Kanwal
2017/248 (PDF ) IPcore implementation susceptibility: A case study of Low latency ciphers Dillibabu Shanmugam, Ravikumar Selvam, Suganya Annadurai
2017/247 (PDF ) Efficient Multivariate Ring Signature Schemes Mohamed Saied Emam Mohamed, Albrecht Petzoldt
2017/246 (PDF ) An Analysis of FV Parameters Impact Towards its Hardware Acceleration Joël Cathébras, Alexandre Carbon, Renaud Sirdey, Nicolas Ventroux
2017/245 (PDF ) Cache-Base Application Detection in the Cloud Using Machine Learning Berk Gulmezoglu, Thomas Eisenbarth, Berk Sunar
2017/244 (PDF ) Model-counting Approaches For Nonlinear Numerical Constraints Mateus Borges, Quoc-Sang Phan, Antonio Filieri, Corina S. Păsăreanu
2017/243 (PDF ) Key Recovery: Inert and Public Colin Boyd, Xavier Boyen, Christopher Carr, Thomas Haines
2017/242 (PDF ) Full accounting for verifiable outsourcing Riad S. Wahby, Ye Ji, Andrew J. Blumberg, abhi shelat, Justin Thaler, Michael Walfish, Thomas Wies
2017/241 (PDF ) Linear Consistency for Proof-of-Stake Blockchains Erica Blum, Aggelos Kiayias, Cristopher Moore, Saad Quader, Alexander Russell
2017/240 (PDF ) Lattice-Based SNARGs and Their Application to More Efficient Obfuscation Dan Boneh, Yuval Ishai, Amit Sahai, David J. Wu
2017/239 (PDF ) Boosting Authenticated Encryption Robustness With Minimal Modifications Tomer Ashur, Orr Dunkelman, Atul Luykx
2017/238 (PDF ) Mixing Confidential Transactions: Comprehensive Transaction Privacy for Bitcoin Tim Ruffing, Pedro Moreno-Sanchez
2017/237 (PDF ) Switch Commitments: A Safety Switch for Confidential Transactions Tim Ruffing, Giulio Malavolta
2017/236 (PDF ) A new rank metric codes based encryption scheme Pierre Loidreau
2017/235 (PDF ) Efficient Oblivious Transfer from Lossy Threshold Homomorphic Encryption Isheeta Nargis
2017/234 (PDF ) Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications Kevin Milner, Cas Cremers, Jiangshan Yu, Mark Ryan
2017/233 (PDF ) Simplifying Design and Analysis of Complex Predicate Encryption Schemes Shashank Agrawal, Melissa Chase
2017/232 (PDF ) TwinsCoin: A Cryptocurrency via Proof-of-Work and Proof-of-Stake Alexander Chepurnoy, Tuyet Duong, Lei Fan, Hong-Sheng Zhou
2017/231 (PDF ) EHE: nonce misuse-resistant message authentication Sergey Agievich
2017/230 (PDF ) Smart Contracts Make Bitcoin Mining Pools Vulnerable Yaron Velner, Jason Teutsch, Loi Luu
2017/229 (PDF ) Multi-Prover Interactive Proofs: Unsound Foundations Claude Crépeau, Nan Yang
2017/228 (PDF ) Efficient and Secure Outsourcing of Genomic Data Storage João Sá Sousa, Cédric Lefebvre, Zhicong Huang, Jean Louis Raisaro, Carlos Aguilar, Marc-Olivier Killijian, Jean-Pierre Hubaux
2017/227 (PDF ) Towards Shared Ownership in the Cloud Hubert Ritzdorf, Claudio Soriente, Ghassan O. Karame, Srdjan Marinovic, Damian Gruber, Srdjan Capkun
2017/226 (PDF ) JIMU: Faster LEGO-based Secure Computation using Additive Homomorphic Hashes Ruiyu Zhu, Yan Huang
2017/225 (PDF ) Bandwidth Hard Functions for ASIC Resistance Ling Ren, Srinivas Devadas
2017/224 (PDF ) Simple Encrypted Arithmetic Library - SEAL v2.1 Hao Chen, Kim Laine, Rachel Player
2017/223 (PDF ) 0-RTT Key Exchange with Full Forward Secrecy Felix Günther, Britta Hale, Tibor Jager, Sebastian Lauer
2017/221 (PDF ) A Hybrid Lattice Basis Reduction and Quantum Search Attack on LWE Florian Göpfert, Christine van Vredendaal, Thomas Wunderer
2017/220 (PDF ) Cryptanalysis of PMACx, PMAC2x, and SIVx Kazuhiko Minematsu, Tetsu Iwata
2017/219 (PDF ) Attribute-Based Encryption from Identity-Based Encryption Chun-I Fan, Yi-Fan Tseng, Chih-Wen Lin
2017/218 (PDF ) Repeated Games for Generating Randomness in Encryption Kenji Yasunaga, Kosuke Yuzawa
2017/217 (PDF ) Cryptanalysis of Wang et al’s Certificateless Signature Scheme without Bilinear Pairings Kuo-Hui Yeh
2017/216 (PDF ) SCRAPE: Scalable Randomness Attested by Public Entities Ignacio Cascudo, Bernardo David
2017/214 (PDF ) Low Cost Constant Round MPC Combining BMR and Oblivious Transfer Carmit Hazay, Peter Scholl, Eduardo Soria-Vazquez
2017/213 (PDF ) Quantum Information Set Decoding Algorithms Ghazal Kachigar, Jean-Pierre Tillich
2017/212 (PDF ) Montgomery curves and their arithmetic: The case of large characteristic fields Craig Costello, Benjamin Smith
2017/211 (PDF ) Multi-level Access in Searchable Symmetric Encryption James Alderman, Keith M. Martin, Sarah Louise Renwick
2017/210 (PDF ) Public Key Cryptosystems with Noisy Secret Keys Charles Herder, Benjamin Fuller, Marten van Dijk, Srinivas Devadas
2017/209 (PDF ) Exploding Obfuscation: A Framework for Building Applications of Obfuscation From Polynomial Hardness Qipeng Liu, Mark Zhandry
2017/208 (PDF ) SoK: Security Models for Pseudo-Random Number Generators Sylvain Ruhault
2017/207 (PDF ) Private Queries on Encrypted Genomic Data Gizem S Cetin, Hao Chen, Kim Laine, Kristin Lauter, Peter Rindal, Yuhou Xia
2017/206 (PDF ) Quantum Resistant Public Key Encryption Scheme RLCE and IND-CCA2 Security for McEliece Schemes Yongge Wang
2017/205 (PDF ) ZETA: Towards Tagless Authenticated Encryption Anindya Shankar Bhandari, Dipanwita Roy Chowdhury
2017/204 (PDF ) Linear Cryptanalysis Using Low-bias Linear Approximations Tomer Ashur, Daniël Bodden, Orr Dunkelman
2017/203 (PDF ) Proofs of Useful Work Marshall Ball, Alon Rosen, Manuel Sabin, Prashant Nalini Vasudevan
2017/202 (PDF ) Average-Case Fine-Grained Hardness Marshall Ball, Alon Rosen, Manuel Sabin, Prashant Nalini Vasudevan
2017/201 (PDF ) Giving State to the Stateless: Augmenting Trustworthy Computation with Ledgers Gabriel Kaptchuk, Ian Miers, Matthew Green
2017/200 (PDF ) Anonymous Attestation with Subverted TPMs Jan Camenisch, Manu Drijvers, Anja Lehmann
2017/199 (PDF ) Improved Attacks for Characteristic-2 Parameters of the Cubic ABC Simple Matrix Encryption Scheme Dustin Moody, Ray Perlner, Daniel Smith-Tone
2017/198 (PDF ) FHE with Recursive Ciphertext Masahiro Yagisawa
2017/197 (PDF ) A Construction of Bent Functions with Optimal Algebraic Degree and Large Symmetric Group Wenying Zhang, Zhaohui Xing, Keqin Feng
2017/196 (PDF ) Attribute-based concurrent signatures BaoHong Li, Guoqing Xu, Yinliang Zhao
2017/195 (PDF ) Design of Lightweight Linear Diffusion Layers from Near-MDS Matrices Chaoyun Li, Qingju Wang
2017/194 (PDF ) Improved upper bounds for the expected circuit complexity of dense systems of linear equations over GF(2) Andrea Visconti, Chiara Valentina Schiavo, René Peralta
2017/193 (PDF ) SecChisel: Language and Tool for Practical and Scalable Security Verification of Security-Aware Hardware Architectures Shuwen Deng, Doğuhan Gümüşoğlu, Wenjie Xiong, Y. Serhan Gener, Onur Demir, Jakub Szefer
2017/191 (PDF ) CoverUp: Privacy Through "Forced" Participation in Anonymous Communication Networks David Sommer, Aritra Dhar, Luka Malisa, Esfandiar Mohammadi, Daniel Ronzani, Srdjan Capkun
2017/190 (PDF ) The first collision for full SHA-1 Marc Stevens, Elie Bursztein, Pierre Karpman, Ange Albertini, Yarik Markov
2017/189 (PDF ) Global-Scale Secure Multiparty Computation Xiao Wang, Samuel Ranellucci, Jonathan Katz
2017/188 (PDF ) Division Cryptanalysis of Block Ciphers with a Binary Diffusion Layer Wenying Zhang, Vincent Rijmen
2017/187 (PDF ) The discrete logarithm problem over prime fields: the safe prime case. The Smart attack, non-canonical lifts and logarithmic derivatives H. Gopalakrishna Gadiyar, R. Padma
2017/186 (PDF ) A Post-Quantum Digital Signature Scheme Based on Supersingular Isogenies Youngho Yoo, Reza Azarderakhsh, Amir Jalali, David Jao, Vladimir Soukharev
2017/185 (PDF ) A Virtual Wiretap Channel for Secure MessageTransmission Setareh Sharifian, Reihaneh Safavi-Naini, Fuchun Lin
2017/184 (PDF ) Linking Online Misuse-Resistant Authenticated Encryption and Blockwise Attack Models Guillaume Endignoux, Damian Vizár
2017/183 (PDF ) Analysis of Software Countermeasures for Whitebox Encryption Subhadeep Banik, Andrey Bogdanov, Takanori Isobe, Martin Bjerregaard Jepsen
2017/182 (PDF ) The Approximate $k$-List Problem Leif Both, Alexander May
2017/181 (PDF ) New techniques for trail bounds and application to differential trails in Keccak Silvia Mella, Joan Daemen, Gilles Van Assche
2017/180 (PDF ) Robust P2P Primitives Using SGX Enclaves Yaoqi Jia, Shruti Tople, Tarik Moataz, Deli Gong, Prateek Saxena, Zhenkai Liang
2017/179 (PDF ) REM: Resource-Efficient Mining for Blockchains Fan Zhang, Ittay Eyal, Robert Escriva, Ari Juels, Robbert van Renesse
2017/178 (PDF ) Optimal Differential Trails in SIMON-like Ciphers Zhengbin Liu, Yongqiang Li, Mingsheng Wang
2017/177 (PDF ) Some results on the existence of $t$-all-or-nothing transforms over arbitrary alphabets Navid Nasr Esfahani, Ian Goldberg, D. R. Stinson
2017/176 (PDF ) Probabilistically Checkable Proofs of Proximity with Zero-Knowledge Yuval Ishai, Mor Weiss
2017/175 (PDF ) Analysis of Burn-in period for RC4 State Transition Goutam Paul, Souvik Ray
2017/174 (PDF ) Cost-Aware Cut-and-Choose Games with Applications in Cryptography and Prefix-Free Codes Ruiyu Zhu, Yan Huang
2017/173 (PDF ) Speeding up detection of SHA-1 collision attacks using unavoidable attack conditions Marc Stevens, Dan Shumow
2017/172 (PDF ) On The Exact Security of Message Authentication Using Pseudorandom Functions Ashwin Jha, Avradip Mandal, Mridul Nandi
2017/171 (PDF ) Quantum Key Search with Side Channel Advice Daniel P. Martin, Ashley Montanaro, Elisabeth Oswald, Dan Shepherd
2017/170 (PDF ) Error-free protection of EC point multiplication by modular extension Martin Seysen
2017/169 (PDF ) UFace: Your Universal Password That No One Can See Nicholas Hilbert, Christian Storer, Dan Lin, Wei Jiang
2017/168 (PDF ) AES-GCM-SIV: Specification and Analysis Shay Gueron, Adam Langley, Yehuda Lindell
2017/167 (PDF ) Cloud Storage File Recoverability Christian A. Gorke, Christian Janson, Frederik Armknecht, Carlos Cid
2017/166 (PDF ) A roadmap to fully homomorphic elections: Stronger security, better verifiability Kristian Gjøsteen, Martin Strand
2017/165 (PDF ) SymSum: Symmetric-Sum Distinguishers Against Round Reduced SHA3 Dhiman Saha, Sukhendu Kuila, Dipanwita Roy Chowdhury
2017/164 (PDF ) Conditional Disclosure of Secrets: Amplification, Closure, Amortization, Lower-bounds, and Separations Benny Applebaum, Barak Arkis, Pavel Raykov, Prashant Nalini Vasudevan
2017/163 (PDF ) Homomorphic Encryption without Gaussian Noise Anamaria Costache, Nigel P. Smart
2017/162 (PDF ) Analysis of AES, SKINNY, and Others with Constraint Programming Siwei Sun, David Gerault, Pascal Lafourcade, Qianqian Yang, Yosuke Todo, Kexin Qiao, Lei Hu
2017/161 (PDF ) Security Notions for Bidirectional Channels Giorgia Azzurra Marson, Bertram Poettering
2017/160 (PDF ) Conditional Cube Attack on Round-Reduced ASCON Zheng Li, Xiaoyang Dong, Xiaoyun Wang
2017/159 (PDF ) Cube-like Attack on Round-Reduced Initialization of Ketje Sr Xiaoyang Dong, Zheng Li, Xiaoyun Wang, Ling Qin
2017/158 (PDF ) Passphone: Outsourcing Phone-based Web Authentication while Protecting User Privacy Martin Potthast, Christian Forler, Eik List, Stefan Lucks
2017/157 (PDF ) Detecting General Algebraic Manipulation Attacks Kim Ramchen
2017/156 (PDF ) Trust Is Risk: A Decentralized Financial Trust Platform Orfeas Stefanos Thyfronitis Litos, Dionysis Zindros
2017/155 (PDF ) Random Sampling Revisited: Lattice Enumeration with Discrete Pruning Yoshinori Aono, Phong Q. Nguyen
2017/154 (PDF ) Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers Thorsten Kranz, Friedrich Wiemer, Gregor Leander
2017/153 (PDF ) Storage Efficient Substring Searchable Symmetric Encryption Iraklis Leontiadis, Ming Li
2017/152 (PDF ) Encryptor Combiners: A Unified Approach to Multiparty NIKE, (H)IBE, and Broadcast Encryption Fermi Ma, Mark Zhandry
2017/151 (PDF ) Practical Functional Encryption for Quadratic Functions with Applications to Predicate Encryption Carmen Elisabetta Zaira Baltico, Dario Catalano, Dario Fiore, Romain Gay
2017/150 (PDF ) Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation Elette Boyle, Niv Gilboa, Yuval Ishai
2017/149 (PDF ) Bitcoin as a Transaction Ledger: A Composable Treatment Christian Badertscher, Ueli Maurer, Daniel Tschudi, Vassilis Zikas
2017/148 (PDF ) Pattern Matching on Encrypted Streams Nicolas Desmoulins, Pierre-Alain Fouque, Cristina Onete, Olivier Sanders
2017/147 (PDF ) Ad Hoc PSM Protocols: Secure Computation Without Coordination Amos Beimel, Yuval Ishai, Eyal Kushilevitz
2017/146 (PDF ) Toward Fine-Grained Blackbox Separations Between Semantic and Circular-Security Notions Mohammad Hajiabadi, Bruce M. Kapron
2017/145 (PDF ) The Multi-User Security of Double Encryption Viet Tung Hoang, Stefano Tessaro
2017/144 (PDF ) Privacy-Preserving Search of Similar Patients in Genomic Data Gilad Asharov, Shai Halevi, Yehuda Lindell, Tal Rabin
2017/143 (PDF ) Constraint-hiding Constrained PRFs for NC1 from LWE Ran Canetti, Yilei Chen
2017/142 (PDF ) Computing generator in cyclotomic integer rings, A subfield algorithm for the Principal Ideal Problem in L(1/2) and application to cryptanalysis of a FHE scheme Jean-François Biasse, Thomas Espitau, Pierre-Alain Fouque, Alexandre Gélin, Paul Kirchner
2017/141 (PDF ) Partitioned Group Password-Based Authenticated Key Exchange Dario Fiore, Maria Isabel Gonzalez Vasco, Claudio Soriente
2017/140 (PDF ) Estimation of the Hardness of the Learning with Errors Problem with a Restricted Number of Samples Nina Bindel, Johannes Buchmann, Florian Göpfert, Markus Schmidt
2017/139 (PDF ) Revisiting AES Related-Key Differential Attacks with Constraint Programming David Gérault, Pascal Lafourcade, Marine Minier, Christine Solnon
2017/138 (PDF ) How (not) to Use Welch's T-test in Side-Channel Security Evaluations François-Xavier Standaert
2017/137 (PDF ) Modifying an Enciphering Scheme after Deployment Paul Grubbs, Thomas Ristenpart, Yuval Yarom
2017/136 (PDF ) Dispersed Cryptography and the Quotient Ring Transform Anna Johnston
2017/135 (PDF ) Hashing Garbled Circuits for Free Xiong Fan, Chaya Ganesh, Vladimir Kolesnikov
2017/134 (PDF ) A Provably Secure PKCS\#11 Configuration Without Authenticated Attributes Ryan Stanley-Oakes
2017/133 (PDF ) Composable and Robust Outsourced Storage Christian Badertscher, Ueli Maurer
2017/132 (PDF ) Attacks on Karlsson and Mitrokotsa's Grouping-Proof-Distance-Bounding Protocol Roel Peeters, Jens Hermans, Aysajan Abidin
2017/131 (PDF ) A Practical Multivariate Blind Signature Scheme Albrecht Petzoldt, Alan Szepieniec, Mohamed Saied Emam Mohamed
2017/130 (PDF ) Topology-Hiding Computation Beyond Logarithmic Diameter Adi Akavia, Tal Moran
2017/129 (PDF ) Sublinear Zero-Knowledge Arguments for RAM Programs Payman Mohassel, Mike Rosulek, Alessandra Scafuro
2017/128 (PDF ) New Collision Attacks on Round-Reduced Keccak Kexin Qiao, Ling Song, Meicheng Liu, Jian Guo
2017/127 (PDF ) Robust Transforming Combiners from Indistinguishability Obfuscation to Functional Encryption Prabhanjan Ananth, Aayush Jain, Amit Sahai
2017/126 (PDF ) Boolean Searchable Symmetric Encryption with Worst-Case Sub-Linear Complexity Seny Kamara, Tarik Moataz
2017/125 (PDF ) Non-Interactive Secure 2PC in the Offline/Online and Batch Settings Payman Mohassel, Mike Rosulek
2017/124 (PDF ) On the Exact Round Complexity of Self-Composable Two-Party Computation Sanjam Garg, Susumu Kiyoshima, Omkant Pandey
2017/123 (PDF ) Separating IND-CPA and Circular Security for Unbounded Length Key Cycles Rishab Goyal, Venkata Koppula, Brent Waters
2017/122 (PDF ) One-Shot Verifiable Encryption from Lattices Vadim Lyubashevsky, Gregory Neven
2017/121 (PDF ) Twisted $\mu_4$-normal form for elliptic curves David Kohel
2017/120 (PDF ) Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption Rishab Goyal, Venkata Koppula, Brent Waters
2017/119 (PDF ) Quantum Authentication with Key Recycling Christopher Portmann
2017/118 (PDF ) A New Structural-Differential Property of 5-Round AES Lorenzo Grassi, Christian Rechberger, Sondre Rønjom
2017/117 (PDF ) The SM9 Cryptographic Schemes Zhaohui Cheng
2017/116 (PDF ) Masking Proofs are Tight (and How to Exploit it in Security Evaluations) Vincent Grosso, François-Xavier Standaert
2017/115 (PDF ) An efficient self-blindable attribute-based credential scheme Sietse Ringers, Eric Verheul, Jaap-Henk Hoepman
2017/114 (PDF ) Zero-Knowledge Proofs of Proximity Itay Berman, Ron D. Rothblum, Vinod Vaikuntanathan
2017/113 (PDF ) Algebraic Fault Analysis of SHA-3 Pei Luo, Konstantinos Athanasiou, Yunsi Fei, Thomas Wahl
2017/112 (PDF ) Zero-Knowledge Proxy Re-Identification Revisited Xavier Bultel, Pascal Lafourcade
2017/111 (PDF ) EC-OPRF: Oblivious Pseudorandom Functions using Elliptic Curves Jonathan Burns, Daniel Moore, Katrina Ray, Ryan Speers, Brian Vohaska
2017/110 (PDF ) A Smart Contract for Boardroom Voting with Maximum Voter Privacy Patrick McCorry, Siamak F. Shahandashti, Feng Hao
2017/109 (PDF ) Unilaterally-Authenticated Key Exchange Yevgeniy Dodis, Dario Fiore
2017/108 (PDF ) Photonic Side Channel Attacks Against RSA Elad Carmon, Jean-Pierre Seifert, Avishai Wool
2017/107 (PDF ) Secure Logging with Crash Tolerance Erik-Oliver Blass, Guevara Noubir
2017/106 (PDF ) $\mu$chain: How to Forget without Hard Forks Ivan Puddu, Alexandra Dmitrienko, Srdjan Capkun
2017/105 (PDF ) A Secure and Fast Dispersal Storage Scheme Based on the Learning with Errors Problem Ling Yang, Fuyang Fang, Xianhui Lu, Wen-Tao Zhu, Qiongxiao Wang, Shen Yan, Shiran Pan
2017/104 (PDF ) Implementing BP-Obfuscation Using Graph-Induced Encoding Shai Halevi, Tzipora Halevi, Victor Shoup, Noah Stephens-Davidowitz
2017/103 (PDF ) Reconciling d+1 Masking in Hardware and Software Hannes Gross, Stefan Mangard
2017/102 (PDF ) Quantum Authentication and Encryption with Key Recycling Serge Fehr, Louis Salvail
2017/101 (PDF ) Optimizing Implementations of Lightweight Building Blocks Jeremy Jean, Thomas Peyrin, Siang Meng Sim, Jade Tourteaux
2017/100 (PDF ) Private Puncturable PRFs From Standard Lattice Assumptions Dan Boneh, Sam Kim, Hart Montgomery
2017/099 (PDF ) Making NSEC5 Practical for DNSSEC Dimitrios Papadopoulos, Duane Wessels, Shumon Huque, Moni Naor, Jan Včelák, Leonid Reyzin, Sharon Goldberg
2017/098 (PDF ) Designing Fully Secure Protocols for Secure Two-Party Computation of Constant-Domain Functions Vanesa Daza, Nikolaos Makriyannis
2017/097 (PDF ) Boolean functions with restricted input and their robustness; application to the FLIP cipher Claude Carlet, Pierrick Méaux, Yann Rotella
2017/096 (PDF ) Asymptotically Compact Adaptively Secure Lattice IBEs and Verifiable Random Functions via Generalized Partitioning Techniques Shota Yamada
2017/095 (PDF ) Attacks on Secure Logging Schemes Gunnar Hartung
2017/094 (PDF ) Quantum Tokens for Digital Signatures Shalev Ben-David, Or Sattath
2017/093 (PDF ) On new multivariate cryptosystems based on hidden Eulerian equations over finite fields Vasyl Ustimenko
2017/092 (PDF ) Small CRT-Exponent RSA Revisited Atsushi Takayasu, Yao Lu, Liqiang Peng
2017/091 (PDF ) Design and Implementation of Low Depth Pairing-based Homomorphic Encryption Scheme Vincent Herbert, Bhaskar Biswas, Caroline Fontaine
2017/090 (PDF ) Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud Saiyu Qi, Yuanqing Zheng
2017/089 (PDF ) On a Linear Cryptanalysis of a Family of Modified DES Ciphers with Even Weight S-boxes Yuri Borissov, Peter Boyvalenkov, Robert Tsenkov
2017/088 (PDF ) A Differential Fault Attack on Plantlet Subhamoy Maitra, Akhilesh Siddhanti
2017/087 (PDF ) Cryptanalysis of full round Fruit Sabyasachi Dey, Santanu Sarkar
2017/086 (PDF ) Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation David Derler, Sebastian Ramacher, Daniel Slamanig
2017/085 (PDF ) Information Security Applications of Bit-Mixers Laszlo Hars
2017/084 (PDF ) Hardware Bit-Mixers Laszlo Hars
2017/083 (PDF ) Shor's Algorithm and Factoring: Don't Throw Away the Odd Orders Anna Johnston
2017/082 (PDF ) Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates Marc Fischlin, Felix Günther
2017/081 (PDF ) Estonian Voting Verification Mechanism Revisited Again Ivo Kubjas, Tiit Pikma, Jan Willemson
2017/080 (PDF ) From Minicrypt to Obfustopia via Private-Key Functional Encryption Ilan Komargodski, Gil Segev
2017/079 (PDF ) Faster Bootstrapping of FHE over the Integers Jung Hee Cheon, Kyoohyung Han, Duhyeong Kim
2017/078 (PDF ) LPN Decoded Andre Esser, Robert Kübler, Alexander May
2017/077 (PDF ) Quantum algorithms for computing short discrete logarithms and factoring RSA integers Martin Ekerå, Johan Håstad
2017/076 (PDF ) DFA on LS-Designs with a Practical Implementation on SCREAM (extended version) Benjamin Lac, Anne Canteaut, Jacques Fournier, Renaud Sirdey
2017/075 (PDF ) A First DFA on PRIDE: from Theory to Practice (extended version) Benjamin Lac, Marc Beunardeau, Anne Canteaut, Jacques Fournier, Renaud Sirdey
2017/074 (PDF ) Honey Chatting: A novel instant messaging system robust to eavesdropping over communication Joo-Im Kim, Ji Won Yoon
2017/073 (PDF ) Visual Honey Encryption: Application to Steganography Ji Won Yoon, Hyoungshick Kim, Hyun-Ju Jo, Hyelim Lee, Kwangsu Lee
2017/072 (PDF ) How to Circumvent the Two-Ciphertext Lower Bound for Linear Garbling Schemes Carmen Kempka, Ryo Kikuchi, Koutarou Suzuki
2017/071 (PDF ) Efficient Differential Trail Searching Algorithm for ARX Block Ciphers Seojin Kim, HyungChul Kang, Deukjo Hong, Jaechul Sung, Seokhie Hong
2017/070 (PDF ) Symbolic Models for Isolated Execution Environments Charlie Jacomme, Steve Kremer, Guillaume Scerri
2017/069 (PDF ) The Exact Security of PMAC Peter Gaži, Krzysztof Pietrzak, Michal Rybár
2017/068 (PDF ) Authenticated Encryption in the Face of Protocol and Side Channel Leakage Guy Barwell, Daniel P. Martin, Elisabeth Oswald, Martijn Stam
2017/067 (PDF ) Computation of a 768-bit prime field discrete logarithm Thorsten Kleinjung, Claus Diem, Arjen K. Lenstra, Christine Priplata, Colin Stahlke
2017/066 (PDF ) Subring Homomorphic Encryption Seiko Arita, Sari Handa
2017/065 (PDF ) FHE Over the Integers: Decomposed and Batched in the Post-Quantum Regime Daniel Benarroch, Zvika Brakerski, Tancrède Lepoint
2017/064 (PDF ) Fast Montgomery-like Square Root Computation over $GF(2^m)$ for All Trinomials Yin Li, Yu Zhang
2017/063 (PDF ) Optimal Extension Protocols for Byzantine Broadcast and Agreement Chaya Ganesh, Arpita Patra
2017/062 (PDF ) Efficient Maliciously Secure Two Party Computation for Mixed Programs Arash Afshar, Payman Mohassel, Mike Rosulek
2017/061 (PDF ) Short Digital Signatures and ID-KEMs via Truncation Collision Resistance Tibor Jager, Rafael Kurek
2017/060 (PDF ) Zero Round-Trip Time for the Extended Access Control Protocol Jacqueline Brendel, Marc Fischlin
2017/059 (PDF ) Adaptively Secure Recipient Revocable Broadcast Encryption with Constant size Ciphertext Kamalesh Acharya, Ratna Dutta
2017/058 (PDF ) WalnutDSA(TM): A Quantum-Resistant Digital Signature Algorithm Iris Anshel, Derek Atkins, Dorian Goldfeld, Paul E Gunnells
2017/057 (PDF ) Single--Trace Template Attack on the DES Round Keys of a Recent Smart Card Mathias Wagner, Stefan Heyse
2017/056 (PDF ) Verifiable Classroom Voting in Practice Feng Hao, Dylan Clarke, Brian Randell, Siamak F. Shahandashti
2017/055 (PDF ) A Probabilistic Baby-Step Giant-Step Algorithm Prabhat Kushwaha, Ayan Mahalanobis
2017/054 (PDF ) Attribute-Based Encryption Implies Identity-Based Encryption Javier Herranz
2017/053 (PDF ) Horizontal isogeny graphs of ordinary abelian varieties and the discrete logarithm problem Dimitar Jetchev, Benjamin Wesolowski
2017/052 (PDF ) A short note on the security of Round-Robin Differential Phase-Shift QKD Boris Skoric
2017/051 (PDF ) A note on VRFs from Verifiable Functional Encryption Saikrishna Badrinarayanan, Vipul Goyal, Aayush Jain, Amit Sahai
2017/050 (PDF ) An Obfuscating Compiler Peter T. Breuer
2017/049 (PDF ) LARA - A Design Concept for Lattice-based Encryption El Bansarkhani Rachid
2017/048 (PDF ) ROTE: Rollback Protection for Trusted Execution Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David Sommer, Arthur Gervais, Ari Juels, Srdjan Capkun
2017/047 (PDF ) On dual lattice attacks against small-secret LWE and parameter choices in HElib and SEAL Martin R. Albrecht
2017/046 (PDF ) Practical Passive Leakage-Abuse Attacks Against Symmetric Searchable Encryption Matthieu Giraud, Alexandre Anzala-Yamajako, Olivier Bernard, Pascal Lafourcade
2017/045 (PDF ) Efficient Round-Optimal Blind Signatures in the Standard Model Essam Ghadafi
2017/044 (PDF ) Anonymous contribution of data Matthew McKague, David Eyers
2017/043 (PDF ) Accumulators with Applications to Anonymity-Preserving Revocation Foteini Baldimtsi, Jan Camenisch, Maria Dubovitskaya, Anna Lysyanskaya, Leonid Reyzin, Kai Samelin, Sophia Yakoubov
2017/042 (PDF ) Indifferentiability of Iterated Even-Mansour Ciphers with Non-Idealized Key-Schedules: Five Rounds are Necessary and Sufficient Yuanxi Dai, Yannick Seurin, John Steinberger, Aishwarya Thiruvengadam
2017/041 (PDF ) Reducing Garbled Circuit Size While Preserving Circuit Gate Privacy Yongge Wang, Qutaibah m. Malluhi
2017/040 (PDF ) Practical Non-Malleable Codes from $\ell$-more Extractable Hash Functions Aggelos Kiayias, Feng-Hao Liu, Yiannis Tselekounis
2017/039 (PDF ) SePCAR: A Secure and Privacy-Enhancing Protocol for Car Access Provision (Full Version) Iraklis Symeonidis, Abdelrahaman Aly, Mustafa A. Mustafa, Bart Mennink, Siemen Dhooghe, Bart Preneel
2017/038 (PDF ) CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions Fabrice Benhamouda, Florian Bourse, Helger Lipmaa
2017/037 (PDF ) Double-base scalar multiplication revisited Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange
2017/036 (PDF ) Low-Complexity Cryptographic Hash Functions Benny Applebaum, Naama Haramaty, Yuval Ishai, Eyal Kushilevitz, Vinod Vaikuntanathan
2017/035 (PDF ) Privacy-Preserving Classification on Deep Neural Network Hervé Chabanne, Amaury de Wargny, Jonathan Milgram, Constance Morel, Emmanuel Prouff
2017/034 (PDF ) Analysis of the NORX Core Permutation Alex Biryukov, Aleksei Udovenko, Vesselin Velichkov
2017/033 (PDF ) Analyzing the Shuffling Side-Channel Countermeasure for Lattice-Based Signatures Peter Pessl
2017/032 (PDF ) Cryptanalysis of GlobalPlatform Secure Channel Protocols Mohamed Sabt, Jacques Traoré
2017/031 (PDF ) Honey Encryption for Language Marc Beunardeau, Houda Ferradi, Rémi Géraud, David Naccache
2017/030 (PDF ) Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation Xiao Wang, Samuel Ranellucci, Jonathan Katz
2017/029 (PDF ) Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions Gene Itkis, Emily Shen, Mayank Varia, David Wilson, Arkady Yerukhimovich
2017/027 (PDF ) Scalable Multi-Party Private Set-Intersection Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
2017/026 (PDF ) Constant Round Adaptively Secure Protocols in the Tamper-Proof Hardware Model Carmit Hazay, Antigoni Polychroniadou, Muthuramakrishnan Venkitasubramaniam
2017/025 (PDF ) Improved Structure Preserving Signatures under Standard Bilinear Assumptions Charanjit S. Jutla, Arnab Roy
2017/024 (PDF ) Searchable Encrypted Relational Databases: Risks and Countermeasures Mohamed Ahmed Abdelraheem, Tobias Andersson, Christian Gehrmann
2017/023 (PDF ) Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits Nuttapong Attrapadung
2017/022 (PDF ) Privacy for Distributed Databases via (Un)linkable Pseudonyms Jan Camenisch, Anja Lehmann
2017/021 (PDF ) A Generic Approach to Constructing and Proving Verifiable Random Functions Rishab Goyal, Susan Hohenberger, Venkata Koppula, Brent Waters
2017/020 (PDF ) concerto: A Methodology Towards Reproducible Analyses of TLS Datasets Olivier Levillain, Maxence Tury, Nicolas Vivet
2017/019 (PDF ) SmartPool: Practical Decentralized Pooled Mining Loi Luu, Yaron Velner, Jason Teutsch, Prateek Saxena
2017/018 (PDF ) Verifiable Random Functions from Non-Interactive Witness-Indistinguishable Proofs Nir Bitansky
2017/017 (PDF ) Improved Algorithms for the Approximate k-List Problem in Euclidean Norm Gottfried Herold, Elena Kirshanova
2017/016 (PDF ) Provable Security of Substitution-Permutation Networks Yevgeniy Dodis, Jonathan Katz, John Steinberger, Aishwarya Thiruvengadam, Zhe Zhang
2017/015 (PDF ) Tight Upper and Lower Bounds for Leakage-Resilient, Locally Decodable and Updatable Non-Malleable Codes Dana Dachman-Soled, Mukul Kulkarni, Aria Shahverdi
2017/014 (PDF ) ORAMs in a Quantum World Tommaso Gagliardoni, Nikolaos P. Karvelas, Stefan Katzenbeisser
2017/013 (PDF ) Pinocchio-Based Adaptive zk-SNARKs and Secure/Correct Adaptive Function Evaluation Meilof Veeningen
2017/012 (PDF ) Universal Samplers with Fast Verification Venkata Koppula, Andrew Poelstra, Brent Waters
2017/011 (PDF ) Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
2017/010 (PDF ) Circuit-Private Multi-Key FHE Wutichai Chongchitmate, Rafail Ostrovsky
2017/009 (PDF ) Access Control Encryption for Equality, Comparison, and More Georg Fuchsbauer, Romain Gay, Lucas Kowalczyk, Claudio Orlandi
2017/008 (PDF ) Externally Verifiable Oblivious RAM Joshua Gancher, Adam Groce, Alex Ledger
2017/007 (PDF ) Algebraic Attack Efficiency versus S-box Representation Hossein Arabnezhad-Khanoki, Babak Sadeghiyan, Josef Pieprzyk
2017/006 (PDF ) Reduced Mumford divisors of a genus 2 curve through its jacobian function field Eduardo Ruiz Duarte
2017/005 (PDF ) High-speed Hardware Implementations of Point Multiplication for Binary Edwards and Generalized Hessian Curves Bahram Rashidi, Reza Rezaeian Farashahi, Sayed Masoud Sayedi
2017/004 (PDF ) A New Approach for Practical Function-Private Inner Product Encryption Sungwook Kim, Jinsu Kim, Jae Hong Seo
2017/003 (PDF ) The STROBE protocol framework Mike Hamburg
2017/001 (PDF ) Equivalences and Black-Box Separations of Matrix Diffie-Hellman Problems Jorge Luis Villar
2016/1196 (PDF ) MASCAT: Stopping Microarchitectural Attacks Before Execution Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar
2016/1195 (PDF ) Constant-Time Callees with Variable-Time Callers Cesar Pereida Garcïa, Billy Bob Brumley
2016/1194 (PDF ) Efficient Encryption from Random Quasi-Cyclic Codes Carlos Aguilar, Olivier Blazy, Jean-Christophe Deneuville, Philippe Gaborit, Gilles Zémor
2016/1193 (PDF ) The Secret Processor Will Go to The Ball: Benchmark Insider-Proof Encrypted Computing P. T. Breuer, J. P. Bowen, E. Palomar, Z. Liu
2016/1192 (PDF ) Non-Malleable Codes with Split-State Refresh Antonio Faonio, Jesper Buus Nielsen
2016/1191 (PDF ) On the Security of Practical and Complete Homomorphic Encrypted Computation P. T. Breuer, J. P. Bowen
2016/1190 (PDF ) Equivocating Yao: Constant-Round Adaptively Secure Multiparty Computation in the Plain Model Ran Canetti, Oxana Poburinnaya, Muthuramakrishnan Venkitasubramaniam
2016/1189 (PDF ) On the Bit Security of Elliptic Curve Diffie--Hellman Barak Shani
2016/1188 (PDF ) Farfalle: parallel permutation-based cryptography Guido Bertoni, Joan Daemen, Seth Hoffert, Michaël Peeters, Gilles Van Assche, Ronny Van Keer
2016/1187 (PDF ) Computing Optimal Ate Pairings on Elliptic Curves with Embedding Degree $9,15$ and $27$ Emmanuel Fouotsa, Nadia El Mrabet, Aminatou Pecha
2016/1186 (PDF ) On the Complexity of Breaking Pseudoentropy Maciej Skorski
2016/1184 (PDF ) Bitcoin Private Key Locked Transactions Sergi Delgado-Segura, Cristina Pérez-Solà, Jordi Herrera-Joancomartí, Guillermo Navarro-Arribas
2016/1183 (PDF ) Some Results on the Known Classes of Quadratic APN Functions Lilya Budaghyan, Tor Helleseth, Nian Li, Bo Sun
2016/1182 (PDF ) Public Key Encryption with Equality Test in the Standard Model Hyung Tae Lee, San Ling, Jae Hong Seo, Huaxiong Wang, Taek-Young Youn
2016/1181 (PDF ) New Impossible Differential Search Tool from Design and Cryptanalysis Aspects Yu Sasaki, Yosuke Todo
2016/1179 (PDF ) Updatable Functional Encryption Afonso Arriaga, Vincenzo Iovino, Qiang Tang
2016/1178 (PDF ) Implementing and Proving the TLS 1.3 Record Layer Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Cédric Fournet, Markulf Kohlweiss, Jianyang Pan, Jonathan Protzenko, Aseem Rastogi, Nikhil Swamy, Santiago Zanella-Béguelin, Jean Karim Zinzindohoué
2016/1177 (PDF ) Efficient Slide Attacks Achiya Bar-On, Eli Biham, Orr Dunkelman, Nathan Keller
2016/1176 (PDF ) Leakage of Signal function with reused keys in RLWE key exchange Jintai Ding, Saed Alsayigh, Saraswathy RV, Scott Fluhrer, Xiaodong Lin
2016/1175 (PDF ) On the Security Notions for Homomorphic Signatures Dario Catalano, Dario Fiore, Luca Nizzardo
2016/1174 (PDF ) Revisiting Full-PRF-Secure PMAC and Using It for Beyond-Birthday Authenticated Encryption Eik List, Mridul Nandi
2016/1173 (PDF ) Construction of Lightweight MDS Matrices over the Matrix Polynomial Residue Ring Lijing Zhou, Licheng Wang, Yiru Sun
2016/1172 (PDF ) On the Provable Security of the Tweakable Even-Mansour Cipher Against Multi-Key and Related-Key Attacks Ping Zhang, Honggang Hu
2016/1171 (PDF ) A Salad of Block Ciphers Roberto Avanzi
2016/1170 (PDF ) Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC Christoph Dobraunig, Eik List
2016/1169 (PDF ) LWE from Non-commutative Group Rings Qi Cheng, Jun Zhang, Jincheng Zhuang
2016/1167 (PDF ) Mobile Commerce: Secure Multi-party Computation & Financial Cryptography Sumit Chakraborty
2016/1166 (PDF ) Group key exchange protocols withstanding ephemeral-key reveals Maria Isabel Gonzalez Vasco, Angel L. Perez del Pozo, Adriana Suarez Corona
2016/1165 (PDF ) Efficient Transparent Redactable Signatures with a Single Signature Invocation Stuart Haber, William Horne, Miaomiao Zhang
2016/1164 (PDF ) Attacking FHE-based applications by software fault injections Ilaria Chillotti, Nicolas Gama, Louis Goubin
2016/1163 (PDF ) Using Fully Homomorphic Encryption for Statistical Analysis of Categorical, Ordinal and Numerical Data Wen-jie Lu, Shohei Kawasaki, Jun Sakuma
2016/1162 (PDF ) Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions Jian Guo, Jérémy Jean, Ivica Nikolic, Yu Sasaki
2016/1161 (PDF ) Impossible Differential Attack on Simpira v2 Rui Zong, Xiaoyang Dong, Xiaoyun Wang
2016/1160 (PDF ) Meet-in-the-Middle Attack on QARMA Block Cipher Rui Zong, Xiaoyang Dong
2016/1159 (PDF ) SPECTRE: A Fast and Scalable Cryptocurrency Protocol Yonatan Sompolinsky, Yoad Lewenberg, Aviv Zohar
2016/1158 (PDF ) Activate Later Certificates for V2X -- Combining ITS efficiency with privacy Eric R. Verheul
2016/1157 (PDF ) NewHope without reconciliation Erdem Alkim, Léo Ducas, Thomas Pöppelmann, Peter Schwabe
2016/1156 (PDF ) Scripting smart contracts for distributed ledger technology Pablo Lamela Seijas, Simon Thompson, Darryl McAdams
2016/1155 (PDF ) Comparative Study of Various Approximations to the Covariance Matrix in Template Attacks Mathias Wagner, Yongbo Hu, Chen Zhang, Yeyang Zheng
2016/1154 (PDF ) Identification Protocols and Signature Schemes Based on Supersingular Isogeny Problems Steven D. Galbraith, Christophe Petit, Javier Silva
2016/1153 (PDF ) Attacks against search Poly-LWE Momonari Kudo
2016/1152 (PDF ) Leak Me If You Can: Does TVLA Reveal Success Rate? Debapriya Basu Roy, Shivam Bhasin, Sylvain Guilley, Annelie Heuser, Sikhar Patranabis, Debdeep Mukhopadhyay
2016/1151 (PDF ) A Novel Multi-factor ID-based Designated Verifier Signature scheme Mike Scott
2016/1150 (PDF ) Simple Homomorphisms of Cocks IBE and Applications Rio LaVigne
2016/1149 (PDF ) Exploiting Safe Error based Leakage of RFID Authentication Protocol using Hardware Trojan Horse Krishna Bagadia, Urbi Chatterjee, Debapriya Basu Roy, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty
2016/1148 (PDF ) Splinter: Practical Private Queries on Public Data Frank Wang, Catherine Yun, Shafi Goldwasser, Vinod Vaikuntanathan, Matei Zaharia
2016/1147 (PDF ) Cryptanalysis of a certificateless aggregate signature scheme Nasrollah Pakniat, Mahnaz Noroozi
2016/1146 (PDF ) Preventing Adaptive Key Recovery Attacks on the Gentry-Sahai-Waters Leveled Homomorphic Encryption Scheme Zengpeng Li, Steven D. Galbraith, Chunguang Ma
2016/1145 (PDF ) Evolving S-Boxes with Reduced Differential Power Analysis Susceptibility Merrielle Spain, Mayank Varia
2016/1144 (PDF ) Private Projections & Variants Xavier Carpent, Sky Faber, Tomas Sander, Gene Tsudik
2016/1143 (PDF ) Ciphertext and Plaintext Leakage Reveals the Entire TDES Key Yongbo Hu, Chen Zhang, Yeyang Zheng, Mathias Wagner
2016/1142 (PDF ) New construction of single-cycle T-function families Shiyi ZHANG, Yongjuan WANG, Guangpu GAO
2016/1141 (PDF ) An Oblivious Parallel RAM with $O(\log^2 N)$ Parallel Runtime Blowup Kartik Nayak, Jonathan Katz
2016/1140 (PDF ) Attribute Based Encryption: Traitor Tracing, Revocation and Fully Security on Prime Order Groups Xiaoyi Li, Kaitai Liang, Zhen Liu, Duncan S. Wong
2016/1138 (PDF ) Pairing Cryptography Meets Isogeny: A New Framework of Isogenous Pairing Groups Takeshi Koshiba, Katsuyuki Takashima
2016/1137 (PDF ) New Impossible Differential Characteristic of SPECK64 using MILP HoChang Lee, HyungChul Kang, Deukjo Hong, Jaechul Sung, Seokhie Hong
2016/1136 (PDF ) Cryptography During the French and American Wars in Vietnam Phan Duong Hieu, Neal Koblitz
2016/1135 (PDF ) Static Power Side-Channel Analysis of a Threshold Implementation Prototype Chip Thorben Moos, Amir Moradi, Bastian Richter
2016/1134 (PDF ) Privacy-preserving Hybrid Recommender System Qiang Tang, Husen Wang
2016/1133 (PDF ) Implementing Complete Formulas on Weierstrass Curves in Hardware Pedro Maat C. Massolino, Joost Renes, Lejla Batina
2016/1132 (PDF ) Some results on ACORN Dibyendu Roy, Sourav Mukhopadhyay
2016/1131 (PDF ) New construction of single cycle T-function families Shiyi ZHANG, Yongjuan WANG, Guangpu GAO
2016/1130 (PDF ) Are RNGs Achilles’ heel of RFID Security and Privacy Protocols ? Atakan Arslan, Suleyman Kardas, Sultan Aldirmaz, Sarp Erturk
2016/1128 (PDF ) Modifying Shor’s algorithm to compute short discrete logarithms Martin Ekerå
2016/1127 (PDF ) Related-Key Impossible-Differential Attack on Reduced-Round SKINNY Ralph Ankele, Subhadeep Banik, Avik Chakraborti, Eik List, Florian Mendel, Siang Meng Sim, Gaoli Wang
2016/1126 (PDF ) Lizard: Cut off the Tail! Practical Post-Quantum Public-Key Encryption from LWE and LWR Jung Hee Cheon, Duhyeong Kim, Joohee Lee, Yongsoo Song
2016/1124 (PDF ) Integrity Analysis of Authenticated Encryption Based on Stream Ciphers Kazuya Imamura, Kazuhiko Minematsu, Tetsu Iwata
2016/1123 (PDF ) Dude, is my code constant time? Oscar Reparaz, Josep Balasch, Ingrid Verbauwhede
2016/1122 (PDF ) Quantum Key Recycling with eight-state encoding (The Quantum One Time Pad is more interesting than we thought) B. Skoric, M. de Vries
2016/1121 (PDF ) Insecurity of RCB: Leakage-Resilient Authenticated Encryption Farzaneh abed, Francesco Berti, Stefan Lucks
2016/1120 (PDF ) Cryptanalysis of Reduced round SKINNY Block Cipher Sadegh Sadeghi, Tahere Mohammadi, Nasour Bagheri
2016/1119 (PDF ) A Code-Based Group Signature Scheme Quentin Alamélou, Olivier Blazy, Stéphane Cauchie, Philippe Gaborit
2016/1118 (PDF ) Designing Optimal Implementations of Linear Layers (Full Version) Ruoxin Zhao, Baofeng Wu, Rui Zhang, Qian Zhang
2016/1117 (PDF ) Privacy-friendly Forecasting for the Smart Grid using Homomorphic Encryption and the Group Method of Data Handling Joppe W. Bos, Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren
2016/1116 (PDF ) Evaluating Entropy for TRNGs: Efficient, Robust and Provably Secure Maciej Skorski
2016/1115 (PDF ) Impossible Differential Cryptanalysis of Reduced-Round SKINNY Mohamed Tolba, Ahmed Abdelkhalek, Amr M. Youssef
2016/1114 (PDF ) Full Disk Encryption: Bridging Theory and Practice Louiza Khati, Nicky Mouha, Damien Vergnaud
2016/1113 (PDF ) Efficient Construction of Visual Cryptographic Scheme for Compartmented Access Structures Sabyasachi Dutta, Tamal Bhore, Avishek Adhikari
2016/1112 (PDF ) Direct construction of quasi-involutory recursive-like MDS matrices from $2$-cyclic codes Victor Cauchois, Pierre Loidreau, Nabil Merkiche
2016/1111 (PDF ) Hiding Higher-Order Side-Channel Leakage - Randomizing Cryptographic Implementations in Reconfigurable Hardware Pascal Sasdrich, Amir Moradi, Tim Güneysu
2016/1110 (PDF ) Efficient Post-Quantum Zero-Knowledge and Signatures Steven Goldfeder, Melissa Chase, Greg Zaverucha
2016/1109 (PDF ) Practical CCA2-Secure and Masked Ring-LWE Implementation Tobias Oder, Tobias Schneider, Thomas Pöppelmann, Tim Güneysu
2016/1108 (PDF ) Security Analysis of SKINNY under Related-Tweakey Settings Guozhen Liu, Mohona Ghosh, Ling Song
2016/1107 (PDF ) Magic Adversaries Versus Individual Reduction: Science Wins Either Way Yi Deng
2016/1106 (PDF ) Functional Encryption for Quadratic Functions, and Applications to Predicate Encryption Romain Gay
2016/1105 (PDF ) Generic Transformations of Predicate Encodings: Constructions and Applications Miguel Ambrona, Gilles Barthe, Benedikt Schmidt
2016/1104 (PDF ) Practical Functional Encryption for Bilinear Forms Carmen Elisabetta Zaira Baltico, Dario Catalano, Dario Fiore
2016/1103 (PDF ) A Fast Single-Key Two-Level Universal Hash Function Debrup Chakraborty, Sebati Ghosh, Palash Sarkar
2016/1102 (PDF ) Challenges with Assessing the Impact of NFS Advances on the Security of Pairing-based Cryptography Alfred Menezes, Palash Sarkar, Shashank Singh
2016/1101 (PDF ) MILP-Aided Bit-Based Division Property for ARX-Based Block Cipher Ling Sun, Wei Wang, Ru Liu, Meiqin Wang
2016/1100 (PDF ) Pseudoentropic Isometries: A New Framework for Fuzzy Extractor Reusability Quentin Alamélou, Paul-Edmond Berthier, Chloé Cachet, Stéphane Cauchie, Benjamin Fuller, Philippe Gaborit, Sailesh Simhadri
2016/1099 (PDF ) Improved Parameters for the Ring-TESLA Digital Signature Scheme Arjun Chopra
2016/1098 (PDF ) Multi-key Analysis of Tweakable Even-Mansour with Applications to Minalpher and OPP Zhiyuan Guo, Wenling Wu, Renzhang Liu, Liting Zhang
2016/1097 (PDF ) Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation From Degree-5 Multilinear Maps Prabhanjan Ananth, Amit Sahai
2016/1096 (PDF ) Indistinguishability Obfuscation from SXDH on 5-Linear Maps and Locality-5 PRGs Huijia Lin
2016/1095 (PDF ) Improved Key Recovery Algorithms from Noisy RSA Secret Keys with Analog Noise Noboru Kunihiro, Yuki Takahashi
2016/1094 (PDF ) New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters Yohei Watanabe, Keita Emura, Jae Hong Seo
2016/1093 (PDF ) Energy Optimization of Unrolled Block Ciphers using Combinational Checkpointing Siva Nishok Dhanuskodi, Daniel Holcomb
2016/1092 (PDF ) Parametrizations for Families of ECM-friendly curves Alexandre Gélin, Thorsten Kleinjung, Arjen K. Lenstra
2016/1091 (PDF ) On the Entropy of Oscillator-Based True Random Number Generators Yuan Ma, Jingqiang Lin, Jiwu Jing
2016/1090 (PDF ) OleF: An Inverse-Free Online Cipher Ritam Bhaumik, Mridul Nandi
2016/1089 (PDF ) Homomorphic-Policy Attribute-Based Key Encapsulation Mechanisms Jérémy Chotard, Duong Hieu Phan, David Pointcheval
2016/1088 (PDF ) How to infinitely share a secret more efficiently Anat Paskin-Cherniavsky
2016/1087 (PDF ) CENC is Optimally Secure Tetsu Iwata, Bart Mennink, Damian Vizár
2016/1086 (PDF ) An Attribute-Based Anonymous Broadcast Encryption Scheme with Adaptive Security in the Standard Model Reyhaneh Rabaninejad, Mohammad Hassan Ameri, Mahshid Delavar, Javad Mohajeri
2016/1085 (PDF ) Digital Signatures from Symmetric-Key Primitives David Derler, Claudio Orlandi, Sebastian Ramacher, Christian Rechberger, Daniel Slamanig
2016/1084 (PDF ) Circuit OPRAM: Unifying Statistically and Computationally Secure ORAMs and OPRAMs T-H. Hubert Chan, Elaine Shi
2016/1083 (PDF ) Constructions Secure against Receiver Selective Opening and Chosen Ciphertext Attacks Dingding Jia, Xianhui Lu, Bao Li
2016/1082 (PDF ) My traces learn what you did in the dark: recovering secret signals without key guesses Si Gao, Hua Chen, Wenling Wu, Limin Fan, Weiqiong Cao, Xiangliang Ma
2016/1081 (PDF ) Attacks to a proxy-mediated key agreement protocol based on symmetric encryption David Nuñez, Isaac Agudo, Javier Lopez
2016/1080 (PDF ) Does Coupling Affect the Security of Masked Implementations? Thomas De Cnudde, Begül Bilgin, Benedikt Gierlichs, Ventzislav Nikov, Svetla Nikova, Vincent Rijmen
2016/1079 (PDF ) Revisiting the Cubic UOV Signature Scheme Dung Hoang Duong, Takanori Yasuda, Albrecht Petzoldt, Yacheng Wang, Tsuyoshi Takagi
2016/1078 (PDF ) Construction of $n$-variable ($n\equiv 2 \bmod 4$) balanced Boolean functions with maximum absolute value in autocorrelation spectra $< 2^{\frac n2}$ Deng Tang, Subhamoy Maitra
2016/1077 (PDF ) Blurry-ORAM: A Multi-Client Oblivious Storage Architecture N. P. Karvelas, Andreas Peter, Stefan Katzenbeisser
2016/1076 (PDF ) A Note on Quantum-Secure PRPs Mark Zhandry
2016/1075 (PDF ) Cryptanalysis of Simple Matrix Scheme for Encryption Gu Chunsheng
2016/1074 (PDF ) Side-Channel Plaintext-Recovery Attacks on Leakage-Resilient Encryption Thomas Unterluggauer, Mario Werner, Stefan Mangard
2016/1073 (PDF ) Linking-Based Revocation for Group Signatures: A Pragmatic Approach for Efficient Revocation Checks Daniel Slamanig, Raphael Spreitzer, Thomas Unterluggauer
2016/1072 (PDF ) Game-Theoretic Security for Two-Party Protocols Haruna Higo, Keisuke Tanaka, Akihiro Yamada, Kenji Yasunaga
2016/1071 (PDF ) Iron: Functional Encryption using Intel SGX Ben A. Fisch, Dhinakaran Vinayagamurthy, Dan Boneh, Sergey Gorbunov
2016/1070 (PDF ) Preventing CLT Attacks on Obfuscation with Linear Overhead Rex Fernando, Peter M. R. Rasmussen, Amit Sahai
2016/1069 (PDF ) Constant Round Maliciously Secure 2PC with Function-independent Preprocessing using LEGO Jesper Buus Nielsen, Thomas Schneider, Roberto Trifiletti
2016/1068 (PDF ) On Finding Short Cycles in Cryptographic Algorithms Elena Dubrova, Maxim Teslenko
2016/1067 (PDF ) Scalable Bias-Resistant Distributed Randomness Ewa Syta, Philipp Jovanovic, Eleftherios Kokoris Kogias, Nicolas Gailly, Linus Gasser, Ismail Khoffi, Michael J. Fischer, Bryan Ford
2016/1066 (PDF ) Optimizing Semi-Honest Secure Multiparty Computation for the Internet Aner Ben-Efraim, Yehuda Lindell, Eran Omri
2016/1065 (PDF ) Revisiting the Efficient Key Generation of ZHFE Yasuhiko Ikematsu, Dung H. Duong, Albrecht Petzoldt, Tsuyoshi Takagi
2016/1064 (PDF ) Signer-Anonymous Designated-Verifier Redactable Signatures for Cloud-Based Data Sharing David Derler, Stephan Krenn, Daniel Slamanig
2016/1063 (PDF ) Authenticated LSM Trees with Minimal Trust Yuzhe (Richard) Tang, Ju Chen, Kai Li
2016/1062 (PDF ) Catena: Efficient Non-equivocation via Bitcoin Alin Tomescu, Srinivas Devadas
2016/1061 (PDF ) Changing of the Guards: a simple and efficient method for achieving uniformity in threshold sharing Joan Daemen
2016/1060 (PDF ) On Analyzing Program Behavior Under Fault Injection Attacks Jakub Breier
2016/1059 (PDF ) The INT-RUP Security of OCB with Intermediate (Parity) Checksum Ping Zhang, Peng Wang, Honggang Hu
2016/1058 (PDF ) Ring-LWE Ciphertext Compression and Error Correction: Tools for Lightweight Post-Quantum Cryptography Markku-Juhani O. Saarinen
2016/1057 (PDF ) Secure Multiparty Computation from SGX Raad Bahmani, Manuel Barbosa, Ferdinand Brasser, Bernardo Portela, Ahmad-Reza Sadeghi, Guillaume Scerri, Bogdan Warinschi
2016/1056 (PDF ) A Tool Kit for Partial Key Exposure Attacks on RSA Atsushi Takayasu, Noboru Kunihiro
2016/1055 (PDF ) A Practical Post-Quantum Public-Key Cryptosystem Based on spLWE Jung Hee Cheon, Kyoo Hyung Han, Jinsu Kim, Changmin Lee, Yongha Son
2016/1054 (PDF ) SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei
2016/1053 (PDF ) SAT-based Cryptanalysis of Authenticated Ciphers from the CAESAR Competition Ashutosh Dhar Dwivedi, Miloš Klouček, Pawel Morawiecki, Ivica Nikolic̈, Josef Pieprzyk, Sebastian Wöjtowicz
2016/1052 (PDF ) Hickory Hash(TM): Implementing an Instance of an Algebraic Eraser(TM) Hash Function on an MSP430 Microcontroller Iris Anshel, Derek Atkins, Dorian Goldfeld, Paul E Gunnells
2016/1051 (PDF ) Super-Strong RKA Secure MAC, PKE and SE from Tag-based Hash Proof System Shuai Han, Shengli Liu, Lin Lyu
2016/1050 (PDF ) Cryptographic decoding of the Leech lattice Alex van Poppelen
2016/1049 (PDF ) Randomized stopping times and provably secure pseudorandom permutation generators Michal Kulis, Pawel Lorek, Filip Zagorski
2016/1048 (PDF ) The Bitcoin Backbone Protocol with Chains of Variable Difficulty Juan A. Garay, Aggelos Kiayias, Nikos Leonardos
2016/1047 (PDF ) IoT Goes Nuclear: Creating a ZigBee Chain Reaction Eyal Ronen, Colin O’Flynn, Adi Shamir, Achi-Or Weingarten
2016/1046 (PDF ) Efficient Finite field multiplication for isogeny based post quantum cryptography Angshuman karmakar, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede
2016/1045 (PDF ) On Fast Calculation of Addition Chains for Isogeny-Based Cryptography Brian Koziel, Reza Azarderakhsh, David Jao, Mehran Mozaffari-Kermani
2016/1044 (PDF ) Fast Hardware Architectures for Supersingular Isogeny Diffie-Hellman Key Exchange on FPGA Brian Koziel, Reza Azarderakhsh, Mehran Mozaffari Kermani
2016/1043 (PDF ) Concurrently Composable Security With Shielded Super-polynomial Simulators Brandon Broadnax, Nico Döttling, Gunnar Hartung, Jörn Müller-Quade, Matthias Nagel
2016/1042 (PDF ) "Oops, I did it again" -- Security of One-Time Signatures under Two-Message Attacks Leon Groot Bruinderink, Andreas Hülsing
2016/1041 (PDF ) XDedup: Efficient Provably-Secure Cross-User Chunk-Level Client-Side Deduplicated Cloud Storage of Encrypted Data Chia-Mu Yu
2016/1039 (PDF ) A Fiat-Shamir Implementation Note Simon Cogliani, Rémi Géraud, David Naccache
2016/1038 (PDF ) An Efficient Non-Interactive Multi-client Searchable Encryption with Support for Boolean Queries Shi-Feng Sun, Joseph K. Liu, Amin Sakzad, Ron Steinfeld, Tsz Hon Yuen
2016/1037 (PDF ) Apollo - End-to-end Verifiable Internet Voting with Recovery from Vote Manipulation Dawid Gawel, Maciej Kosarzecki, Poorvi L. Vora, Hua Wu, Filip Zagorski
2016/1036 (PDF ) Direct Construction of Lightweight Rotational-XOR MDS Diffusion Layers Zhiyuan Guo, Renzhang Liu, Wenling Wu, Dongdai Lin
2016/1035 (PDF ) Improved Estimation of Collision Entropy in High and Low-Entropy Regimes and Applications to Anomaly Detection Maciej Skorski
2016/1034 (PDF ) Significantly Improved Multi-bit Differentials for Reduced Round Salsa and ChaCha Arka Rai Choudhuri, Subhamoy Maitra
2016/1033 (PDF ) Decentralized Anonymous Micropayments Alessandro Chiesa, Matthew Green, Jingcheng Liu, Peihan Miao, Ian Miers, Pratyush Mishra
2016/1032 (PDF ) Efficient Covert Two-Party Computation Stanislaw Jarecki
2016/1031 (PDF ) A Multiplexer based Arbiter PUF Composition with Enhanced Reliability and Security Durga Prasad Sahoo, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Phuong Ha Nguyen
2016/1030 (PDF ) Novel Inner Product Encryption Resistant to Partial Collusion Attacks Yuqiao Deng, Ge Song
2016/1029 (PDF ) Scalable Attribute-Based Encryption Under the Strictly Weaker Assumption Family Yuqiao Deng, Ge Song
2016/1028 (PDF ) Ratcheted Encryption and Key Exchange: The Security of Messaging Mihir Bellare, Asha Camper Singh, Joseph Jaeger, Maya Nyayapati, Igors Stepanovs
2016/1027 (PDF ) Formal Abstractions for Attested Execution Secure Processors Rafael Pass, Elaine Shi, Florian Tramer
2016/1026 (PDF ) Sharper Ring-LWE Signatures Paulo S. L. M. Barreto, Patrick Longa, Michael Naehrig, Jefferson E. Ricardini, Gustavo Zanon
2016/1025 (PDF ) An Algorithm for Counting the Number of $2^n$-Periodic Binary Sequences with Fixed $k$-Error Linear Complexity Wenlun Pan, Zhenzhen Bao, Dongdai Lin, Feng Liu
2016/1024 (PDF ) LDA-Based Clustering as a Side-Channel Distinguisher Rauf Mahmudlu, Valentina Banciu, Lejla Batina, Ileana Buhan
2016/1023 (PDF ) Constant-Time Higher-Order Boolean-to-Arithmetic Masking Michael Hutter, Michael Tunstall
2016/1022 (PDF ) Randomized Mixed-Radix Scalar Multiplication Eleonora Guerrini, Laurent Imbert, Théo Winterhalter
2016/1021 (PDF ) Cryptographic Randomness on a CC2538: a Case Study Yan Yan, Elisabeth Oswald, Theo Tryfonas
2016/1020 (PDF ) KDM Security for Identity-Based Encryption: Constructions and Separations Yu Chen, Jiang Zhang, Yi Deng, Jinyong Chang
2016/1019 (PDF ) Faster Homomorphic Evaluation of Discrete Fourier Transforms Anamaria Costache, Nigel P. Smart, Srinivas Vivek
2016/1018 (PDF ) IKP: Turning a PKI Around with Blockchains Stephanos Matsumoto, Raphael M. Reischuk
2016/1017 (PDF ) Post-Quantum Key Exchange for the Internet and the Open Quantum Safe Project Douglas Stebila, Michele Mosca
2016/1016 (PDF ) Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures Mihir Bellare, Bertram Poettering, Douglas Stebila
2016/1015 (PDF ) MaxLength Considered Harmful to the RPKI Yossi Gilad, Omar Sagga, Sharon Goldberg
2016/1014 (PDF ) Revisiting and Extending the AONT-RS scheme: a Robust Computationally Secure Secret Sharing Scheme Liqun Chen, Thalia M. Laing, Keith M. Martin
2016/1013 (PDF ) A Formal Security Analysis of the Signal Messaging Protocol Katriel Cohn-Gordon, Cas Cremers, Benjamin Dowling, Luke Garratt, Douglas Stebila
2016/1012 (PDF ) Comment on "Attribute-Based Signatures for Supporting Anonymous Certification" by N. Kaaniche and M. Laurent (ESORICS 2016) Damien Vergnaud
2016/1011 (PDF ) Zeroizing Attacks on Indistinguishability Obfuscation over CLT13 Jean-Sébastien Coron, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi
2016/1010 (PDF ) Are We There Yet? On RPKI's Deployment and Security Yossi Gilad, Avichai Cohen, Amir Herzberg, Michael Schapira, Haya Shulman
2016/1009 (PDF ) Efficient Resettably Secure Two-Party Computation Tobias Nilges
2016/1008 (PDF ) KP+ : Fixing Availability Issues on KP Ownership Transfer Protocols Jorge Munilla
2016/1007 (PDF ) A survey of attacks on Ethereum smart contracts Nicola Atzei, Massimo Bartoletti, Tiziana Cimoli
2016/1006 (PDF ) The Security of NTP’s Datagram Protocol Aanchal Malhotra, Matthew Van Gundy, Mayank Varia, Haydn Kennedy, Jonathan Gardner, Sharon Goldberg
2016/1005 (PDF ) Atomic-AES v2.0 Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni
2016/1004 (PDF ) Private Circuits III: Hardware Trojan-Resilience via Testing Amplification Stefan Dziembowski, Sebastian Faust, Francois-Xavier Standaert
2016/1003 (PDF ) Cryptanalysis of Indistinguishability Obfuscations of Circuits over GGH13 Daniel Apon, Nico Döttling, Sanjam Garg, Pratyay Mukherjee
2016/1002 (PDF ) Decryption phase in Norwegian electronic voting Anders Smedstuen Lund, Martin Strand
2016/1001 (PDF ) Revisiting RC4 Key Collision: Faster Search Algorithm and New 22-byte Colliding Key Pairs Amit Jana, Goutam Paul
2016/999 (PDF ) Indiscreet Logs: Persistent Diffie-Hellman Backdoors in TLS Kristen Dorey, Nicholas Chang-Fong, Aleksander Essex
2016/998 (PDF ) Cryptanalyses of Candidate Branching Program Obfuscators Yilei Chen, Craig Gentry, Shai Halevi
2016/997 (PDF ) More Efficient Commitments from Structured Lattice Assumptions Carsten Baum, Ivan Damgård, Vadim Lyubashevsky, Sabine Oechsner, Chris Peikert
2016/996 (PDF ) Leakage-Resilient and Misuse-Resistant Authenticated Encryption Francesco Berti, François Koeune, Olivier Pereira, Thomas Peters, François-Xavier Standaert
2016/995 (PDF ) Measuring small subgroup attacks against Diffie-Hellman Luke Valenta, David Adrian, Antonio Sanso, Shaanan Cohney, Joshua Fried, Marcella Hastings, J. Alex Halderman, Nadia Heninger
2016/994 (PDF ) Improving Authenticated Dynamic Dictionaries, with Applications to Cryptocurrencies Leonid Reyzin, Dmitry Meshkov, Alexander Chepurnoy, Sasha Ivanov
2016/993 (PDF ) Comparing Sboxes of Ciphers from the Perspective of Side-Channel Attacks Liran Lerman, Olivier Markowitch, Nikita Veshchikov
2016/992 (PDF ) Estimating the cost of generic quantum pre-image attacks on SHA-2 and SHA-3 Matthew Amy, Olivia Di Matteo, Vlad Gheorghiu, Michele Mosca, Alex Parent, John Schanck
2016/991 (PDF ) Bootstrapping the Blockchain, with Applications to Consensus and Fast PKI Setup Juan A. Garay, Aggelos Kiayias, Nikos Leonardos, Giorgos Panagiotakos
2016/990 (PDF ) Revisiting the Wrong-Key-Randomization Hypothesis Tomer Ashur, Tim Beyne, Vincent Rijmen
2016/989 (PDF ) Scrypt is Maximally Memory-Hard Joël Alwen, Binyi Chen, Krzysztof Pietrzak, Leonid Reyzin, Stefano Tessaro
2016/988 (PDF ) Zero Knowledge Protocols from Succinct Constraint Detection Eli Ben-Sasson, Alessandro Chiesa, Michael A. Forbes, Ariel Gabizon, Michael Riabzev, Nicholas Spooner
2016/987 (PDF ) A Key to Success -- Success Exponents for Side-Channel Distinguishers Sylvain Guilley, Annelie Heuser, Olivier Rioul
2016/986 (PDF ) Fast Arithmetic Modulo $2^xp^y\pm 1$ Joppe W. Bos, Simon Friedberger
2016/985 (PDF ) Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data Dario Fiore, Cédric Fournet, Esha Ghosh, Markulf Kohlweiss, Olga Ohrimenko, Bryan Parno
2016/984 (PDF ) Design Strategies for ARX with Provable Bounds: SPARX and LAX (Full Version) Daniel Dinu, Léo Perrin, Aleksei Udovenko, Vesselin Velichkov, Johann Großschädl, Alex Biryukov
2016/983 (PDF ) Exact Security Analysis of Hash-then-Mask Type Probabilistic MAC Constructions Avijit Dutta, Ashwin Jha, Mridul Nandi
2016/982 (PDF ) Securing Systems with Scarce Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the IoT Christopher Huth, Daniela Becker, Jorge Guajardo, Paul Duplys, Tim Güneysu
2016/981 (PDF ) Efficient No-dictionary Verifiable SSE Wakaha Ogata, Kaoru Kurosawa
2016/980 (PDF ) TruSpy: Cache Side-Channel Information Leakage from the Secure World on ARM Devices Ning Zhang, Kun Sun, Deborah Shands, Wenjing Lou, Y. Thomas Hou
2016/979 (PDF ) The Reason Why Some Divide-and-Conquer Algorithms Cannot Be Efficiently Implemented Zhengjun Cao, Lihua Liu
2016/978 (PDF ) Testing the Trustworthiness of IC Testing: An Oracle-less Attack on IC Camouflaging Muhammad Yasin, Ozgur Sinanoglu, Jeyavijayan Rajendran
2016/977 (PDF ) Side channels in deduplication: trade-offs between leakage and efficiency Frederik Armknecht, Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Mohsen Toorani
2016/976 (PDF ) On Adaptively Secure Multiparty Computation with a Short CRS Ran Cohen, Chris Peikert
2016/975 (PDF ) (Universal) Unconditional Verifiability in E-Voting without Trusted Parties Gina Gallegos-Garcia, Vincenzo Iovino, Alfredo Rial, Peter B. Roenne, Peter Y. A. Ryan
2016/974 (PDF ) Server-Aided Revocable Identity-Based Encryption from Lattices Khoa Nguyen, Huaxiong Wang, Juanyang Zhang
2016/973 (PDF ) Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs Jian Guo, Jérémy Jean, Ivica Nikolić, Kexin Qiao, Yu Sasaki, Siang Meng Sim
2016/972 (PDF ) Revealing Encryption for Partial Ordering Helene Haagh, Yue Ji, Chenxing Li, Claudio Orlandi, Yifan Song
2016/971 (PDF ) Authenticated communication from Quantum Readout of PUFs B. Skoric, P. W. H. Pinkse, A. P. Mosk
2016/970 (PDF ) Statistical Analysis for Access-Driven Cache Attacks Against AES Liwei Zhang, A. Adam Ding, Yunsi Fei, Zhen Hang Jiang
2016/969 (PDF ) Garbling Gadgets for Boolean and Arithmetic Circuits Marshall Ball, Tal Malkin, Mike Rosulek
2016/968 (PDF ) System Clock and Power Supply Cross-Checking for Glitch Detection Pei Luo, Chao Luo, Yunsi Fei
2016/967 (PDF ) Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack Pei Luo, Yunsi Fei
2016/966 (PDF ) High-speed VLSI implementation of Digit-serial Gaussian normal basis Multiplication over GF(2m) Bahram Rashidi, Sayed Masoud Sayedi, Reza Rezaeian Farashahi
2016/965 (PDF ) A Cryptographic Proof of Regularity Lemmas: Simpler Unified Proofs and Refined Bounds Maciej Skorski
2016/964 (PDF ) Practical low data-complexity subspace-trail cryptanalysis of round-reduced PRINCE Lorenzo Grassi, Christian Rechberger
2016/963 (PDF ) Efficient compression of SIDH public keys Craig Costello, David Jao, Patrick Longa, Michael Naehrig, Joost Renes, David Urbanik
2016/962 (PDF ) On Removing Graded Encodings from Functional Encryption Nir Bitansky, Huijia Lin, Omer Paneth
2016/961 (PDF ) A kilobit hidden SNFS discrete logarithm computation Joshua Fried, Pierrick Gaudry, Nadia Heninger, Emmanuel Thomé
2016/960 (PDF ) Quantum-Secure Symmetric-Key Cryptography Based on Hidden Shifts Gorjan Alagic, Alexander Russell
2016/959 (PDF ) Impossibility of Simulation Secure Functional Encryption Even with Random Oracles Shashank Agrawal, Venkata Koppula, Brent Waters
2016/958 (PDF ) SafeDeflate: compression without leaking secrets Michał Zieliński
2016/957 (PDF ) Computing generator in cyclotomic integer rings Thomas Espitau, Pierre-Alain Fouque, Alexandre Gélin, Paul Kirchner
2016/956 (PDF ) Two Simple Composition Theorems with H-coefficients Jacques Patarin
2016/955 (PDF ) Constant-deposit multiparty lotteries on Bitcoin Massimo Bartoletti, Roberto Zunino
2016/954 (PDF ) Improving the lower bound on the maximum nonlinearity of 1-resilient Boolean functions and designing functions satisfying all cryptographic criteria WeiGuo Zhang, Enes Pasalic
2016/953 (PDF ) Collusion-Resistant Broadcast Encryption with Tight Reductions and Beyond Linfeng Zhou
2016/952 (PDF ) ISAP -- Towards Side-Channel Secure Authenticated Encryption Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel, Thomas Unterluggauer
2016/951 (PDF ) Revisiting Covert Multiparty Computation Geoffroy Couteau
2016/950 (PDF ) Orthogonalized Lattice Enumeration for Solving SVP Zhongxiang Zheng, Xiaoyun Wang, Guangwu Xu, Yang Yu
2016/949 (PDF ) Functional Encryption for Computational Hiding in Prime Order Groups via Pair Encodings Jongkil Kim, Willy Susilo, Fuchun Guo, Man Ho Au
2016/948 (PDF ) Secure Computation in Online Social Networks Foteini Baldimtsi, Dimitrios Papadopoulos, Stavros Papadopoulos, Alessandra Scafuro, Nikos Triandopoulos
2016/947 (PDF ) Isogeny graphs of ordinary abelian varieties Ernest Hunter Brooks, Dimitar Jetchev, Benjamin Wesolowski
2016/946 (PDF ) Bitsliced Masking and ARM: Friends or Foes? Wouter de Groot, Kostas Papagiannopoulos, Antonio de La Piedra, Erik Schneider, Lejla Batina
2016/945 (PDF ) High throughput in slices: the case of PRESENT, PRINCE and KATAN64 ciphers Kostas Papapagiannopoulos
2016/944 (PDF ) High-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest Majority Jun Furukawa, Yehuda Lindell, Ariel Nof, Or Weinstein
2016/943 (PDF ) Stadium: A Distributed Metadata-Private Messaging System Nirvan Tyagi, Yossi Gilad, Derek Leung, Matei Zaharia, Nickolai Zeldovich
2016/942 (PDF ) Optimizing Secure Computation Programs with Private Conditionals Peeter Laud, Alisa Pankova
2016/941 (PDF ) A New Class of Differentially 4-uniform Permutations from the Inverse Function Jian Bai, Dingkang Wang
2016/940 (PDF ) Fast Actively Secure OT Extension for Short Secrets Arpita Patra, Pratik Sarkar, Ajith Suresh
2016/939 (PDF ) Key Reconciliation Protocols for Error Correction of Silicon PUF Responses Brice Colombier, Lilian Bossuet, David Hély, Viktor Fischer
2016/938 (PDF ) Kummer for Genus One over Prime Order Fields Sabyasachi Karati, Palash Sarkar
2016/937 (PDF ) A Comparative S-Index in Factoring RSA Modulus via Lucas Sequences Nur Azman Abu, Shekh Faisal Abdul-Latip, Muhammad Rezal Kamel Ariffin
2016/936 (PDF ) Linear Complexity of Designs based on Coordinate Sequences of LRS and on Digital Sequences of Matrix/Skew LRS Coordinate Sequences over Galois Ring Vadim N. Tsypyschev
2016/935 (PDF ) Concealing Secrets in Embedded Processors Designs Hannes Gross, Manuel Jelinek, Stefan Mangard, Thomas Unterluggauer, Mario Werner
2016/934 (PDF ) Cryptography with Updates Prabhanjan Ananth, Aloni Cohen, Abhishek Jain
2016/933 (PDF ) Actively Secure 1-out-of-N OT Extension with Application to Private Set Intersection Michele Orrù, Emmanuela Orsini, Peter Scholl
2016/932 (PDF ) Mistakes Are Proof That You Are Trying: On Verifying Software Encoding Schemes' Resistance to Fault Injection Attacks Jakub Breier, Dirmanto Jap, Shivam Bhasin
2016/931 (PDF ) Feeding Two Cats with One Bowl: On Designing a Fault and Side-Channel Resistant Software Encoding Scheme (Extended Version) Jakub Breier, Xiaolu Hou
2016/930 (PDF ) Scalable Private Set Intersection Based on OT Extension Benny Pinkas, Thomas Schneider, Michael Zohner
2016/929 (PDF ) A Generalized Ideal Secret Sharing Scheme Tanujay Sha
2016/928 (PDF ) The complexity of the connected graph access structure on seven participants Massoud Hadian Dehkordi, Ali Safi
2016/927 (PDF ) Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni
2016/926 (PDF ) LIZARD - A Lightweight Stream Cipher for Power-constrained Devices Matthias Hamann, Matthias Krause, Willi Meier
2016/925 (PDF ) Secure Channel Injection and Anonymous Proofs of Account Ownership Liang Wang, Rafael Pass, abhi shelat, Thomas Ristenpart
2016/924 (PDF ) Bit Coincidence Mining Algorithm II Koh-ichi Nagao
2016/923 (PDF ) Attacking embedded ECC implementations through cmov side channels Erick Nascimento, Lukasz Chmielewski, David Oswald, Peter Schwabe
2016/921 (PDF ) Breaking Cryptographic Implementations Using Deep Learning Techniques Houssem Maghrebi, Thibault Portigliatti, Emmanuel Prouff
2016/920 (PDF ) Breaking Web Applications Built On Top of Encrypted Data Paul Grubbs, Richard McPherson, Muhammad Naveed, Thomas Ristenpart, Vitaly Shmatikov
2016/919 (PDF ) Snow White: Robustly Reconfigurable Consensus and Applications to Provably Secure Proof of Stake Phil Daian, Rafael Pass, Elaine Shi
2016/918 (PDF ) The Sleepy Model of Consensus Rafael Pass, Elaine Shi
2016/917 (PDF ) Hybrid Consensus: Efficient Consensus in the Permissionless Model Rafael Pass, Elaine Shi
2016/916 (PDF ) FruitChains: A Fair Blockchain Rafael Pass, Elaine Shi
2016/915 (PDF ) Transparency Overlays and Applications Melissa Chase, Sarah Meiklejohn
2016/914 (PDF ) Computing discrete logarithms in cryptographically-interesting characteristic-three finite fields Gora Adj, Isaac Canales-Martínez, Nareli Cruz-Cortés, Alfred Menezes, Thomaz Oliveira, Luis Rivera-Zamarripa, Francisco Rodríguez-Henríquez
2016/913 (PDF ) Small Field Attack, and Revisiting RLWE-Based Authenticated Key Exchange from Eurocrypt'15 Boru Gong, Yunlei Zhao
2016/912 (PDF ) Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model Gilles Barthe, François Dupressoir, Sebastian Faust, Benjamin Grégoire, François-Xavier Standaert, Pierre-Yves Strub
2016/911 (PDF ) The Shortest Signatures Ever Mohamed Saied Emam Mohamed, Albrecht Petzoldt
2016/910 (PDF ) The closest vector problem in tensored root lattices of type A and in their duals Léo Ducas, Wessel P. J. van Woerden
2016/909 (PDF ) Multi-core FPGA Implementation of ECC with Homogeneous Co-Z Coordinate Representation Bo-Yuan Peng, Yuan-Che Hsu, Yu-Jia Chen, Di-Chia Chueh, Chen-Mou Cheng, Bo-Yin Yang
2016/908 (PDF ) Secure Error-Tolerant Graph Matching Protocols Kalikinkar Mandal, Basel Alomair, Radha Poovendran
2016/907 (PDF ) Cut-and-Choose for Garbled RAM Peihan Miao
2016/906 (PDF ) On Basing Search SIVP on NP-Hardness Tianren Liu
2016/905 (PDF ) Generalized Desynchronization Attack on UMAP: Application to RCIA, KMAP, SLAP and SASI$^+$ protocols Masoumeh Safkhani, Nasour Bagheri
2016/904 (PDF ) Succinct Predicate and Online-Offline Multi-Input Inner Product Encryptions under Standard Static Assumptions Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
2016/903 (PDF ) From Indifferentiability to Constructive Cryptography (and Back) Ueli Maurer, Renato Renner
2016/902 (PDF ) Universally Composable Cryptographic Role-Based Access Control Bin Liu, Bogdan Warinschi
2016/901 (PDF ) Distance Bounding based on PUF Mathilde Igier, Serge Vaudenay
2016/900 (PDF ) Quantifying Web Adblocker Privacy Arthur Gervais, Alexandros Filios, Vincent Lenders, Srdjan Capkun
2016/899 (PDF ) Parallelized Side-Channel Attack Resisted Scalar Multiplication Using q-Based Addition-Subtraction k-chains Kittiphop Phalakarn, Kittiphon Phalakarn, Vorapong Suppakitpaisarn
2016/898 (PDF ) Physical Unclonable Functions based on Temperature Compensated Ring Oscillators Sha Tao, Elena Dubrova
2016/897 (PDF ) An efficient somewhat homomorphic encryption scheme based on factorization Gérald Gavin
2016/896 (PDF ) Security Analysis of Anti-SAT Muhammad Yasin, Bodhisatwa Mazumdar, Ozgur Sinanoglu, Jeyavijayan Rajendran
2016/895 (PDF ) Leakage-Abuse Attacks against Order-Revealing Encryption Paul Grubbs, Kevin Sekniqi, Vincent Bindschaedler, Muhammad Naveed, Thomas Ristenpart
2016/894 (PDF ) Indifferentiability of 3-Round Even-Mansour with Random Oracle Key Derivation Chun Guo, Dongdai Lin
2016/893 (PDF ) Building web applications on top of encrypted data using Mylar Raluca Ada Popa, Emily Stark, Jonas Helfer, Steven Valdez, Nickolai Zeldovich, M. Frans Kaashoek, Hari Balakrishnan
2016/892 (PDF ) Privacy-Preserving Distributed Linear Regression on High-Dimensional Data Adrià Gascón, Phillipp Schoppmann, Borja Balle, Mariana Raykova, Jack Doerner, Samee Zahur, David Evans
2016/891 (PDF ) Tightly Secure IBE under Constant-size Master Public Key Jie Chen, Junqing Gong, Jian Weng
2016/890 (PDF ) A Parallel Variant of LDSieve for the SVP on Lattices Artur Mariano, Thijs Laarhoven, Christian Bischof
2016/889 (PDF ) Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol Aggelos Kiayias, Alexander Russell, Bernardo David, Roman Oliynykov
2016/888 (PDF ) Finding closest lattice vectors using approximate Voronoi cells Emmanouil Doulgerakis, Thijs Laarhoven, Benne de Weger
2016/887 (PDF ) A generalisation of Dillon's APN permutation with the best known differential and nonlinear properties for all fields of size $2^{4k+2}$ Anne Canteaut, Sébastien Duval, Léo Perrin
2016/886 (PDF ) A Robust and Sponge-Like PRNG with Improved Efficiency Daniel Hutchinson
2016/885 (PDF ) Short Stickelberger Class Relations and application to Ideal-SVP Ronald Cramer, Léo Ducas, Benjamin Wesolowski
2016/884 (PDF ) Robust, low-cost, auditable random number generation for embedded system security Ben Lampert, Riad S. Wahby, Shane Leonard, Philip Levis
2016/883 (PDF ) DEMO: Integrating MPC in Big Data Workflows Nikolaj Volgushev, Malte Schwarzkopf, Andrei Lapets, Mayank Varia, Azer Bestavros
2016/882 (PDF ) MSKT-ORAM: A Constant Bandwidth ORAM without Homomorphic Encryption Jinsheng Zhang, Qiumao Ma, Wensheng Zhang, Daji Qiao
2016/881 (PDF ) Near Collisions in the RC4 Stream Cipher Anindya Shankar Bhandari
2016/880 (PDF ) Naor-Yung Paradigm with Shared Randomness and Applications Silvio Biagioni, Daniel Masny, Daniele Venturi
2016/879 (PDF ) Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption Benoît Libert, San Ling, Fabrice Mouhartem, Khoa Nguyen, Huaxiong Wang
2016/878 (PDF ) Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak Jian Guo, Meicheng Liu, Ling Song
2016/877 (PDF ) How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones Yuyu Wang, Zongyang Zhang, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
2016/876 (PDF ) How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers Lei Wang, Jian Guo, Guoyan Zhang, Jingyuan Zhao, Dawu Gu
2016/875 (PDF ) Depth-Robust Graphs and Their Cumulative Memory Complexity Joël Alwen, Jeremiah Blocki, Krzysztof Pietrzak
2016/873 (PDF ) Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo, Mingwu Zhang
2016/872 (PDF ) Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction Fuchun Guo, Willy Susilo, Yi Mu, Rongmao Chen, Jianchang Lai, Guomin Yang
2016/871 (PDF ) Blockchain-Free Cryptocurrencies: A Framework for Truly Decentralised Fast Transactions Xavier Boyen, Christopher Carr, Thomas Haines
2016/870 (PDF ) Faster Fully Homomorphic Encryption: Bootstrapping in less than 0.1 Seconds Ilaria Chillotti, Nicolas Gama, Mariya Georgieva, Malika Izabachène
2016/869 (PDF ) Cryptographic applications of capacity theory: On the optimality of Coppersmith's method for univariate polynomials Ted Chinburg, Brett Hemenway, Nadia Heninger, Zachary Scherr
2016/868 (PDF ) Selective-Opening Security in the Presence of Randomness Failures Viet Tung Hoang, Jonathan Katz, Adam O’Neill, Mohammad Zaheri
2016/867 (PDF ) A survey on physiological-signal-based security for medical devices Eduard Marin, Enrique Argones Rúa, Dave Singelée, Bart Preneel
2016/866 (PDF ) A Shuffle Argument Secure in the Generic Model Prastudy Fauzi, Helger Lipmaa, Michał Zając
2016/865 (PDF ) Reverse Cycle Walking and Its Applications Sarah Miracle, Scott Yilek
2016/864 (PDF ) Salvaging Weak Security Bounds for Blockcipher-Based Constructions Thomas Shrimpton, R. Seth Terashima
2016/863 (PDF ) More Powerful and Reliable Second-level Statistical Randomness Tests for NIST SP 800-22 Shuangyi Zhu, Yuan Ma, Jingqiang Lin, Jia Zhuang, Jiwu Jing
2016/861 (PDF ) Secure Stable Matching at Scale Jack Doerner, David Evans, abhi shelat
2016/860 (PDF ) Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting Junqing Gong, Xiaolei Dong, Jie Chen, Zhenfu Cao
2016/859 (PDF ) On the Security of Supersingular Isogeny Cryptosystems Steven D. Galbraith, Christophe Petit, Barak Shani, Yan Bo Ti
2016/858 (PDF ) A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors Qian Guo, Thomas Johansson, Paul Stankovski
2016/857 (PDF ) Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers Zejun Xiang, Wentao Zhang, Zhenzhen Bao, Dongdai Lin
2016/856 (PDF ) Spritz---a spongy RC4-like stream cipher and hash function. Ronald L. Rivest, Jacob C. N. Schuldt
2016/855 (PDF ) Combinatorial Repairability for Threshold Schemes Douglas R. Stinson, Ruizhong Wei
2016/854 (PDF ) Algebraic Security Analysis of Key Generation with Physical Unclonable Functions Matthias Hiller, Michael Pehl, Gerhard Kramer, Georg Sigl
2016/853 (PDF ) Stronger Security Variants of GCM-SIV Tetsu Iwata, Kazuhiko Minematsu
2016/852 (PDF ) Faster LLL-type Reduction of Lattice Bases Arnold Neumaier, Damien Stehle
2016/851 (PDF ) A New Algorithm for the Unbalanced Meet-in-the-Middle Problem Ivica Nikolic, Yu Sasaki
2016/850 (PDF ) Lightweight Fault Attack Resistance in Software Using Intra-Instruction Redundancy Conor Patrick, Bilgiday Yuce, Nahid Farhady Ghalaty, Patrick Schaumont
2016/849 (PDF ) Asymptotically Tight Bounds for Composing ORAM with PIR Ittai Abraham, Christopher W. Fletcher, Kartik Nayak, Benny Pinkas, Ling Ren
2016/848 (PDF ) From Weakly Selective to Selective Security in Compact Functional Encryption, Revisited Linfeng Zhou
2016/847 (PDF ) On the smallest ratio problem of lattice bases Jianwei Li
2016/846 (PDF ) Survey of Approaches and Techniques for Security Verification of Computer Systems Ferhat Erata, Shuwen Deng, Faisal Zaghloul, Wenjie Xiong, Onur Demir, Jakub Szefer
2016/845 (PDF ) Selective Opening Security from Simulatable Data Encapsulation Felix Heuer, Bertram Poettering
2016/844 (PDF ) Secure and Efficient Construction of Broadcast Encryption with Dealership Kamalesh Acharya, Ratna Dutta
2016/843 (PDF ) Partitioning via Non-Linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps Shuichi Katsumata, Shota Yamada
2016/842 (PDF ) Improved, Black-Box, Non-Malleable Encryption from Semantic Security Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee
2016/841 (PDF ) A Methodology for the Characterisation of Leakages in Combinatorial Logic Guido Bertoni, Marco Martinoli
2016/840 (PDF ) Deja Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions Melissa Chase, Mary Maller, Sarah Meiklejohn
2016/839 (PDF ) On the Division Property of SIMON48 and SIMON64 Zejun Xiang, Wentao Zhang, Dongdai Lin
2016/838 (PDF ) Passive Secret Disclosure Attack on an Ultralightweight Authentication Protocol for Internet of Things Masoumeh Safkhani, Nasour Bagheri
2016/837 (PDF ) Fully Homomorphic Encryption over the Integers Revisited Jung Hee Cheon, Damien Stehle
2016/836 (PDF ) The Discrete Logarithm Problem over Prime Fields can be transformed to a Linear Multivariable Chinese Remainder Theorem H. Gopalakrishna Gadiyar, R. Padma
2016/835 (PDF ) Lightweight Diffusion Layer: Importance of Toeplitz Matrices Sumanta Sarkar, Habeeb Syed
2016/834 (PDF ) Multi-Key Homomorphic Signatures Unforgeable under Insider Corruption Russell W. F. Lai, Raymond K. H. Tai, Harry W. H. Wong, Sherman S. M. Chow
2016/833 (PDF ) Multi-Cast Key Distribution: Scalable, Dynamic and Provably Secure Construction Kazuki Yoneyama, Reo Yoshida, Yuto Kawahara, Tetsutaro Kobayashi, Hitoshi Fuji, Tomohide Yamamoto
2016/832 (PDF ) Is AEZ v4.1 Sufficiently Resilient Against Key-Recovery Attacks? Colin Chaigneau, Henri Gilbert
2016/831 (PDF ) Reducing the Number of Non-linear Multiplications in Masking Schemes Jürgen Pulkus, Srinivas Vivek
2016/830 (PDF ) IO-DSSE: Scaling Dynamic Searchable Encryption to Millions of Indexes By Improving Locality Ian Miers, Payman Mohassel
2016/829 (PDF ) Efficient KDM-CCA Secure Public-Key Encryption for Polynomial Functions Shuai Han, Shengli Liu, Lin Lyu
2016/828 (PDF ) Faster Key Recovery Attack on Round-Reduced PRINCE Shahram Rasoolzadeh, Håvard Raddum
2016/827 (PDF ) Security Analysis of BLAKE2's Modes of Operation Atul Luykx, Bart Mennink, Samuel Neves
2016/826 (PDF ) Rotational Cryptanalysis in the Presence of Constants Tomer Ashur, Yunwen Liu
2016/825 (PDF ) Revisiting Cascade Ciphers in Indifferentiability Setting Chun Guo, Dongdai Lin, Meicheng Liu
2016/824 (PDF ) P2P Mixing and Unlinkable Bitcoin Transactions Tim Ruffing, Pedro Moreno-Sanchez, Aniket Kate
2016/823 (PDF ) Post-Quantum Attribute-Based Signatures from Lattice Assumptions Rachid El Bansarkhani, Ali El Kaafarani
2016/822 (PDF ) A Secure and Efficient Authentication Technique for Vehicular Ad-Hoc Networks Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Willy Susilo, Akbar Majidi
2016/821 (PDF ) Multivariate Cryptography with Mappings of Discrete Logarithms and Polynomials Duggirala Meher Krishna, Duggirala Ravi
2016/820 (PDF ) Separating Computational and Statistical Differential Privacy in the Client-Server Model Mark Bun, Yi-Hsiu Chen, Salil Vadhan
2016/819 (PDF ) Virtual Grey-Boxes Beyond Obfuscation: A Statistical Security Notion for Cryptographic Agents Shashank Agrawal, Manoj Prabhakaran, Ching-Hua Yu
2016/818 (PDF ) Composable Adaptive Secure Protocols without Setup under Polytime Assumptions Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
2016/817 (PDF ) Secure Obfuscation in a Weak Multilinear Map Model Sanjam Garg, Eric Miles, Pratyay Mukherjee, Amit Sahai, Akshayaram Srinivasan, Mark Zhandry
2016/816 (PDF ) Concentrated Differential Privacy: Simplifications, Extensions, and Lower Bounds Mark Bun, Thomas Steinke
2016/815 (PDF ) Secure Multiparty RAM Computation in Constant Rounds Sanjam Garg, Divya Gupta, Peihan Miao, Omkant Pandey
2016/814 (PDF ) Adaptive Security of Yao's Garbled Circuits Zahra Jafargholi, Daniel Wichs
2016/813 (PDF ) Fast Pseudorandom Functions Based on Expander Graphs Benny Applebaum, Pavel Raykov
2016/812 (PDF ) Towards Non-Black-Box Separations of Public Key Encryption and One Way Function Dana Dachman-Soled
2016/811 (PDF ) MILP-Aided Bit-Based Division Property for Primitives with Non-Bit-Permutation Linear Layers Ling Sun, Wei Wang, Meiqin Wang
2016/810 (PDF ) Fault Injection using Crowbars on Embedded Systems Colin O'Flynn
2016/809 (PDF ) Binary AMD Circuits from Secure Multiparty Computation Daniel Genkin, Yuval Ishai, Mor Weiss
2016/808 (PDF ) Simulating Auxiliary Inputs, Revisited Maciej Skorski
2016/807 (PDF ) Multilateral White-Box Cryptanalysis: Case study on WB-AES of CHES Challenge 2016 Hyunjin Ahn, Dong-Guk Han
2016/806 (PDF ) Healing the Hill Cipher, Improved Approach to Secure Modified Hill against Zero-plaintext Attack Mohammad Hadi Valizadeh
2016/805 (PDF ) Constant-Round Maliciously Secure Two-Party Computation in the RAM Model Carmit Hazay, Avishay Yanai
2016/804 (PDF ) Multi-Key Homomorphic Authenticators Dario Fiore, Aikaterini Mitrokotsa, Luca Nizzardo, Elena Pagnin
2016/803 (PDF ) Biometric Based Network Security Using MIPS Cryptography Processor Kirat Pal Singh
2016/801 (PDF ) Blind Web Search: How far are we from a privacy preserving search engine? Gizem S. Çetin, Wei Dai, Yarkın Doröz, William J. Martin, Berk Sunar
2016/800 (PDF ) Almost-Optimally Fair Multiparty Coin-Tossing with Nearly Three-Quarters Malicious Bar Alon, Eran Omri
2016/799 (PDF ) Efficient Batched Oblivious PRF with Applications to Private Set Intersection Vladimir Kolesnikov, Ranjit Kumaresan, Mike Rosulek, Ni Trieu
2016/798 (PDF ) On the Practical (In-)Security of 64-bit Block Ciphers: Collision Attacks on HTTP over TLS and OpenVPN Karthikeyan Bhargavan, Gaëtan Leurent
2016/797 (PDF ) An MPC-based Privacy-Preserving Protocol for a Local Electricity Trading Market Aysajan Abidin, Abdelrahaman Aly, Sara Cleemput, Mustafa A. Mustafa
2016/796 (PDF ) Digital Signatures Based on the Hardness of Ideal Lattice Problems in all Rings Vadim Lyubashevsky
2016/795 (PDF ) Indistinguishability Obfuscation from DDH-like Assumptions on Constant-Degree Graded Encodings Huijia Lin, Vinod Vaikuntanathan
2016/794 (PDF ) Message-recovery attacks on Feistel-based Format Preserving Encryption Mihir Bellare, Viet Tung Hoang, Stefano Tessaro
2016/793 (PDF ) Side-Channel Analysis of Keymill Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Florian Mendel
2016/792 (PDF ) Key-Homomorphic Signatures: Definitions and Applications to Multiparty Signatures and Non-Interactive Zero-Knowledge David Derler, Daniel Slamanig
2016/791 (PDF ) Leakage Resilient One-Way Functions: The Auxiliary-Input Setting Ilan Komargodski
2016/790 (PDF ) Conditional Cube Attack on Reduced-Round Keccak Sponge Function Senyang Huang, Xiaoyun Wang, Guangwu Xu, Meiqin Wang, Jingyuan Zhao
2016/789 (PDF ) An Efficient Hardware design and Implementation of Advanced Encryption Standard (AES) Algorithm Kirat Pal Singh, Shiwani Dod
2016/788 (PDF ) On the security of Cubic UOV and its variants Yasufumi Hashimoto
2016/787 (PDF ) On the security of new vinegar-like variant of multivariate signature scheme Yasufumi Hashimoto
2016/786 (PDF ) What Else is Revealed by Order-Revealing Encryption? F. Betül Durak, Thomas M. DuBuisson, David Cash
2016/785 (PDF ) Optimization of Bootstrapping in Circuits Fabrice Benhamouda, Tancrède Lepoint, Claire Mathieu, Hang Zhou
2016/784 (PDF ) Verifiable and Delegatable Constrained Pseudorandom Functions for Unconstrained Inputs Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
2016/783 (PDF ) On the Memory-Hardness of Data-Independent Password-Hashing Functions Joël Alwen, Peter Gaži, Chethan Kamath, Karen Klein, Georg Osang, Krzysztof Pietrzak, Leonid Reyzin, Michal Rolínek, Michal Rybár
2016/782 (PDF ) Challenges for Ring-LWE Eric Crockett, Chris Peikert
2016/781 (PDF ) Privately Matching $k$-mers Justin Bed{ő}, Thomas Conway, Kim Ramchen, Vanessa Teague
2016/780 (PDF ) Efficient and Provable Secure Anonymous Hierarchical Identity-based Broadcast Encryption (HIBBE) Scheme without Random Oracle Mohammmad Hassan Ameri, Javad Mohajeri, Mahmoud Salmasizadeh
2016/779 (PDF ) Code-based Strong Designated Verifier Signatures: Security Analysis and a New Construction Maryam Rajabzadeh Asaar
2016/778 (PDF ) Algorithmic Mechanism Construction bridging Secure Multiparty Computation and Intelligent Reasoning Sumit Chakraborty
2016/777 (PDF ) Fast, uniform scalar multiplication for genus 2 Jacobians with fast Kummers Ping Ngai Chung, Craig Costello, Benjamin Smith
2016/776 (PDF ) Homomorphic Tallying for the Estonian Internet Voting System Arnis Parsovs
2016/775 (PDF ) Cryptanalysis of a Homomorphic Encryption Scheme Sonia Bogos, John Gaspoz, Serge Vaudenay
2016/774 (PDF ) TV-PUF : A Fast Lightweight Aging-Resistant Threshold Voltage PUF Tanujay Saha, Vikash Sehwag
2016/773 (PDF ) Alternative Implementations of Secure Real Numbers Vassil Dimitrov, Liisi Kerik, Toomas Krips, Jaak Randmets, Jan Willemson
2016/772 (PDF ) Time-Frequency Analysis for Second-Order Attacks Pierre BELGARRIC, Shivam BHASIN, Nicolas BRUNEAU, Jean-Luc DANGER, Nicolas DEBANDE, Sylvain GUILLEY, Annelie HEUSER, Zakaria NAJM, Olivier RIOUL
2016/771 (PDF ) How not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios David Bernhard, Olivier Pereira, Bogdan Warinschi
2016/770 (PDF ) KangarooTwelve: fast hashing based on Keccak-p Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche, Ronny Van Keer, Benoît Viguier
2016/769 (PDF ) Low-temperature data remanence attacks against intrinsic SRAM PUFs Nikolaos Athanasios Anagnostopoulos, Stefan Katzenbeisser, Markus Rosenstihl, André Schaller, Sebastian Gabmeyer, Tolga Arul
2016/768 (PDF ) High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority Toshinori Araki, Jun Furukawa, Yehuda Lindell, Ariel Nof, Kazuma Ohara
2016/767 (PDF ) A conjecture about Gauss sums and bentness of binomial Boolean functions Jean-Pierre Flori
2016/766 (PDF ) Functional Commitment Schemes: From Polynomial Commitments to Pairing-Based Accumulators from Simple Assumptions Benoît Libert, Somindu C. Ramanna, Moti Yung
2016/765 (PDF ) Cryptographic Voting — A Gentle Introduction David Bernhard, Bogdan Warinschi
2016/764 (PDF ) ANOTEL: Cellular Networks with Location Privacy (Extended Version) Tim Dittler, Florian Tschorsch, Stefan Dietzel, Björn Scheuermann
2016/763 (PDF ) Human Public-Key Encryption Houda Ferradi, Rémi Géraud, David Naccache
2016/762 (PDF ) Faster Secure Two-Party Computation in the Single-Execution Setting Xiao Wang, Alex J. Malozemoff, Jonathan Katz
2016/761 (PDF ) Two-party authenticated key exchange protocol using lattice-based cryptography Xiaopeng Yang, Wenping Ma
2016/760 (PDF ) Simultaneous Secrecy and Reliability Amplification for a General Channel Model Russell Impagliazzo, Ragesh Jaiswal, Valentine Kabanets, Bruce M. Kapron, Valerie King, Stefano Tessaro
2016/759 (PDF ) Towards Practical Attacks on Argon2i and Balloon Hashing Joël Alwen, Jeremiah Blocki
2016/758 (PDF ) NewHope on ARM Cortex-M Erdem Alkim, Philipp Jakubeit, Peter Schwabe
2016/757 (PDF ) Redactable Blockchain -- or -- Rewriting History in Bitcoin and Friends Giuseppe Ateniese, Bernardo Magri, Daniele Venturi, Ewerton Andrade
2016/756 (PDF ) Adapting Helios for provable ballot privacy David Bernhard, Véronique Cortier, Olivier Pereira, Ben Smyth, Bogdan Warinschi
2016/755 (PDF ) Auditable Data Structures Michael T. Goodrich, Evgenios M. Kornaropoulos, Michael Mitzenmacher, Roberto Tamassia
2016/754 (PDF ) Practical Key Recovery Attack on MANTIS-5 Christoph Dobraunig, Maria Eichlseder, Daniel Kales, Florian Mendel
2016/753 (PDF ) Improved Reduction from the Bounded Distance Decoding Problem to the Unique Shortest Vector Problem in Lattices Shi Bai, Damien Stehle, Weiqiang Wen
2016/752 (PDF ) ELiF : An Extremely Lightweight & Flexible Block Cipher Family and Its Experimental Security Adnan Baysal, Ünal Kocabaş
2016/751 (PDF ) Feistel Like Construction of Involutory Binary Matrices With High Branch Number Adnan Baysal, Mustafa Çoban, Mehmet Özen
2016/750 (PDF ) Public-Key Based Lightweight Swarm Authentication Simon Cogliani, Bao Feng, Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, Rodrigo Portella do Canto, Guilin Wang
2016/749 (PDF ) Revocable Hierarchical Identity-Based Encryption with Adaptive Security Kwangsu Lee
2016/748 (PDF ) A Generic Dynamic Provable Data Possession Framework Mohammad Etemad, Alptekin Küpçü
2016/747 (PDF ) Beyond Bitcoin -- Part II: Blockchain-based systems without mining Pasquale Forte, Diego Romano, Giovanni Schmid
2016/746 (PDF ) Improved Private Set Intersection against Malicious Adversaries Peter Rindal, Mike Rosulek
2016/745 (PDF ) Novel differentially private mechanisms for graphs Solenn Brunet, Sébastien Canard, Sébastien Gambs, Baptiste Olivier
2016/744 (PDF ) A New Method to Investigate the CCZ-Equivalence between Functions with Low Differential Uniformity Xi Chen, Longjiang Qu, Chao Li, Jiao Du
2016/743 (PDF ) Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN Md Iftekhar Salam, Harry Bartlett, Ed Dawson, Josef Pieprzyk, Leonie Simpson, Kenneth Koon-Ho Wong
2016/742 (PDF ) LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality (Full Paper) Johannes Braun, Johannes Buchmann, Denise Demirel, Mikio Fujiwara, Matthias Geihs, Shiho Moriai, Masahide Sasaki, Atsushi Waseda
2016/741 (PDF ) MARKOV MODELING OF MOVING TARGET DEFENSE GAMES Hoda Maleki, Saeed Valizadeh, William Koch, Azer Bestavros, Marten van Dijk
2016/740 (PDF ) Software Benchmarking of the 2$^{\text{nd}}$ round CAESAR Candidates Ralph Ankele, Robin Ankele
2016/739 (PDF ) Unconditionally Secure Signatures Ryan Amiri, Aysajan Abidin, Petros Wallden, Erika Andersson
2016/738 (PDF ) FHPKE with Zero Norm Noises based on DLA&CDH Masahiro Yagisawa
2016/736 (PDF ) Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models based on Pre-Computation Martine De Cock, Rafael Dowsley, Caleb Horst, Raj Katti, Anderson C. A. Nascimento, Stacey C. Newman, Wing-Sea Poon
2016/735 (PDF ) Efficient Robust Secret Sharing from Expander Graphs Brett Hemenway, Rafail Ostrovsky
2016/734 (PDF ) Efficient Oblivious Transfer Protocols based on White-Box Cryptography Aram Jivanyan, Gurgen Khachatryan, Andriy Oliynyk, Mykola Raievskyi
2016/733 (PDF ) Revisiting the Hybrid Attack: Improved Analysis and Refined Security Estimates Thomas Wunderer
2016/732 (PDF ) Nonlinear Invariant Attack --Practical Attack on Full SCREAM, iSCREAM, and Midori64 Yosuke Todo, Gregor Leander, Yu Sasaki
2016/731 (PDF ) SRMAP and ISLAP Authentication Protocols: Attacks and Improvements Mohammad Mardani Shahrbabak, Shahab Abdolmaleky
2016/730 (PDF ) Leakage-Resilient Public-Key Encryption from Obfuscation Dana Dachman-Soled, S. Dov Gordon, Feng-Hao Liu, Adam O’Neill, Hong-Sheng Zhou
2016/729 (PDF ) Attacks on cMix - Some Small Overlooked Details Herman Galteland, Stig F. Mjølsnes, Ruxandra F. Olimid
2016/728 (PDF ) Sophos - Forward Secure Searchable Encryption Raphael Bost
2016/727 (PDF ) Improvements on the Individual Logarithm Step in Extended Tower Number Field Sieve Yuqing Zhu, Jincheng Zhuang, Chang Lv, Dongdai Lin
2016/726 (PDF ) Local Bounds for the Optimal Information Ratio of Secret Sharing Schemes Oriol Farràs, Jordi Ribes-González, Sara Ricci
2016/725 (PDF ) Tile-Based Modular Architecture for Accelerating Homomorphic Function Evaluation on FPGA Mustafa Khairallah, Maged Ghoneima
2016/724 (PDF ) SPORT: Sharing Proofs of Retrievability across Tenants Frederik Armknecht, Jens-Matthias Bohli, David Froelicher, Ghassan O. Karame
2016/723 (PDF ) Robust Multi-Property Combiners for Hash Functions Marc Fischlin, Anja Lehmann, Krzysztof Pietrzak
2016/722 (PDF ) Improved Meet-in-the-Middle Attacks on Reduced-Round Kalyna-128/256 and Kalyna-256/512 Li Lin, Wenling Wu
2016/721 (PDF ) Strong Hardness of Privacy from Weak Traitor Tracing Lucas Kowalczyk, Tal Malkin, Jonathan Ullman, Mark Zhandry
2016/720 (PDF ) A Black-Box Construction of Non-Malleable Encryption from Semantically Secure Encryption Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee
2016/719 (PDF ) Bridging the Gap: Advanced Tools for Side-Channel Leakage Estimation beyond Gaussian Templates and Histograms Tobias Schneider, Amir Moradi, François-Xavier Standaert, Tim Güneysu
2016/718 (PDF ) Leakage-Abuse Attacks Against Searchable Encryption David Cash, Paul Grubbs, Jason Perry, Thomas Ristenpart
2016/717 (PDF ) Comparison between Subfield and Straightforward Attacks on NTRU Paul Kirchner, Pierre-Alain Fouque
2016/716 (PDF ) 2-hop Blockchain: Combining Proof-of-Work and Proof-of-Stake Securely Tuyet Duong, Lei Fan, Hong-Sheng Zhou
2016/715 (PDF ) Uniform First-Order Threshold Implementations Tim Beyne, Begül Bilgin
2016/714 (PDF ) All the AES You Need on Cortex-M3 and M4 Peter Schwabe, Ko Stoffelen
2016/713 (PDF ) Tuple lattice sieving Shi Bai, Thijs Laarhoven, Damien Stehle
2016/712 (PDF ) A Survey of Hardware Implementations of Elliptic Curve Cryptographic Systems Basel Halak, Said Subhan Waizi, Asad Islam
2016/711 (PDF ) A Unilateral-to-Mutual Authentication Compiler for Key Exchange (with Applications to Client Authentication in TLS 1.3) Hugo Krawczyk
2016/710 (PDF ) Keymill: Side-Channel Resilient Key Generator Mostafa Taha, Arash Reyhani-Masoleh, Patrick Schaumont
2016/709 (PDF ) Differential Fault Analysis of SHA3-224 and SHA3-256 Pei Luo, Yunsi Fei, Liwei Zhang, A. Adam Ding
2016/708 (PDF ) From 5-pass MQ-based identification to MQ-based signatures Ming-Shing Chen, Andreas Hülsing, Joost Rijneveld, Simona Samardjiska, Peter Schwabe
2016/707 (PDF ) Towards a Characterization of the Related-Key Attack Security of the Iterated Even-Mansour Cipher Dana Dachman-Soled, Angela Park, Ben San Nicolas
2016/706 (PDF ) Memory Erasability Amplification Jan Camenisch, Robert R. Enderlein, Ueli Maurer
2016/704 (PDF ) High Saturation Complete Graph Approach for EC Point Decomposition and ECDL Problem Nicolas T. Courtois
2016/703 (PDF ) (In-)Secure messaging with the Silent Circle instant messaging protocol Sebastian R. Verschoor, Tanja Lange
2016/702 (PDF ) Mirror Theory and Cryptography Jacques Patarin
2016/701 (PDF ) Bolt: Anonymous Payment Channels for Decentralized Currencies Matthew Green, Ian Miers
2016/700 (PDF ) Side-Channel Protections for Cryptographic Instruction Set Extensions Sami Saab, Pankaj Rohatgi, Craig Hampel
2016/699 (PDF ) A Note on One Privacy-Preserving Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data Zhengjun Cao, Lihua Liu
2016/698 (PDF ) A Note on One Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud Zhengjun Cao, Lihua Liu
2016/697 (PDF ) Ciphertext Forgery on HANUMAN Damian Vizár
2016/696 (PDF ) Solving the Secure Storage Dilemma: An Efficient Scheme for Secure Deduplication with Privacy-Preserving Public Auditing Süleyman Kardaş, Mehmet Sabır Kiraz
2016/695 (PDF ) Gate-scrambling Revisited - or: The TinyTable protocol for 2-Party Secure Computation Ivan Damgård, Jesper Buus Nielsen, Michael Nielsen, Samuel Ranellucci
2016/694 (PDF ) Mastrovito Form of Non-recursive Karatsuba Multiplier for All Trinomials Yin Li, Xingpo Ma, Yu Zhang, Chuanda Qi
2016/693 (PDF ) Identity-Based Key Aggregate Cryptosystem from Multilinear Maps Sikhar Patranabis, Debdeep Mukhopadhyay
2016/692 (PDF ) Cryptanalysis and improvement of certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks Jiguo Li, Hong Yuan, Yichen Zhang
2016/691 (PDF ) Targeted Homomorphic Attribute Based Encryption Zvika Brakerski, David Cash, Rotem Tsabary, Hoeteck Wee
2016/690 (PDF ) When Are Three Voters Enough for Privacy Properties? Myrto Arapinis, Véronique Cortier, Steve Kremer
2016/689 (PDF ) New Automatic Search Tool for Impossible Differentials and Zero-Correlation Linear Approximations Tingting Cui, Shiyao Chen, Keting Jia, Kai Fu, Meiqin Wang
2016/688 (PDF ) Bounded KDM Security from iO and OWF Antonio Marcedone, Rafael Pass, abhi shelat
2016/687 (PDF ) Ciphers for MPC and FHE Martin Albrecht, Christian Rechberger, Thomas Schneider, Tyge Tiessen, Michael Zohner
2016/686 (PDF ) The Lightest 4x4 MDS Matrices over $GL(4,\mathbb{F}_2)$ Jian Bai, Ting Li, Yao Sun, Dingkang Wang, Dongdai Lin
2016/685 (PDF ) Overlaying Circuit Clauses for Secure Computation W. Sean Kennedy, Vladimir Kolesnikov, Gordon Wilfong
2016/684 (PDF ) Faster individual discrete logarithms in finite fields of composite extension degree Aurore Guillevic
2016/683 (PDF ) Efficient Sparse Merkle Trees: Caching Strategies and Secure (Non-)Membership Proofs Rasmus Dahlberg, Tobias Pulls, Roel Peeters
2016/682 (PDF ) Finding Significant Fourier Coefficients: Clarifications, Simplifications, Applications and Limitations Steven D. Galbraith, Joel Laity, Barak Shani
2016/681 (PDF ) Amortized Complexity of Zero-Knowledge Proofs Revisited: Achieving Linear Soundness Slack Ronald Cramer, Ivan Damgard, Chaoping Xing, Chen Yuan
2016/680 (PDF ) Fair Client Puzzles from the Bitcoin Blockchain Colin Boyd, Christopher Carr
2016/679 (PDF ) Hybrid WBC: Secure and Efficient White-Box Encryption Schemes Jihoon Cho, Kyu Young Choi, Orr Dunkelman, Nathan Keller, Dukjae Moon, Aviya Vaidberg
2016/678 (PDF ) Anonymous RAM Michael Backes, Amir Herzberg, Aniket Kate, Ivan Pryvalov
2016/677 (PDF ) Breaking Into the KeyStore: A Practical Forgery Attack Against Android KeyStore Mohamed Sabt, Jacques Traoré
2016/676 (PDF ) Cryptanalysis of Reduced-Round Midori64 Block Cipher Xiaoyang Dong, Yanzhao Shen
2016/675 (PDF ) Accelerating Homomorphic Computations on Rational Numbers Angela Jäschke, Frederik Armknecht
2016/674 (PDF ) A PUF-based Secure Communication Protocol for IoT URBI CHATTERJEE, RAJAT SUBHRA CHAKRABORTY, DEBDEEP MUKHOPADHYAY
2016/673 (PDF ) Dirichlet Product for Boolean Functions Abderrahmane Nitaj, Willy Susilo, Joseph Tonien
2016/671 (PDF ) Efficient probabilistic algorithm for estimating the algebraic properties of Boolean functions for large $n$ Yongzhuang Wei, Enes Pasalic, Fengrong Zhang, Samir Hod\v zić
2016/670 (PDF ) DRE-ip: A Verifiable E-Voting Scheme without Tallying Authorities Siamak F. Shahandashti, Feng Hao
2016/669 (PDF ) NEON-SIDH: Efficient Implementation of Supersingular Isogeny Diffie-Hellman Key-Exchange Protocol on ARM Brian Koziel, Amir Jalali, Reza Azarderakhsh, Mehran Mozaffari Kermani, David Jao
2016/667 (PDF ) Multivariate Profiling of Hulls for Linear Cryptanalysis Andrey Bogdanov, Elmar Tischhauser, Philip S. Vejre
2016/666 (PDF ) Construction of resilient S-boxes with higher-dimensional vectorial outputs and strictly almost optimal nonlinearity WeiGuo Zhang, LuYang Li, Enes Pasalic
2016/665 (PDF ) Breaking and Fixing Private Set Intersection Protocols Mikkel Lambæk
2016/664 (PDF ) Efficient Conversion Method from Arithmetic to Boolean Masking in Constrained Devices Yoo-Seung Won, Dong-Guk Han
2016/663 (PDF ) Anonymous Attestation Using the Strong Diffie Hellman Assumption Revisited Jan Camenisch, Manu Drijvers, Anja Lehmann
2016/662 (PDF ) Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions Georg Fuchsbauer, Christian Hanser, Chethan Kamath, Daniel Slamanig
2016/661 (PDF ) Reducing the Leakage in Practical Order-Revealing Encryption David Cash, Feng-Hao Liu, Adam O'Neill, Cong Zhang
2016/660 (PDF ) The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim
2016/659 (PDF ) Frodo: Take off the ring! Practical, Quantum-Secure Key Exchange from LWE Joppe Bos, Craig Costello, Léo Ducas, Ilya Mironov, Michael Naehrig, Valeria Nikolaenko, Ananth Raghunathan, Douglas Stebila
2016/658 (PDF ) Asymptotic Analysis of Plausible Tree Hash Modes for SHA-3 Kevin Atighehchi, Alexis Bonnecaze
2016/657 (PDF ) Bounded Size-Hiding Private Set Intersection Tatiana Bradley, Sky Faber, Gene Tsudik
2016/656 (PDF ) Improving Practical UC-Secure Commitments based on the DDH Assumption Eiichiro Fujisaki
2016/655 (PDF ) A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups Jongkil Kim, Willy Susilo, Fuchun Guo, Man Ho Au
2016/654 (PDF ) Stronger Security for Reusable Garbled Circuits, General Definitions and Attacks Shweta Agrawal
2016/653 (PDF ) Fully Homomorphic Encryption with Zero Norm Cipher Text Masahiro Yagisawa
2016/652 (PDF ) Automatic Search for a Maximum Probability Differential Characteristic in a Substitution-Permutation Network Arnaud BANNIER, Nicolas BODIN, Eric FILIOL
2016/651 (PDF ) Pen and Paper Arguments for SIMON and SIMON-like Designs Christof Beierle
2016/650 (PDF ) Securing Multiparty Protocols against the Exposure of Data to Honest Parties Peeter Laud, Alisa Pankova
2016/649 (PDF ) Game-Based Privacy Analysis of RFID Security Schemes for Confident Authentication in IoT Behzad Abdolmaleki, Karim Baghery, Shahram Khazaei, Mohammad Reza Aref
2016/648 (PDF ) ParTI -- Towards Combined Hardware Countermeasures against Side-Channel and Fault-Injection Attacks Tobias Schneider, Amir Moradi, Tim Güneysu
2016/647 (PDF ) Strong 8-bit Sboxes with Efficient Masking in Hardware Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider
2016/646 (PDF ) Computational integrity with a public random string from quasi-linear PCPs Eli Ben-Sasson, Iddo Ben-Tov, Alessandro Chiesa, Ariel Gabizon, Daniel Genkin, Matan Hamilis, Evgenya Pergament, Michael Riabzev, Mark Silberstein, Eran Tromer, Madars Virza
2016/645 (PDF ) FourQNEON: Faster Elliptic Curve Scalar Multiplications on ARM Processors Patrick Longa
2016/644 (PDF ) How to Backdoor Diffie-Hellman David Wong
2016/643 (PDF ) On the Computational Overhead of MPC with Dishonest Majority Jesper Buus Nielsen, Samuel Ranellucci
2016/642 (PDF ) Efficient and Provable White-Box Primitives Pierre-Alain Fouque, Pierre Karpman, Paul Kirchner, Brice Minaud
2016/641 (PDF ) Bitstream Fault Injections (BiFI) – Automated Fault Attacks against SRAM-based FPGAs Pawel Swierczynski, Georg T. Becker, Amir Moradi, Christof Paar
2016/640 (PDF ) Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm Asli Bay, Oguzhan Ersoy, Ferhat Karakoç
2016/639 (PDF ) Game-Theoretic Framework for Integrity Verification in Computation Outsourcing Qiang Tang, Balazs Pejo
2016/638 (PDF ) A Tweak for a PRF Mode of a Compression Function and Its Applications Shoichi Hirose, Atsushi Yabumoto
2016/637 (PDF ) On the Security and Key Generation of the ZHFE Encryption Scheme Wenbin Zhang, Chik How Tan
2016/636 (PDF ) Unconditional UC-Secure Computation with (Stronger-Malicious) PUFs Saikrishna Badrinarayanan, Dakshita Khurana, Rafail Ostrovsky, Ivan Visconti
2016/635 (PDF ) Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge Florian Tramer, Fan Zhang, Huang Lin, Jean-Pierre Hubaux, Ari Juels, Elaine Shi
2016/634 (PDF ) Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing Weiran Liu, Jianwei Liu, Qianhong Wu, Bo Qin, David Naccache, Houda Ferradi
2016/633 (PDF ) Making Smart Contracts Smarter Loi Luu, Duc-Hiep Chu, Hrishi Olickel, Prateek Saxena, Aquinas Hobor
2016/632 (PDF ) Faster Malicious 2-party Secure Computation with Online/Ofine Dual Execution Peter Rindal, Mike Rosulek
2016/631 (PDF ) Masking AES with d+1 Shares in Hardware Thomas De Cnudde, Oscar Reparaz, Begül Bilgin, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen
2016/630 (PDF ) Decomposed S-Boxes and DPA Attacks: A Quantitative Case Study using PRINCE Ravikumar Selvam, Dillibabu Shanmugam, Suganya Annadurai, Jothi Rangasamy
2016/629 (PDF ) Verifiable Functional Encryption Saikrishna Badrinarayanan, Vipul Goyal, Aayush Jain, Amit Sahai
2016/628 (PDF ) On the properties of the CTR encryption mode of the Magma and Kuznyechik block ciphers with re-keying method based on CryptoPro Key Meshing Liliya R. Ahmetzyanova, Evgeny K. Alekseev, Igor B. Oshkin, Stanislav V. Smyshlyaev, Lolita A. Sonina
2016/627 (PDF ) Cyber Passport: Preventing Massive Identity Theft Gideon Samid
2016/626 (PDF ) CAESAR Hardware API Ekawat Homsirikamol, William Diehl, Ahmed Ferozpuri, Farnoud Farahmand, Panasayya Yalla, Jens-Peter Kaps, Kris Gaj
2016/625 (PDF ) On the Design Rationale of SIMON Block Cipher: Integral Attacks and Impossible Differential Attacks against SIMON Variants Kota Kondo, Yu Sasaki, Tetsu Iwata
2016/624 (PDF ) Equational Security Proofs of Oblivious Transfer Protocols Baiyu Li, Daniele Micciancio
2016/623 (PDF ) EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis with a Case-Study on PAEQ Dhiman Saha, Dipanwita Roy Chowdhury
2016/622 (PDF ) Function-Revealing Encryption Marc Joye, Alain Passelègue
2016/621 (PDF ) 4-Round Concurrent Non-Malleable Commitments from One-Way Functions Michele Ciampi, Rafail Ostrovsky, Luisa Siniscalchi, Ivan Visconti
2016/620 (PDF ) Secure Data Exchange: A Marketplace in the Cloud Ran Gilad-Bachrach, Kim Laine, Kristin Lauter, Peter Rindal, Mike Rosulek
2016/619 (PDF ) 5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs Kevin Lewi, Alex J. Malozemoff, Daniel Apon, Brent Carmer, Adam Foltzer, Daniel Wagner, David W. Archer, Dan Boneh, Jonathan Katz, Mariana Raykova
2016/618 (PDF ) Curious case of Rowhammer: Flipping Secret Exponent Bits using Timing Analysis Sarani Bhattacharya, Debdeep Mukhopadhyay
2016/617 (PDF ) On the Impossibility of Merkle Merge Homomorphism Yuzhe Tang
2016/616 (PDF ) Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Victor Lomné, Florian Mendel
2016/615 (PDF ) Reusing Tamper-Proof Hardware in UC-Secure Protocols Jeremias Mechler, Jörn Müller-Quade, Tobias Nilges
2016/614 (PDF ) Better Two-Round Adaptive Multi-Party Computation Ran Canetti, Oxana Poburinnaya, Muthuramakrishnan Venkitasubramaniam
2016/613 (PDF ) A Survey of Microarchitectural Timing Attacks and Countermeasures on Contemporary Hardware Qian Ge, Yuval Yarom, David Cock, Gernot Heiser
2016/612 (PDF ) Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds Kevin Lewi, David J. Wu
2016/611 (PDF ) Catching MPC Cheaters: Identification and Openability Robert Cunningham, Benjamin Fuller, Sophia Yakoubov
2016/610 (PDF ) The GGM Function Family is Weakly One-Way Aloni Cohen, Saleet Klein
2016/609 (PDF ) How low can you go? Using side-channel data to enhance brute-force key recovery Jake Longo, Daniel P. Martin, Luke Mather, Elisabeth Oswald, Benjamin Sach, Martijn Stam
2016/608 (PDF ) LightSource: Ultra Lightweight Clone Detection of RFID Tags from Software Unclonable Responses Hoda Maleki, Reza Rahaeimehr, Marten van Dijk
2016/607 (PDF ) Protocols for Authenticated Oblivious Transfer Mehrad Jaberi, Hamid Mala
2016/606 (PDF ) Strong Machine Learning Attack against PUFs with No Mathematical Model Fatemeh Ganji, Shahin Tajik, Fabian Fäßler, Jean-Pierre Seifert
2016/605 (PDF ) Improving NFS for the discrete logarithm problem in non-prime finite fields Razvan Barbulescu, Pierrick Gaudry, Aurore Guillevic, François Morain
2016/604 (PDF ) FMNV Continuous Non-malleable Encoding Scheme is More Efficient Than Believed Amir S. Mortazavia, Mahmoud Salmasizadeh, Amir Daneshgar
2016/603 (PDF ) Koblitz curves over quadratic fields Thomaz Oliveira, Julio López, Daniel Cervantes-Vázquez, Francisco Rodríguez-Henríquez
2016/602 (PDF ) More Efficient Oblivious Transfer Extensions Gilad Asharov, Yehuda Lindell, Thomas Schneider, Michael Zohner
2016/601 (PDF ) Physical Layer Group Key Agreement for Automotive Controller Area Networks Shalabh Jain, Jorge Guajardo
2016/600 (PDF ) A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks Samaneh Ghandali, Georg T. Becker, Daniel Holcomb, Christof Paar
2016/599 (PDF ) Obfuscation from Low Noise Multilinear Maps Nico Döttling, Sanjam Garg, Divya Gupta, Peihan Miao, Pratyay Mukherjee
2016/598 (PDF ) Polynomial Batch Codes for Efficient IT-PIR Ryan Henry
2016/597 (PDF ) Correlated Extra-Reductions Defeat Blinded Regular Exponentiation - Extended Version Margaux Dugardin, Sylvain Guilley, Jean-Luc Danger, Zakaria Najm, Olivier Rioul
2016/596 (PDF ) Cache Attacks Enable Bulk Key Recovery on the Cloud Mehmet S. Inci, Berk Gulmezoglu, Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar
2016/595 (PDF ) A High Throughput/Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths --- Toward Efficient CBC-Mode Implementation Rei Ueno, Sumio Morioka, Naofumi Homma, Takafumi Aoki
2016/594 (PDF ) "Make Sure DSA Signing Exponentiations Really are Constant-Time'' Cesar Pereida García, Billy Bob Brumley, Yuval Yarom
2016/593 (PDF ) No Place to Hide: Contactless Probing of Secret Data on FPGAs Heiko Lohrke, Shahin Tajik, Christian Boit, Jean-Pierre Seifert
2016/592 (PDF ) Subspace Trail Cryptanalysis and its Applications to AES Lorenzo Grassi, Christian Rechberger, Sondre Rønjom
2016/591 (PDF ) Arx: An Encrypted Database using Semantically Secure Encryption Rishabh Poddar, Tobias Boelter, Raluca Ada Popa
2016/590 (PDF ) Mitigating SAT Attack on Logic Locking Yang Xie, Ankur Srivastava
2016/589 (PDF ) Dimension-Preserving Reductions from LWE to LWR Jacob Alperin-Sheriff, Daniel Apon
2016/588 (PDF ) Secure obfuscation in a weak multilinear map model: A simple construction secure against all known attacks Eric Miles, Amit Sahai, Mark Zhandry
2016/587 (PDF ) Bash-f: another LRX sponge function Sergey Agievich, Vadim Marchuk, Alexander Maslau, Vlad Semenov
2016/586 (PDF ) A Modular Treatment of Cryptographic APIs: The Symmetric-Key Case Thomas Shrimpton, Martijn Stam, Bogdan Warinschi
2016/585 (PDF ) Breaking the Circuit Size Barrier for Secure Computation Under DDH Elette Boyle, Niv Gilboa, Yuval Ishai
2016/584 (PDF ) Network Oblivious Transfer Ranjit Kumaresan, Srinivasan Raghuraman, Adam Sealfon
2016/583 (PDF ) Efficient Zero-Knowledge Proof of Algebraic and Non-Algebraic Statements with Applications to Privacy Preserving Credentials Melissa Chase, Chaya Ganesh, Payman Mohassel
2016/582 (PDF ) TV-PUF : A Fast Lightweight Analog Physically Unclonable Function Tanujay Saha
2016/581 (PDF ) UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens Jan Camenisch, Maria Dubovitskaya, Alfredo Rial
2016/580 (PDF ) Fine-grained Cryptography Akshay Degwekar, Vinod Vaikuntanathan, Prashant Nalini Vasudevan
2016/579 (PDF ) Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks Patrick Derbez, Pierre-Alain Fouque
2016/578 (PDF ) Key-alternating Ciphers and Key-length Extension: Exact Bounds and Multi-user Security Viet Tung Hoang, Stefano Tessaro
2016/577 (PDF ) Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results Jean Paul Degabriele, Kenneth G. Paterson, Jacob C. N. Schuldt, Joanne Woodage
2016/575 (PDF ) TumbleBit: An Untrusted Bitcoin-Compatible Anonymous Payment Hub Ethan Heilman, Leen Alshenibr, Foteini Baldimtsi, Alessandra Scafuro, Sharon Goldberg
2016/574 (PDF ) Structure vs Hardness through the Obfuscation Lens Nir Bitansky, Akshay Degwekar, Vinod Vaikuntanathan
2016/573 (PDF ) Towards Sound Fresh Re-Keying with Hard (Physical) Learning Problems Stefan Dziembowski, Sebastian Faust, Gottfried Herold, Anthony Journault, Daniel Masny, Francois-Xavier Standaert
2016/572 (PDF ) Faster Evaluation of SBoxes via Common Shares Jean-Sebastien Coron, Aurelien Greuet, Emmanuel Prouff, Rina Zeitoun
2016/571 (PDF ) Simple Key Enumeration (and Rank Estimation) using Histograms: an Integrated Approach Romain poussier, François-Xavier Standaert, Vincent Grosso
2016/570 (PDF ) Design in Type-I, Run in Type-III: Fast and Scalable Bilinear-Type Conversion using Integer Programming Masayuki Abe, Fumitaka Hoshino, Miyako Ohkubo
2016/569 (PDF ) FourQ on FPGA: New Hardware Speed Records for Elliptic Curve Cryptography over Large Prime Characteristic Fields Kimmo Järvinen, Andrea Miele, Reza Azarderakhsh, Patrick Longa
2016/568 (PDF ) A Secure One-Roundtrip Index for Range Queries Tobias Boelter, Rishabh Poddar, Raluca Ada Popa
2016/567 (PDF ) Adversary-dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro
2016/566 (PDF ) Concurrent Non-Malleable Commitments (and More) in 3 Rounds Michele Ciampi, Rafail Ostrovsky, Luisa Siniscalchi, Ivan Visconti
2016/565 (PDF ) Bounded Indistinguishability and the Complexity of Recovering Secrets Andrej Bogdanov, Yuval Ishai, Emanuele Viola, Christopher Williamson
2016/564 (PDF ) The Multi-User Security of Authenticated Encryption: AES-GCM in TLS 1.3 Mihir Bellare, Bjoern Tackmann
2016/563 (PDF ) Garbling Scheme for Formulas with Constant Size of Garbled Gates Carmen Kempka, Ryo Kikuchi, Susumu Kiyoshima, Koutarou Suzuki
2016/562 (PDF ) Deniable Attribute Based Encryption for Branching Programs from LWE Daniel Apon, Xiong Fan, Feng-Hao Liu
2016/561 (PDF ) Compactness vs Collusion Resistance in Functional Encryption Baiyu Li, Daniele Micciancio
2016/560 (PDF ) Memory-Efficient Algorithms for Finding Needles in Haystacks Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir
2016/559 (PDF ) Quantum homomorphic encryption for polynomial-sized circuits Yfke Dulek, Christian Schaffner, Florian Speelman
2016/558 (PDF ) From Cryptomania to Obfustopia through Secret-Key Functional Encryption Nir Bitansky, Ryo Nishimaki, Alain Passelègue, Daniel Wichs
2016/557 (PDF ) On the Multiplicative Complexity of Boolean Functions and Bitsliced Higher-Order Masking Dahmun Goudarzi, Matthieu Rivain
2016/556 (PDF ) Network-Hiding Communication and Applications to Multi-Party Protocols Martin Hirt, Ueli Maurer, Daniel Tschudi, Vassilis Zikas
2016/555 (PDF ) On the Security and Performance of Proof of Work Blockchains Arthur Gervais, Ghassan O. Karame, Karl Wüst, Vasileios Glykantzis, Hubert Ritzdorf, Srdjan Capkun
2016/554 (PDF ) Another view of the division property Christina Boura, Anne Canteaut
2016/552 (PDF ) Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-QuantumWorld Jintai Ding, Saed Alsayigh, Jean Lancrenon, Saraswathy RV, Michael Snook
2016/551 (PDF ) Improved Factorization of $N=p^rq^s$ Jean-Sebastien Coron, Rina Zeitoun
2016/550 (PDF ) Antikernel: A Decentralized Secure Hardware-Software Operating System Architecture Andrew D. Zonenberg, Bulent Yener
2016/549 (PDF ) Short and Adjustable Signatures Xiong Fan, Juan Garay, Payman Mohassel
2016/548 (PDF ) Linicrypt: A Model for Practical Cryptography Brent Carmer, Mike Rosulek
2016/547 (PDF ) Efficient High-Speed WPA2 Brute Force Attacks using Scalable Low-Cost FPGA Clustering Markus Kammerstetter, Markus Muellner, Daniel Burian, Christian Kudera, Wolfgang Kastner
2016/546 (PDF ) An Unconditionally Hiding Auditing Procedure for Multi-Party Computations Lucas Schabhüser, Denise Demirel, Johannes Buchmann
2016/545 (PDF ) On Trees, Chains and Fast Transactions in the Blockchain Aggelos Kiayias, Giorgos Panagiotakos
2016/544 (PDF ) New Protocols for Secure Equality Test and Comparison Geoffroy Couteau
2016/543 (PDF ) ObliviSync: Practical Oblivious File Backup and Synchronization Adam J. Aviv, Seung Geol Choi, Travis Mayberry, Daniel S. Roche
2016/542 (PDF ) MPC-Friendly Symmetric Key Primitives Lorenzo Grassi, Christian Rechberger, Dragos Rotaru, Peter Scholl, Nigel P. Smart
2016/541 (PDF ) Big-Key Symmetric Encryption: Resisting Key Exfiltration Mihir Bellare, Daniel Kane, Phillip Rogaway
2016/540 (PDF ) Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme Alberto Battistello, Jean-Sebastien Coron, Emmanuel Prouff, Rina Zeitoun
2016/539 (PDF ) Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem (Full Version) Léo Perrin, Aleksei Udovenko, Alex Biryukov
2016/538 (PDF ) How to prove knowledge of small secrets Carsten Baum, Ivan Damgård, Kasper Larsen, Michael Nielsen
2016/537 (PDF ) A Generalisation of the Conjugation Method for Polynomial Selection for the Extended Tower Number Field Sieve Algorithm Palash Sarkar, Shashank Singh
2016/536 (PDF ) Position-Based Cryptography and Multiparty Communication Complexity Joshua Brody, Stefan Dziembowski, Sebastian Faust, Krzysztof Pietrzak
2016/534 (PDF ) Damaging, Simplifying, and Salvaging p-OMD Tomer Ashur, Bart Mennink
2016/533 (PDF ) New Insights on AES-like SPN Ciphers Bing Sun, Meicheng Liu, Jian Guo, Longjiang Qu, Vincent Rijmen
2016/532 (PDF ) Cryptanalysis of GOST2 Tomer Ashur, Achiya Bar-On, Orr Dunkelman
2016/531 (PDF ) Reducing number field defining polynomials: An application to class group computations Alexandre Gélin, Antoine Joux
2016/530 (PDF ) Generic Semantic Security against a Kleptographic Adversary Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou
2016/529 (PDF ) Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience Antonio Faonio, Daniele Venturi
2016/528 (PDF ) Certified lattice reduction Thomas Espitau, Antoine Joux
2016/527 (PDF ) Secure Outsourcing of Circuit Manufacturing Giuseppe Ateniese, Aggelos Kiayias, Bernardo Magri, Yiannis Tselekounis, Daniele Venturi
2016/526 (PDF ) Extended Tower Number Field Sieve with Application to Finite Fields of Arbitrary Composite Extension Degree Taechan Kim, Jinhyuck Jeong
2016/525 (PDF ) EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC Benoît Cogliati, Yannick Seurin
2016/524 (PDF ) Single-Key to Multi-Key Functional Encryption with Polynomial Loss Sanjam Garg, Akshayaram Srinivasan
2016/523 (PDF ) Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes Jiang Zhang, Yu Chen, Zhenfeng Zhang
2016/522 (PDF ) A Novel Methodology for Testing Hardware Security and Trust Exploiting On-Chip Power Noise Measurements (Extended Version) Daisuke Fujimoto, Shivam Bhasin, Makoto Nagata, Jean-Luc Danger
2016/521 (PDF ) SAT-based cryptanalysis of ACORN Frédéric Lafitte, Liran Lerman, Olivier Markowitch, Dirk Van Heule
2016/520 (PDF ) Universally Composable Two-Server PAKE Franziskus Kiefer, Mark Manulis
2016/519 (PDF ) On the Relationship between Statistical Zero-Knowledge and Statistical Randomized Encodings Benny Applebaum, Pavel Raykov
2016/518 (PDF ) Attribute-based Key Exchange with General Policies Vladimir Kolesnikov, Hugo Krawczyk, Yehuda Lindell, Alex J. Malozemoff, Tal Rabin
2016/517 (PDF ) Towards Practical Tools for Side Channel Aware Software Engineering: `Grey Box' Modelling for Instruction Leakages David McCann, Elisabeth Oswald, Carolyn Whitnall
2016/516 (PDF ) Boneh-Gentry-Hamburg's Identity-based Encryption Schemes Revisited George Teseleanu, Ferucio Laurentiu Tiplea, Sorin Iftene, Anca-Maria Nica
2016/515 (PDF ) RSA Weak Public Keys available on the Internet Mihai Barbulescu, Adrian Stratulat, Vlad Traista-Popescu, Emil Simion
2016/514 (PDF ) Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPN Yu Yu, Jiang Zhang
2016/513 (PDF ) Applying TVLA to Public Key Cryptographic Algorithms Michael Tunstall, Gilbert Goodwill
2016/512 (PDF ) Security Analysis of ePrint Report 2016/500 "Efficient Identity-Based Encryption and Public-Key Signature from Trapdoor Subgroups" Lucjan Hanzlik, Kamil Kluczniak
2016/511 (PDF ) Optimal-Rate Non-Committing Encryption in a CRS Model Ran Canetti, Oxana Poburinnaya, Mariana Raykova
2016/510 (PDF ) A Full RNS Variant of FV like Somewhat Homomorphic Encryption Schemes Jean-Claude Bajard, Julien Eynard, Anwar Hasan, Vincent Zucca
2016/509 (PDF ) Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes Xiaoyang Dong, Xiaoyun Wang
2016/508 (PDF ) Collapse-binding quantum commitments without random oracles Dominique Unruh
2016/507 (PDF ) Solving discrete logarithms on a 170-bit MNT curve by pairing reduction Aurore Guillevic, François Morain, Emmanuel Thomé
2016/506 (PDF ) TOR - Didactic pluggable transport Ioana-Cristina Panait, Cristian Pop, Alexandru Sirbu, Adelina Vidovici, Emil Simion
2016/505 (PDF ) MASCOT: Faster Malicious Arithmetic Secure Computation with Oblivious Transfer Marcel Keller, Emmanuela Orsini, Peter Scholl
2016/504 (PDF ) Speeding up the Number Theoretic Transform for Faster Ideal Lattice-Based Cryptography Patrick Longa, Michael Naehrig
2016/503 (PDF ) MQSAS - A Multivariate Sequential Aggregate Signature Scheme Rachid El Bansarkhani, Mohamed Saied Emam Mohamed, Albrecht Petzoldt
2016/502 (PDF ) Key Recovery Attack against 2.5-round pi-Cipher Christina Boura, Avik Chakraborti, Gaëtan Leurent, Goutam Paul, Dhiman Saha, Hadi Soleimany, Valentin Suder
2016/501 (PDF ) Certificateless Key Insulated Encryption: Cryptographic Primitive for Achieving Key-escrow free and Key-exposure Resilience Libo He, Chen Yuan, Hu Xiong, Zhiguang Qin
2016/500 (PDF ) Efficient Identity-Based Encryption and Public-Key Signature from Trapdoor Subgroups Jong Hwan Park, Kwangsu Lee, Dong Hoon Lee
2016/499 (PDF ) Drone Targeted Cryptography Gideon Samid
2016/498 (PDF ) Towards Tightly Secure Short Signature and IBE Xavier Boyen, Qinyi Li
2016/497 (PDF ) Secure Computation from Elastic Noisy Channels Dakshita Khurana, Hemanta K. Maji, Amit Sahai
2016/496 (PDF ) All Complete Functionalities are Reversible Daniel Kraschewski, Dakshita Khurana, Hemanta K. Maji, Manoj Prabhakaran, Amit Sahai
2016/495 (PDF ) Cross&Clean: Amortized Garbled Circuits with Constant Overhead Jesper Buus Nielsen, Claudio Orlandi
2016/494 (PDF ) AEP-M: Practical Anonymous E-Payment for Mobile Devices using ARM TrustZone and Divisible E-Cash (Full Version) Bo Yang, Kang Yang, Zhenfeng Zhang, Yu Qin, Dengguo Feng
2016/493 (PDF ) Partition-Based Trapdoor Ciphers Arnaud Bannier, Nicolas Bodin, Eric Filiol
2016/492 (PDF ) MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity Martin Albrecht, Lorenzo Grassi, Christian Rechberger, Arnab Roy, Tyge Tiessen
2016/491 (PDF ) Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations Daniel P. Martin, Luke Mather, Elisabeth Oswald, Martijn Stam
2016/490 (PDF ) Truncated, Impossible, and Improbable Differential Analysis of Ascon Cihangir Tezcan
2016/489 (PDF ) Two Cents for Strong Anonymity: The Anonymous Post-office Protocol Nethanel Gelernter, Amir Herzberg, Hemi Leibowitz
2016/488 (PDF ) Efficient Homomorphic Integer Polynomial Evaluation based on GSW FHE Husen Wang, Qiang Tang
2016/487 (PDF ) A Systolic Hardware Architectures of Montgomery Modular Multiplication for Public Key Cryptosystems Amine MRABET, Nadia EL-MRABET, Ronan LASHERMES, Jean Baptiste RIGAUD, Belgacem BOUALLEGUE, Sihem MESNAGER, Mohsen MACHHOUT
2016/486 (PDF ) Domain-Oriented Masking: Compact Masked Hardware Implementations with Arbitrary Protection Order Hannes Gross, Stefan Mangard, Thomas Korak
2016/485 (PDF ) A General Polynomial Selection Method and New Asymptotic Complexities for the Tower Number Field Sieve Algorithm Palash Sarkar, Shashank Singh
2016/484 (PDF ) Ghostshell: Secure Biometric Authentication using Integrity-based Homomorphic Evaluations Jung Hee Cheon, HeeWon Chung, Myungsun Kim, Kang-Won Lee
2016/483 (PDF ) Proofs of Knowledge on Monotone Predicates and its Application to Attribute-Based Identifications and Signatures Hiroaki Anada, Seiko Arita, Kouichi Sakurai
2016/482 (PDF ) Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions Shashank Agrawal, David J. Wu
2016/481 (PDF ) Side-Channel Analysis Protection and Low-Latency in Action - case study of PRINCE and Midori Amir Moradi, Tobias Schneider
2016/480 (PDF ) Achieving Better Privacy for the 3GPP AKA Protocol Pierre-Alain Fouque, Cristina Onete, Benjamin Richard
2016/479 (PDF ) Survey of Microarchitectural Side and Covert Channels, Attacks, and Defenses Jakub Szefer
2016/478 (PDF ) Cryptographic Solutions for Credibility and Liability Issues of Genomic Data Erman Ayday, Qiang Tang, Arif Yilmaz
2016/477 (PDF ) Shortening the Libert-Peters-Yung Revocable Group Signature Scheme by Using the Random Oracle Methodology Kazuma Ohara, Keita Emura, Goichiro Hanaoka, Ai Ishida, Kazuo Ohta, Yusuke Sakai
2016/476 (PDF ) Groth-Sahai Proofs Revisited Again: A Bug in ``Optimized'' Randomization Keita Xagawa
2016/475 (PDF ) Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS Hanno Böck, Aaron Zauner, Sean Devlin, Juraj Somorovsky, Philipp Jovanovic
2016/474 (PDF ) T-Proof: Secure Communication via Non-Algorithmic Randomization Gideon Samid
2016/473 (PDF ) Exploiting the Physical Disparity: Side-Channel Attacks on Memory Encryption Thomas Unterluggauer, Stefan Mangard
2016/472 (PDF ) Adequate Elliptic Curve for Computing the Product of n Pairings Loubna Ghammam, Emmanuel Fouotsa
2016/471 (PDF ) NTRU Modular Lattice Signature Scheme on CUDA GPUs Wei Dai, John Schanck, Berk Sunar, William Whyte, Zhenfei Zhang
2016/470 (PDF ) Better Security for Queries on Encrypted Databases Myungsun Kim, Hyung Tae Lee, San Ling, Shu Qin Ren, Benjamin Hong Meng Tan, Huaxiong Wang
2016/469 (PDF ) Identity Chains Andrew Egbert, Brad Chun, Thomas Otte
2016/468 (PDF ) Chaos Machine: Different Approach to the Application and Significance of Numbers Maciej A. Czyzewski
2016/467 (PDF ) Speeding up R-LWE post-quantum key exchange Shay Gueron, Fabian Schlieker
2016/466 (PDF ) AnNotify: A Private Notification Service Ania Piotrowska, Jamie Hayes, Nethanel Gelernter, George Danezis, Amir Herzberg
2016/465 (PDF ) Can Large Deviation Theory be Used for Estimating Data Complexity? Subhabrata Samajder, Palash Sarkar
2016/464 (PDF ) Beaver: A Decentralized Anonymous Marketplace with Secure Reputation Kyle Soska, Albert Kwon, Nicolas Christin, Srinivas Devadas
2016/463 (PDF ) Authenticated Encryption with Variable Stretch Reza Reyhanitabar, Serge Vaudenay, Damian Vizár
2016/462 (PDF ) Fully Homomorphic Encryption with Isotropic Elements Masahiro Yagisawa
2016/461 (PDF ) NTRU Prime: reducing attack surface at low cost Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, Christine van Vredendaal
2016/460 (PDF ) Revocable Hierarchical Identity-Based Encryption with Shorter Private Keys and Update Keys Kwangsu Lee, Seunghwan Park
2016/459 (PDF ) Non-Interactive RAM and Batch NP Delegation from any PIR Zvika Brakerski, Justin Holmgren, Yael Kalai
2016/458 (PDF ) CompGC: Efficient Offline/Online Semi-honest Two-party Computation Adam Groce, Alex Ledger, Alex J. Malozemoff, Arkady Yerukhimovich
2016/457 (PDF ) --Withdrawn-- Wei Yuan
2016/456 (PDF ) Secure Protocol Transformations Yuval Ishai, Eyal Kushilevitz, Manoj Prabhakaran, Amit Sahai, Ching-Hua Yu
2016/455 (PDF ) Extracting the RC4 secret key of the Open Smart Grid Protocol Linus Feiten, Matthias Sauer
2016/454 (PDF ) Analysis of the Blockchain Protocol in Asynchronous Networks Rafael Pass, Lior Seeman, abhi shelat
2016/453 (PDF ) SQL on Structurally-Encrypted Databases Seny Kamara, Tarik Moataz
2016/452 (PDF ) Secure Logging Schemes and Certificate Transparency Benjamin Dowling, Felix Günther, Udyani Herath, Douglas Stebila
2016/451 (PDF ) Efficient Zero-Knowledge Contingent Payments in Cryptocurrencies Without Scripts Wacław Banasik, Stefan Dziembowski, Daniel Malinowski
2016/450 (PDF ) A Provably Secure Code-based Concurrent Signature Scheme Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Mohammad Reza Aref
2016/449 (PDF ) Loop-Abort Faults on Lattice-Based Fiat–Shamir and Hash-and-Sign Signatures Thomas Espitau, Pierre-Alain Fouque, Benoît Gérard, Mehdi Tibouchi
2016/448 (PDF ) A Note on ``Outsourcing Large Matrix Inversion Computation to a Public Cloud" Zhengjun Cao, Lihua Liu
2016/447 (PDF ) Theoretical Attacks on E2E Voting Systems Peter Hyun-Jeen Lee, Siamak F. Shahandashti
2016/445 (PDF ) SecureMed: Secure Medical Computation using GPU-Accelerated Homomorphic Encryption Scheme Alhassan Khedr, Glenn Gulak
2016/444 (PDF ) The QARMA Block Cipher Family -- Almost MDS Matrices Over Rings With Zero Divisors, Nearly Symmetric Even-Mansour Constructions With Non-Involutory Central Rounds, and Search Heuristics for Low-Latency S-Boxes Roberto Avanzi
2016/443 (PDF ) Thrifty Zero-Knowledge - When Linear Programming Meets Cryptography Simon Cogliani, Houda Ferradi, Rémi Géraud, David Naccache
2016/442 (PDF ) Blind Password Registration for Verifier-based PAKE Franziskus Kiefer, Mark Manulis
2016/441 (PDF ) Fault Tolerant Implementations of Delay-based Physically Unclonable Functions on FPGA Durga Prasad Sahoo, Sikhar Patranabis, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty
2016/440 (PDF ) Function-Hiding Inner Product Encryption is Practical Sam Kim, Kevin Lewi, Avradip Mandal, Hart Montgomery, Arnab Roy, David J. Wu
2016/439 (PDF ) A Measure Version of Gaussian Heuristic Hao Chen
2016/438 (PDF ) sElect: A Lightweight Verifiable Remote Voting System Ralf Kuesters, Johannes Mueller, Enrico Scapin, Tomasz Truderung
2016/437 (PDF ) Observations on the LPN Solving Algorithm from Eurocrypt'16 Sonia Bogos, Serge Vaudenay
2016/436 (PDF ) Cryptanalysis of Reduced NORX Nasour Bagheri, Tao Huang, Keting Jia, Florian Mendel, Yu Sasaki
2016/435 (PDF ) The Whole is Less than the Sum of its Parts: Constructing More Efficient Lattice-Based AKEs Rafael del Pino, Vadim Lyubashevsky, David Pointcheval
2016/434 (PDF ) A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile-and Why it is Not Cong Chen, Mohammad Farmani, Thomas Eisenbarth
2016/433 (PDF ) Analysis of Key Wrapping APIs: Generic Policies, Computational Security Guillaume Scerri, Ryan Stanley-Oakes
2016/432 (PDF ) Two-Input Functional Encryption for Inner Products from Bilinear Maps Kwangsu Lee, Dong Hoon Lee
2016/431 (PDF ) Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy, and Verifiability Against Malicious Bulletin Board for the Helios Voting Scheme David Bernhard, Oksana Kulyk, Melanie Volkamer
2016/430 (PDF ) Partially homomorphic encryption schemes over finite fields Jian Liu, Lusheng Chen, Sihem Mesnager
2016/429 (PDF ) Information-Theoretical Analysis of Two Shannon's Ciphers Boris Ryabko
2016/428 (PDF ) An Efficient and Scalable Modeling Attack on Lightweight Secure Physically Unclonable Function Phuong Ha Nguyen, Durga Prasad Sahoo
2016/427 (PDF ) Privacy Preserving Network Analysis of Distributed Social Networks Varsha Bhat Kukkala, Jaspal Singh Saini, S. R. S. Iyengar
2016/426 (PDF ) A Practical Framework for Executing Complex Queries over Encrypted Multimedia Data Fahad Shaon, Murat Kantarcioglu
2016/425 (PDF ) Multi-Input Inner-Product Functional Encryption from Pairings Michel Abdalla, Romain Gay, Mariana Raykova, Hoeteck Wee
2016/424 (PDF ) Computational Security of Quantum Encryption Gorjan Alagic, Anne Broadbent, Bill Fefferman, Tommaso Gagliardoni, Christian Schaffner, Michael St. Jules
2016/423 (PDF ) Modeling Random Oracles under Unpredictable Queries Pooya Farshim, Arno Mittelbach
2016/422 (PDF ) A deeper understanding of the XOR count distribution in the context of lightweight cryptography Sumanta Sarkar, Siang Meng Sim
2016/421 (PDF ) Homomorphic Encryption for Arithmetic of Approximate Numbers Jung Hee Cheon, Andrey Kim, Miran Kim, Yongsoo Song
2016/420 (PDF ) A note on the security of threshold implementations with $d+1$ input shares Santos Merino Del Pozo, François-Xavier Standaert
2016/419 (PDF ) Walsh-Hadamard Transform and Cryptographic Applications in Bias Computing Yi LU, Yvo DESMEDT
2016/418 (PDF ) Shorter Circuit Obfuscation in Challenging Security Models Zvika Brakerski, Or Dagmi
2016/417 (PDF ) New Tools for Multi-Party Computation Lisa Kohl
2016/416 (PDF ) A Decentralized Anonymity-Preserving Reputation System with Constant-time Score Retrieval Rémi Bazin, Alexander Schaub, Omar Hasan, Lionel Brunie
2016/415 (PDF ) Lattice-Based Signature Schemes and their Sensitivity to Fault Attacks Nina Bindel, Johannes Buchmann, Juliane Krämer
2016/414 (PDF ) Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE (Full Version) Li Lin, Wenling Wu, Yafei Zheng
2016/413 (PDF ) Efficient algorithms for supersingular isogeny Diffie-Hellman Craig Costello, Patrick Longa, Michael Naehrig
2016/412 (PDF ) Solving Quadratic Equations with XL on Parallel Architectures - extended version Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Bo-Yin Yang
2016/411 (PDF ) Polymorphic Encryption and Pseudonymisation for Personalised Healthcare Eric Verheul, Bart Jacobs, Carlo Meijer, Mireille Hildebrandt, Joeri de Ruiter
2016/410 (PDF ) Efficient Quantum-Resistant Trust Infrastructure based on HIMMO Oscar Garcia-Morchon, Sauvik Bhattacharya, Ronald Rietman, Ludo Tolhuizen, Jose-Luis Torre-Arce, Maarten Bodlaender
2016/409 (PDF ) Automatic Search for the Best Trails in ARX: Application to Block Cipher \textsc{Speck} Alex Biryukov, Vesselin Velichkov, Yann Le Corre
2016/408 (PDF ) Towards Bitcoin Payment Networks Patrick McCorry, Malte Möser, Siamak F. Shahandashti, Feng Hao
2016/407 (PDF ) MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck Kai Fu, Meiqin Wang, Yinghua Guo, Siwei Sun, Lei Hu
2016/406 (PDF ) On the Construction of Lightweight Circulant Involutory MDS Matrices Yongqiang Li, Mingsheng Wang
2016/405 (PDF ) Multiple Differential Cryptanalysis: A Rigorous Analysis Subhabrata Samajder, Palash Sarkar
2016/404 (PDF ) A New Test Statistic for Key Recovery Attacks Using Multiple Linear Approximations Subhabrata Samajder, Palash Sarkar
2016/403 (PDF ) On Instantiating Pairing-Based Protocols with Elliptic Curves of Embedding Degree One Sanjit Chatterjee, Alfred Menezes, Francisco Rodriguez-Henriquez
2016/402 (PDF ) Fully Homomorphic Encryption for Point Numbers Seiko Arita, Shota Nakasato
2016/401 (PDF ) Tower Number Field Sieve Variant of a Recent Polynomial Selection Method Palash Sarkar, Shashank Singh
2016/400 (PDF ) Towards Secure Quadratic Voting Sunoo Park, Ronald L. Rivest
2016/399 (PDF ) Slow Motion Zero Knowledge Identifying With Colliding Commitments Houda Ferradi, Rémi Géraud, David Naccache
2016/398 (PDF ) Algebraic Insights into the Secret Feistel Network (Full version) Léo Perrin, Aleksei Udovenko
2016/397 (PDF ) Linear-Time Non-Malleable Codes in the Bit-Wise Independent Tampering Model Ronald Cramer, Ivan Damgård, Nico Döttling, Irene Giacomelli, Chaoping Xing
2016/396 (PDF ) Cryptanalysis of Haraka Jérémy Jean
2016/395 (PDF ) Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel
2016/394 (PDF ) Strengthening the Known-Key Security Notion for Block Ciphers Benoît Cogliati, Yannick Seurin
2016/393 (PDF ) De Bruijn Sequences, Adjacency Graphs and Cyclotomy Ming Li, Dongdai Lin
2016/391 (PDF ) A Digital Signature Scheme Based on Random Split of St-Gen Codes Danilo Gligoroski, Simona Samardjiska
2016/390 (PDF ) Obfuscation without the Vulnerabilities of Multilinear Maps Sanjam Garg, Pratyay Mukherjee, Akshayaram Srinivasan
2016/389 (PDF ) A Quasipolynomial Reduction for Generalized Selective Decryption on Trees Georg Fuchsbauer, Zahra Jafargholi, Krzysztof Pietrzak
2016/388 (PDF ) Tightly-Secure Authenticated Key Exchange without NAXOS' approach based on Decision Linear Problem Mojahed Mohamed, Xiaofen Wang, Xiaosong Zhang
2016/387 (PDF ) Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags K. Baghery, B. Abdolmaleki, M. J. Emadi
2016/386 (PDF ) Canary Numbers: Design for Light-weight Online Testability of True Random Number Generators Vladimir Rožić, Bohan Yang, Nele Mentens, Ingrid Verbauwhede
2016/385 (PDF ) A note on Ring-LWE security in the case of Fully Homomorphic Encryption Guillaume Bonnoron, Caroline Fontaine
2016/384 (PDF ) Attacks against Filter Generators Exploiting Monomial Mappings Anne Canteaut, Yann Rotella
2016/383 (PDF ) Reducing the Key Size of the SRP Encryption Scheme - Extended version Dung Hoang Duong, Albrecht Petzoldt, Tsuyoshi Takagi
2016/382 (PDF ) Faster elliptic-curve discrete logarithms on FPGAs Daniel J. Bernstein, Susanne Engels, Tanja Lange, Ruben Niederhagen, Christof Paar, Peter Schwabe, Ralf Zimmermann
2016/381 (PDF ) FHE Circuit Privacy Almost For Free Florian Bourse, Rafaël Del Pino, Michele Minelli, Hoeteck Wee
2016/380 (PDF ) Parallel Implementation of BDD enumeration for LWE Elena Kirshanova, Alexander May, Friedrich Wiemer
2016/379 (PDF ) Two More Efficient Variants of the J-PAKE Protocol Jean Lancrenon, Marjan Škrobot, Qiang Tang
2016/378 (PDF ) Using semidirect product of (semi)groups in public key cryptography Delaram Kahrobaei, Vladimir Shpilrain
2016/377 (PDF ) Differential Cryptanalysis of Salsa and ChaCha -- An Evaluation with a Hybrid Model Arka Rai Choudhuri, Subhamoy Maitra
2016/376 (PDF ) A Systematic Analysis of the Juniper Dual EC Incident Stephen Checkoway, Shaanan Cohney, Christina Garman, Matthew Green, Nadia Heninger, Jacob Maskiewicz, Eric Rescorla, Hovav Shacham, Ralf-Philipp Weinmann
2016/375 (PDF ) Can PPAD Hardness be Based on Standard Cryptographic Assumptions? Alon Rosen, Gil Segev, Ido Shahaf
2016/374 (PDF ) Analysis of SHA-512/224 and SHA-512/256 Christoph Dobraunig, Maria Eichlseder, Florian Mendel
2016/373 (PDF ) Adaptive partitioning Dennis Hofheinz
2016/372 (PDF ) NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion Mihir Bellare, Georg Fuchsbauer, Alessandra Scafuro
2016/371 (PDF ) A Cryptographic Analysis of UMTS/LTE AKA Stéphanie Alt, Pierre-Alain Fouque, Gilles Macario-rat, Cristina Onete, Benjamin Richard
2016/370 (PDF ) Malleability of the blockchain’s entropy Cecile Pierrot, Benjamin Wesolowski
2016/369 (PDF ) Efficient Multi-Point Local Decoding of Reed-Muller Codes via Interleaved Codex Ronald Cramer, Chaoping Xing, Chen Yuan
2016/368 (PDF ) Foundations of Fully Dynamic Group Signatures Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Essam Ghadafi, Jens Groth
2016/367 (PDF ) An Analysis of OpenSSL's Random Number Generator Falko Strenzke
2016/366 (PDF ) \(\mu\)Kummer: efficient hyperelliptic signatures and key exchange on microcontrollers Joost Renes, Peter Schwabe, Benjamin Smith, Lejla Batina
2016/365 (PDF ) Fast Modular Arithmetic on the Kalray MPPA-256 Processor for an Energy-Efficient Implementation of ECM Masahiro Ishii, Jérémie Detrey, Pierrick Gaudry, Atsuo Inomata, Kazutoshi Fujikawa
2016/363 (PDF ) Legally Fair Contract Signing Without Keystones Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, David Pointcheval
2016/362 (PDF ) An Empirical Study towards Refining the AKS Primality Testing Algorithm Lalitha Kiran Nemana, V. Ch. Venkaiah
2016/361 (PDF ) Functional Encryption for Bounded Collusions, Revisited Shweta Agrawal, Alon Rosen
2016/360 (PDF ) Another Look at Tightness II: Practical Issues in Cryptography Sanjit Chatterjee, Neal Koblitz, Alfred Menezes, Palash Sarkar
2016/359 (PDF ) Less is More - Dimensionality Reduction from a Theoretical Perspective Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Damien Marion, Olivier Rioul
2016/358 (PDF ) The Ring of Gyges: Investigating the Future of Criminal Smart Contracts Ari Juels, Ahmed Kosba, Elaine Shi
2016/357 (PDF ) State Management for Hash-Based Signatures David McGrew, Panos Kampanakis, Scott Fluhrer, Stefan-Lukas Gazdag, Denis Butin, Johannes Buchmann
2016/356 (PDF ) More Efficient Constructions for Inner-Product Encryption Somindu C. Ramanna
2016/355 (PDF ) Fruit-v2: Ultra-Lightweight Stream Cipher with Shorter Internal State Vahid Amin Ghafari, Honggang Hu, Ying Chen
2016/354 (PDF ) A Pairing-Free, One Round Identity Based Authenticated Key Exchange Protocol Secure Against Memory-Scrapers Suvradip Chakraborty, Srinivasan Raghuraman, C. Pandu Rangan
2016/353 (PDF ) General Bounds for Small Inverse Problems and Its Applications to Multi-Prime RSA Atsushi Takayasu, Noboru Kunihiro
2016/352 (PDF ) Closing the Gap in RFC 7748: Implementing Curve448 in Hardware Pascal Sasdrich, Tim Güneysu
2016/351 (PDF ) How (Not) to Instantiate Ring-LWE Chris Peikert
2016/350 (PDF ) Probabilistic Termination and Composability of Cryptographic Protocols Ran Cohen, Sandro Coretti, Juan Garay, Vassilis Zikas
2016/349 (PDF ) Note on Impossible Differential Attacks Patrick Derbez
2016/348 (PDF ) A Note on Non-Perfect Secret Sharing Oriol Farràs, Sebastià Martín, Carles Padró
2016/347 (PDF ) Cryptanalysis of Searchable Anonymous Attribute Based Encryption Payal Chaudhari, Manik Lal Das
2016/345 (PDF ) Provably Secure Password Reset Protocol: Model, Definition, and Generic Construction Satsuya Ohata, Takahiro Matsuda, Kanta Matsuura
2016/344 (PDF ) Encoding Rational Numbers for FHE-based Applications HeeWon Chung, Myungsun Kim
2016/343 (PDF ) On the complexity of constructing pseudorandom functions (especially when they don't exist) Eric Miles, Emanuele Viola
2016/342 (PDF ) On the Selective Opening Security of Practical Public-Key Encryption Schemes Felix Heuer, Tibor Jager, Eike Kiltz, Sven Schäge
2016/341 (PDF ) Semantically Secure Anonymity: Foundations of Re-encryption Adam L. Young, Moti Yung
2016/340 (PDF ) Non-Malleable Extractors and Codes, with their Many Tampered Extensions Eshan Chattopadhyay, Vipul Goyal, Xin Li
2016/339 (PDF ) Lattice-Based Fully Dynamic Multi-Key FHE with Short Ciphertexts Zvika Brakerski, Renen Perlman
2016/338 (PDF ) Mixed Integer Programming Models for Finite Automaton and Its Application to Additive Differential Patterns of Exclusive-Or Siwei Sun, Lei Hu, Peng Wang, Meiqin Wang, Danping Shi, Xiaoshuang Ma, Qianqian Yang, Kai Fu
2016/337 (PDF ) State recovery of RC4 and Spritz Revisited Martin Gábriš, Martin Stanek
2016/336 (PDF ) No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples with Applications to CAPTCHA Margarita Osadchy, Julio Hernandez-Castro, Stuart Gibson, Orr Dunkelman, Daniel Pérez-Cabo
2016/335 (PDF ) Complete characterization of generalized bent and 2^k-bent Boolean functions Chunming Tang, Can Xiang, Yanfeng Qi, Keqin Feng
2016/334 (PDF ) Probability that the k-gcd of products of positive integers is B-friable Jung Hee Cheon, Duhyeong Kim
2016/333 (PDF ) Proof of Space from Stacked Expanders Ling Ren, Srinivas Devadas
2016/332 (PDF ) Micropayments for Decentralized Currencies Rafael Pass, abhi shelat
2016/331 (PDF ) TRVote: A New, Trustworthy and Robust Electronic Voting System Fatih Tiryakioglu, Mehmet Sabir Kiraz, Fatih Birinci
2016/330 (PDF ) NaCl's Crypto_Box in Hardware Michael Hutter, Jürgen Schilling, Peter Schwabe, Wolfgang Wieser
2016/329 (PDF ) A modified block Lanczos algorithm with fewer vectors Emmanuel Thomé
2016/328 (PDF ) Constructing genus 3 hyperelliptic Jacobians with CM Jennifer Balakrishnan, Sorina Ionica, Kristin Lauter, Christelle Vincent
2016/327 (PDF ) Proxy Re-Encryption Schemes with Key Privacy from LWE Le Trieu Phong, Lihua Wang, Yoshinori Aono, Manh Ha Nguyen, Xavier Boyen
2016/326 (PDF ) Square Attack on 7-Round Kiasu-BC Christoph Dobraunig, Maria Eichlseder, Florian Mendel
2016/325 (PDF ) Optimized quantization in Zero Leakage Helper Data Systems Taras Stanko, Fitria Nur Andini, Boris Skoric
2016/324 (PDF ) Interactive Oracle Proofs with Constant Rate and Query Complexity Eli Ben-Sasson, Alessandro Chiesa, Ariel Gabizon, Michael Riabzev, Nicholas Spooner
2016/323 (PDF ) A Family of Scalable Polynomial Multiplier Architectures for Ring-LWE Based Cryptosystems Chaohui Du, Guoqiang Bai
2016/322 (PDF ) On the Security of PUF Protocols under Bad PUFs and PUFs-inside-PUFs Attacks Ulrich Rührmair
2016/321 (PDF ) Algebraic Decomposition for Probing Security Claude Carlet, Emmanuel Prouff, Matthieu Rivain, Thomas Roche
2016/320 (PDF ) On Metrics to Quantify the Inter-Device Uniqueness of PUFs Linus Feiten, Matthias Sauer, Bernd Becker
2016/319 (PDF ) High-precision Secure Computation of Satellite Collision Probabilities Brett Hemenway, Steve Lu, Rafail Ostrovsky, William Welser IV
2016/318 (PDF ) Generic Construction of Certificateless Signcryption Scheme Jayaprakash Kar, Sagar Naik
2016/317 (PDF ) Semi-Adaptive Security and Bundling Functionalities Made Generic and Easy Rishab Goyal, Venkata Koppula, Brent Waters
2016/316 (PDF ) A Note on Black-Box Separations for Indistinguishability Obfuscation Mohammad Mahmoody, Ameer Mohammed, Soheil Nematihaji, Rafael Pass, abhi shelat
2016/315 (PDF ) Flattening NTRU for Evaluation Key Free Homomorphic Encryption Yarkın Doröz, Berk Sunar
2016/314 (PDF ) Blind Source Separation from Single Measurements using Singular Spectrum Analysis Santos Merino Del Pozo, François-Xavier Standaert
2016/313 (PDF ) Fiat-Shamir for Highly Sound Protocols is Instantiable Arno Mittelbach, Daniele Venturi
2016/312 (PDF ) Refinements of the k-tree Algorithm for the Generalized Birthday Problem Ivica Nikolic, Yu Sasaki
2016/311 (PDF ) Fast Correlation Attacks over Extension Fields, Large-unit Linear Approximation and Cryptanalysis of SNOW 2.0 Bin Zhang, Chao Xu, Willi Meier
2016/310 (PDF ) Coded-BKW: Solving LWE Using Lattice Codes Qian Guo, Thomas Johansson, Paul Stankovski
2016/309 (PDF ) Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis and Optimal Constructions Celine Chevalier, Fabien Laguillaumie, Damien Vergnaud
2016/308 (PDF ) Strongly Leakage-Resilient Authenticated Key Exchange Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo
2016/307 (PDF ) Non-Malleable Codes for Bounded Depth, Bounded Fan-in Circuits Marshall Ball, Dana Dachman-Soled, Mukul Kulkarni, Tal Malkin
2016/306 (PDF ) A Formal Treatment of Backdoored Pseudorandom Generators Yevgeniy Dodis, Chaya Ganesh, Alexander Golovnev, Ari Juels, Thomas Ristenpart
2016/305 (PDF ) Certicateless Aggregate Short Signature Scheme Jayaprakash Kar
2016/304 (PDF ) A Fast Attribute Based Encryption Yacov Yacobi
2016/303 (PDF ) From Obfuscation to the Security of Fiat-Shamir for Proofs Yael Tauman Kalai, Guy N. Rothblum, Ron D. Rothblum
2016/302 (PDF ) A Polynomial-Time Attack on the BBCRS Scheme Alain Couvreur, Ayoub Otmani, Jean-Pierre Tillich, Valérie Gauthier-Umana
2016/301 (PDF ) Constrained Pseudorandom Functions for Unconstrained Inputs Apoorvaa Deshpande, Venkata Koppula, Brent Waters
2016/300 (PDF ) Flush, Gauss, and Reload -- A Cache Attack on the BLISS Lattice-Based Signature Scheme Leon Groot Bruinderink, Andreas Hülsing, Tanja Lange, Yuval Yarom
2016/299 (PDF ) Efficient Design Strategies Based on the AES Round Function Jérémy Jean, Ivica Nikolic
2016/298 (PDF ) Reverse-Engineering of the Cryptanalytic Attack Used in the Flame Super-Malware Max Fillinger, Marc Stevens
2016/297 (PDF ) A Unified Metric for Quantifying Information Leakage of Cryptographic Devices under Power Analysis Attacks Liwei Zhang, A. Adam Ding, Yunsi Fei, Pei Luo
2016/296 (PDF ) How to Sequentialize Independent Parallel Attacks? Sonia Bogos, Serge Vaudenay
2016/295 (PDF ) Collision Attack on GRINDAHL Thomas Peyrin
2016/294 (PDF ) Evaluation and Improvement of Generic-Emulating DPA Attacks Weijia Wang, Yu Yu, Junrong Liu, Zheng Guo, François-Xavier Standaert, Dawu Gu, Sen Xu, Rong Fu
2016/293 (PDF ) A Parametric Family of Attack Models for Proxy Re-Encryption David Nuñez, Isaac Agudo, Javier Lopez
2016/292 (PDF ) New Bounds for Keyed Sponges with Extendable Output: Independence between Capacity and Message Length Yusuke Naito, Kan Yasuda
2016/291 (PDF ) Spooky Interaction and its Discontents: Compilers for Succinct Two-Message Argument Systems Cynthia Dwork, Moni Naor, Guy N. Rothblum
2016/290 (PDF ) Nonce-Based Cryptography: Retaining Security when Randomness Fails Mihir Bellare, Björn Tackmann
2016/289 (PDF ) Obfuscation Combiners Marc Fischlin, Amir Herzberg, Hod Bin Noon, Haya Shulman
2016/288 (PDF ) Optimization of LPN Solving Algorithms Sonia Bogos, Serge Vaudenay
2016/287 (PDF ) Verifiability Notions for E-Voting Protocols Veronique Cortier, David Galindo, Ralf Kuesters, Johannes Mueller, Tomasz Truderung
2016/286 (PDF ) On a remarkable property of APN Gold functions Anastasiya Gorodilova
2016/285 (PDF ) Bit-Based Division Property and Application to Simon Family Yosuke Todo, Masakatu Morii
2016/284 (PDF ) Co-location detection on the Cloud Mehmet Sinan Inci, Berk Gulmezoglu, Thomas Eisenbarth, Berk Sunar
2016/283 (PDF ) Secure Audit Logs with Verifiable Excerpts Gunnar Hartung
2016/282 (PDF ) Detecting flawed masking schemes with leakage detection tests Oscar Reparaz
2016/281 (PDF ) Universal Obfuscation and Witness Encryption: Boosting Correctness and Combining Security Prabhanjan Ananth, Aayush Jain, Moni Naor, Amit Sahai, Eylon Yogev
2016/280 (PDF ) Low Power Montgomery Modular Multiplication on Reconfigurable Systems Pedro Maat C. Massolino, Lejla Batina, Ricardo Chaves, Nele Mentens
2016/279 (PDF ) Constrained PRFs for Unbounded Inputs with Short Keys Hamza Abusalah, Georg Fuchsbauer
2016/278 (PDF ) Various Proxy Re-Encryption Schemes from Lattices Xiong Fan, Feng-Hao Liu
2016/277 (PDF ) Public Key Encryption Supporting Equality Test and Flexible Authorization without Bilinear Pairings Xi-Jun Lin, Haipeng Qu, Xiaoshuai Zhang
2016/276 (PDF ) Arithmetic coding and blinding countermeasures for lattice signatures Markku-Juhani O. Saarinen
2016/275 (PDF ) Faster Algorithms for Solving LPN Bin Zhang, Lin Jiao, Mingsheng Wang
2016/274 (PDF ) What users should know about Full Disk Encryption based on LUKS Simone Bossi, Andrea Visconti
2016/273 (PDF ) On the weaknesses of PBKDF2 Andrea Visconti, Simone Bossi, Hany Ragab, Alexandro Calò
2016/272 (PDF ) Spooky Encryption and its Applications Yevgeniy Dodis, Shai Halevi, Ron D. Rothblum, Daniel Wichs
2016/271 (PDF ) Cryptanalysis of the FLIP Family of Stream Ciphers Sébastien Duval, Virginie Lallemand, Yann Rotella
2016/270 (PDF ) Automated Unbounded Analysis of Cryptographic Constructions in the Generic Group Model Miguel Ambrona, Gilles Barthe, Benedikt Schmidt
2016/269 (PDF ) The Adjacency Graphs of Linear Feedback Shift Registers with Primitive-like Characteristic Polynomials Ming Li, Dongdai Lin
2016/268 (PDF ) Efficient Lattice-based Authenticated Encryption: A Practice-Oriented Provable Security Approach Ahmad Boorghany, Siavash Bayat-Sarmadi, Rasool Jalili
2016/267 (PDF ) Improved Meet-in-the-Middle Attacks on Round-Reduced Crypton-256 Yonglin Hao
2016/266 (PDF ) Exact Error Bound of Cox-Rower Architecture for RNS Arithmetic Shinichi Kawamura, Tomoko Yonemura, Yuichi Komano, Hideo Shimizu
2016/265 (PDF ) Multi-prover Proof-of-Retrievability Maura B. Paterson, Douglas R. Stinson, Jalaj Upadhyay
2016/264 (PDF ) How Fast Can Higher-Order Masking Be in Software? Dahmun Goudarzi, Matthieu Rivain
2016/263 (PDF ) Efficient Zero-Knowledge Arguments for Arithmetic Circuits in the Discrete Log Setting Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Jens Groth, Christophe Petit
2016/262 (PDF ) Collaborative Multi-Authority Key-Policy Attribute-Based Encryption for Shorter Keys and Parameters Riccardo Longo, Chiara Marcolla, Massimiliano Sala
2016/261 (PDF ) MEMS-based Gyroscopes as Physical Unclonable Functions Oliver Willers, Christopher Huth, Jorge Guajardo, Helmut Seidel
2016/260 (PDF ) On the Size of Pairing-based Non-interactive Arguments Jens Groth
2016/259 (PDF ) Adaptive Oblivious Transfer and Generalizations Olivier Blazy, Céline Chevalier, Paul Germouty
2016/258 (PDF ) Structure-Preserving Smooth Projective Hashing Olivier Blazy, Céline Chevalier
2016/257 (PDF ) Indistinguishability Obfuscation from Constant-Degree Graded Encoding Schemes Huijia Lin
2016/256 (PDF ) SE-ORAM: A Storage-Efficient Oblivious RAM for Privacy-Preserving Access to Cloud Storage Qiumao Ma, Jinsheng Zhang, Wensheng Zhang, Daji Qiao
2016/255 (PDF ) More Efficient Structure-Preserving Signatures - Or: Bypassing the Type-III Lower Bounds Essam Ghadafi
2016/254 (PDF ) Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts Pierrick Méaux, Anthony Journault, François-Xavier Standaert, Claude Carlet
2016/253 (PDF ) Run-time Accessible DRAM PUFs in Commodity Devices Wenjie Xiong, André Schaller, Nikolaos A. Anagnostopoulos, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser, Jakub Szefer
2016/252 (PDF ) The Exact Round Complexity of Secure Computation Sanjam Garg, Pratyay Mukherjee, Omkant Pandey, Antigoni Polychroniadou
2016/251 (PDF ) Searchable Symmetric Encryption: Optimal Locality in Linear Space via Two-Dimensional Balanced Allocations Gilad Asharov, Moni Naor, Gil Segev, Ido Shahaf
2016/250 (PDF ) Fixed Point Arithmetic in SHE Scheme A. Costache, N. P. Smart, S. Vivek, A. Waller
2016/249 (PDF ) Improved Side-Channel Analysis Attacks on Xilinx Bitstream Encryption of 5, 6, and 7 Series Amir Moradi, Tobias Schneider
2016/248 (PDF ) Invariant subspaces in Simpira Sondre Rønjom
2016/246 (PDF ) LINGUISTIC CRACKING OF PASSPHRASES USING MARKOV CHAINS Peder Sparell, Mikael Simovits
2016/245 (PDF ) DEcryption Contract ENforcement Tool (DECENT): A Practical Alternative to Government Decryption Backdoors Peter Linder
2016/244 (PDF ) Cryptanalysis of Simpira v1 Christoph Dobraunig, Maria Eichlseder, Florian Mendel
2016/243 (PDF ) On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
2016/242 (PDF ) Attribute-Based Signatures for Circuits from Bilinear Map Yusuke Sakai, Nuttapong Attrapadung, Goichiro Hanaoka
2016/241 (PDF ) A trivial debiasing scheme for Helper Data Systems Boris Skoric
2016/240 (PDF ) On Error Distributions in Ring-based LWE Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren
2016/239 (PDF ) Provably Weak Instances of Ring-LWE Revisited Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren
2016/238 (PDF ) Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT Ágnes Kiss, Juliane Krämer, Pablo Rauzy, Jean-Pierre Seifert
2016/237 (PDF ) May-Ozerov Algorithm for Nearest-Neighbor Problem over $\mathbb{F}_{q}$ and Its Application to Information Set Decoding Shoichi Hirose
2016/236 (PDF ) A Distinguisher on PRESENT-Like Permutations with Application to SPONGENT Guoyan Zhang, Meicheng Liu
2016/235 (PDF ) Trading Plaintext-Awareness for Simulatability to Achieve Chosen Ciphertext Security Takahiro Matsuda, Goichiro Hanaoka
2016/234 (PDF ) Trick or Tweak: On the (In)security of OTR’s Tweaks Raphael Bost, Olivier Sanders
2016/233 (PDF ) Smooth NIZK Arguments with Applications to Asymmetric UC-PAKE and Threshold-IBE Charanjit S. Jutla, Arnab Roy
2016/232 (PDF ) Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption Sungwook Kim, Jinsu Kim, Dongyoung Koo, Yuna Kim, Hyunsoo Yoon, Junbum Shin
2016/231 (PDF ) Side-Channel Analysis of Weierstrass and Koblitz Curve ECDSA on Android Smartphones Pierre Belgarric, Pierre-Alain Fouque, Gilles Macario-Rat, Mehdi Tibouchi
2016/230 (PDF ) ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer, Yuval Yarom
2016/229 (PDF ) Key Compression for Isogeny-Based Cryptosystems Reza Azarderakhsh, David Jao, Kassem Kalach, Brian Koziel, Christopher Leonardi
2016/228 (PDF ) On a decentralized trustless pseudo-random number generation algorithm Serguei Popov
2016/227 (PDF ) Process Table Covert Channels: Exploitation and Countermeasures Jean-Michel Cioranesco, Houda Ferradi, Rémi Géraud, David Naccache
2016/226 (PDF ) On Statistically Secure Obfuscation with Approximate Correctness Zvika Brakerski, Chris Brzuska, Nils Fleischhacker
2016/225 (PDF ) A New Birthday-Type Algorithm for Attacking the Fresh Re-Keying Countermeasure Qian Guo, Thomas Johansson
2016/224 (PDF ) CacheBleed: A Timing Attack on OpenSSL Constant Time RSA Yuval Yarom, Daniel Genkin, Nadia Heninger
2016/223 (PDF ) Still Wrong Use of Pairings in Cryptography Mehmet Sabır Kiraz, Osmanbey Uzunkol
2016/222 (PDF ) Time-Memory Trade-Off for Lattice Enumeration in a Ball Paul Kirchner, Pierre-Alain Fouque
2016/221 (PDF ) Post-Compromise Security Katriel Cohn-Gordon, Cas Cremers, Luke Garratt
2016/220 (PDF ) Algorithms on Ideal over Complex Multiplication order Paul Kirchner
2016/219 (PDF ) Nonce-based Kerberos is a Secure Delegated AKE Protocol Jörg Schwenk
2016/218 (PDF ) Semantic Security and Key-Privacy With Random Split of St-Gen Codes Danilo Gligoroski, Simona Samardjiska
2016/217 (PDF ) Practical backward unlinkable revocation in FIDO, German e-ID, Idemix and U-Prove Eric R. Verheul
2016/216 (PDF ) Fair mPSI and mPSI-CA: Efficient Constructions in Prime Order Groups with Security in the Standard Model against Malicious Adversary Sumit Kumar Debnath, Ratna Dutta
2016/215 (PDF ) Algorithms for the Approximate Common Divisor Problem Steven D. Galbraith, Shishay W. Gebregiyorgis, Sean Murphy
2016/214 (PDF ) An Improvement of Both Security and Reliability for Keccak Implementations on Smart Card Pei Luo, Liwei Zhang, Yunsi Fei, A. Adam Ding
2016/213 (PDF ) 3-Message Zero Knowledge Against Human Ignorance Nir Bitansky, Zvika Brakerski, Yael Kalai, Omer Paneth, Vinod Vaikuntanathan
2016/212 (PDF ) Low Linear Complexity Estimates for Coordinate Sequences of Linear Recurrences of Maximal Period over Galois Ring Vadim N. Tsypyschev
2016/211 (PDF ) Randomness Complexity of Private Circuits for Multiplication Sonia Belaïd, Fabrice Benhamouda, Alain Passelègue, Emmanuel Prouff, Adrian Thillard, Damien Vergnaud
2016/210 (PDF ) Hopes, Fears and Software Obfuscation: A Survey Boaz Barak
2016/209 (PDF ) Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA Ling Song, Zhangjie Huang, Qianqian Yang
2016/208 (PDF ) Constant-Round Asynchronous Multi-Party Computation Based on One-Way Functions Sandro Coretti, Juan Garay, Martin Hirt, Vassilis Zikas
2016/207 (PDF ) Fault analysis and weak key-IV attack on Sprout Dibyendu Roy, Sourav Mukhopadhyay
2016/206 (PDF ) Construction of Fully CCA-Secure Predicate Encryptions from Pair Encoding Schemes Johannes Blömer, Gennadij Liske
2016/205 (PDF ) Addressing the Algebraic Eraser Diffie--Hellman Over-the-Air Protocol Derek Atkins, Dorian Goldfeld
2016/204 (PDF ) A Memory Encryption Engine Suitable for General Purpose Processors Shay Gueron
2016/203 (PDF ) White-Box Cryptography in the Gray Box - A Hardware Implementation and its Side Channels Pascal Sasdrich, Amir Moradi, Tim Güneysu
2016/202 (PDF ) An Encryption Scheme based on Random Split of St-Gen Codes Simona Samardjiska, Danilo Gligoroski
2016/201 (PDF ) From Stateful Hardware to Resettable Hardware Using Symmetric Assumptions Nico Doettling, Daniel Kraschewski, Joern Mueller-Quade, Tobias Nilges
2016/200 (PDF ) An Alternative View of the Graph-Induced Multilinear Maps Yilei Chen
2016/199 (PDF ) The Honey Badger of BFT Protocols Andrew Miller, Yu Xia, Kyle Croman, Elaine Shi, Dawn Song
2016/198 (PDF ) Optimizing S-box Implementations for Several Criteria using SAT Solvers Ko Stoffelen
2016/197 (PDF ) Post-quantum Security of the CBC, CFB, OFB, CTR, and XTS Modes of Operation Mayuresh Vivekanand Anand, Ehsan Ebrahimi Targhi, Gelo Noel Tabia, Dominique Unruh
2016/196 (PDF ) Multi-Key FHE from LWE, Revisited Chris Peikert, Sina Shiehian
2016/195 (PDF ) How to Generalize RSA Cryptanalyses Atsushi Takayasu, Noboru Kunihiro
2016/194 (PDF ) How to Share a Secret, Infinitely Ilan Komargodski, Moni Naor, Eylon Yogev
2016/193 (PDF ) Security considerations for Galois non-dual RLWE families Hao Chen, Kristin Lauter, Katherine E. Stange
2016/192 (PDF ) On Negation Complexity of Injections, Surjections and Collision-Resistance in Cryptography Douglas Miller, Adam Scrivener, Jesse Stern, Muthuramakrishnan Venkitasubramaniam
2016/191 (PDF ) Optimal Security Proofs for Signatures from Identification Schemes Eike Kiltz, Daniel Masny, Jiaxin Pan
2016/190 (PDF ) A MAC Mode for Lightweight Block Ciphers Atul Luykx, Bart Preneel, Elmar Tischhauser, Kan Yasuda
2016/189 (PDF ) Yao's millionaires' problem and public-key encryption without computational assumptions Dima Grigoriev, Laszlo B. Kish, Vladimir Shpilrain
2016/188 (PDF ) On the division property of S-boxes Faruk Göloğlu, Vincent Rijmen, Qingju Wang
2016/187 (PDF ) Efficient Secure Multiparty Computation with Identifiable Abort Carsten Baum, Emmanuela Orsini, Peter Scholl
2016/186 (PDF ) Lightweight MDS Generalized Circulant Matrices (Full Version) Meicheng Liu, Siang Meng Sim
2016/185 (PDF ) On the Influence of Message Length in PMAC's Security Bounds Atul Luykx, Bart Preneel, Alan Szepieniec, Kan Yasuda
2016/184 (PDF ) Efficiently Enforcing Input Validity in Secure Two-party Computation Jonathan Katz, Alex J. Malozemoff, Xiao Wang
2016/183 (PDF ) There is Wisdom in Harnessing the Strengths of your Enemy: Customized Encoding to Thwart Side-Channel Attacks -- Extended Version -- Houssem Maghrebi, Victor Servant, Julien Bringer
2016/182 (PDF ) Side-Channel Watchdog: Run-Time Evaluation of Side-Channel Vulnerability in FPGA-Based Crypto-systems Souvik Sonar, Debapriya Basu Roy, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay
2016/181 (PDF ) Cryptographic Properties of Addition Modulo $2^n$ S. M. Dehnavi, A. Mahmoodi Rishakani, M. R. Mirzaee Shamsabad, Hamidreza Maimani, Einollah Pasha
2016/180 (PDF ) Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts Dennis Hofheinz, Tibor Jager, Andy Rupp
2016/179 (PDF ) Computing theta functions in quasi-linear time in genus 2 and above Hugo Labrande, Emmanuel Thomé
2016/178 (PDF ) Integrals go Statistical: Cryptanalysis of Full Skipjack Variants Meiqin Wang, Tingting Cui, Huaifeng Chen, Ling Sun, Long Wen, Andrey Bogdanov
2016/177 (PDF ) Reduced Memory Meet-in-the-Middle Attack against the NTRU Private Key Christine van Vredendaal
2016/175 (PDF ) Online/Offline OR Composition of Sigma Protocols Michele Ciampi, Giuseppe Persiano, Alessandra Scafuro, Luisa Siniscalchi, Ivan Visconti
2016/174 (PDF ) Honey Encryption Beyond Message Recovery Security Joseph Jaeger, Thomas Ristenpart, Qiang Tang
2016/173 (PDF ) Circuit Compilers with O(1/ log(n)) Leakage Rate Marcin Andrychowicz, Stefan Dziembowski, Sebastian Faust
2016/172 (PDF ) All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption Yupeng Zhang, Jonathan Katz, Charalampos Papamanthou
2016/171 (PDF ) Commutativity, Associativity, and Public Key Cryptography Jacques Patarin, Valérie Nachef
2016/170 (PDF ) Fast Learning Requires Good Memory: A Time-Space Lower Bound for Parity Learning Ran Raz
2016/169 (PDF ) Provably Robust Sponge-Based PRNGs and KDFs Peter Gaži, Stefano Tessaro
2016/168 (PDF ) Town Crier: An Authenticated Data Feed for Smart Contracts Fan Zhang, Ethan Cecchetti, Kyle Croman, Ari Juels, Elaine Shi
2016/167 (PDF ) On Bitcoin Security in the Presence of Broken Crypto Primitives Ilias Giechaskiel, Cas Cremers, Kasper Rasmussen
2016/166 (PDF ) Per-Session Security: Password-Based Cryptography Revisited Grégory Demay, Peter Gaži, Ueli Maurer, Björn Tackmann
2016/164 (PDF ) Sanitization of FHE Ciphertexts Léo Ducas, Damien Stehle
2016/163 (PDF ) ZKBoo: Faster Zero-Knowledge for Boolean Circuits Irene Giacomelli, Jesper Madsen, Claudio Orlandi
2016/162 (PDF ) New Negative Results on Differing-Inputs Obfuscation Mihir Bellare, Igors Stepanovs, Brent Waters
2016/161 (PDF ) Revisiting Structure Graphs: Applications to CBC-MAC and EMAC Ashwin Jha, Mridul Nandi
2016/160 (PDF ) Polytopic Cryptanalysis Tyge Tiessen
2016/159 (PDF ) Pseudoentropy: Lower-bounds for Chain rules and Transformations Krzysztof Pietrzak, Maciej Skorski
2016/158 (PDF ) A Subgradient Algorithm For Computational Distances and Applications to Cryptography Maciej Skórski
2016/157 (PDF ) Key Derivation for Squared-Friendly Applications: Lower Bounds Maciej Skorski
2016/156 (PDF ) More Efficient Constant-Round Multi-Party Computation from BMR and SHE Yehuda Lindell, Nigel P. Smart, Eduardo Soria-Vazquez
2016/155 (PDF ) Cryptanalysis of Multi-Prime $\Phi$-Hiding Assumption Jun Xu, Lei Hu, Santanu Sarkar, Xiaona Zhang, Zhangjie Huang, Liqiang Peng
2016/154 (PDF ) Highly-Efficient Fully-Anonymous Dynamic Group Signatures David Derler, Daniel Slamanig
2016/153 (PDF ) Differentially Private Password Frequency Lists Jeremiah Blocki, Anupam Datta, Joseph Bonneau
2016/152 (PDF ) Attacks and parameter choices in HIMMO Oscar Garcia-Morchon, Ronald Rietman, Ludo Tolhuizen, Jose-Luis Torre-Arce, Moon Sung Lee, Domingo Gomez-Perez, Jaime Gutierrez, Berry Schoenmakers
2016/151 (PDF ) Pseudorandom Functions in Almost Constant Depth from Low-Noise LPN Yu Yu, John Steinberger
2016/150 (PDF ) On Garbling Schemes with and without Privacy Carsten Baum
2016/149 (PDF ) Improved Integral and Zero-correlation Linear Cryptanalysis of Reduced-round CLEFIA Block Cipher Wentan Yi, Shaozhen Chen
2016/148 (PDF ) Isogeny-based Quantum-resistant Undeniable Blind Signature Scheme Srinath M. S., V. Chandrasekaran
2016/147 (PDF ) Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13 Eric Miles, Amit Sahai, Mark Zhandry
2016/146 (PDF ) Improved Progressive BKZ Algorithms and their Precise Cost Estimation by Sharp Simulator Yoshinori Aono, Yuntao Wang, Takuya Hayashi, Tsuyoshi Takagi
2016/145 (PDF ) Designing Proof of Human-work Puzzles for Cryptocurrency and Beyond Jeremiah Blocki, Hong-Sheng Zhou
2016/144 (PDF ) Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online) Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk, Jiayu Xu
2016/143 (PDF ) On upper bounds for algebraic degrees of APN functions Lilya Budaghyan, Claude Carlet, Tor Helleseth, Nian Li, Bo Sun
2016/142 (PDF ) Hash-Function based PRFs: AMAC and its Multi-User Security Mihir Bellare, Daniel J. Bernstein, Stefano Tessaro
2016/141 (PDF ) On low degree polynomials in 2-round AES Igor Semaev
2016/140 (PDF ) Adaptively Secure Identity-Based Encryption from Lattices with Asymptotically Shorter Public Parameters Shota Yamada
2016/139 (PDF ) An Algorithm for NTRU Problems and Cryptanalysis of the GGH Multilinear Map without a Low Level Encoding of Zero Jung Hee Cheon, Jinhyuck Jeong, Changmin Lee
2016/138 (PDF ) A new algorithm for residue multiplication modulo $2^{521}-1$ Shoukat Ali, Murat Cenk
2016/137 (PDF ) Rate-1, Linear Time and Additively Homomorphic UC Commitments Ignacio Cascudo, Ivan Damgård, Bernardo David, Nico Döttling, Jesper Buus Nielsen
2016/136 (PDF ) Automatic Expectation and Variance Computing for Attacks on Feistel Schemes Emmanuel Volte, Valérie Nachef, Nicolas Marrière
2016/135 (PDF ) Cryptanalysis of the New CLT Multilinear Map over the Integers Jung Hee Cheon, Pierre-Alain Fouque, Changmin Lee, Brice Minaud, Hansol Ryu
2016/134 (PDF ) More Practical and Secure History-Independent Hash Tables Michael T. Goodrich, Evgenios M. Kornaropoulos, Michael Mitzenmacher, Roberto Tamassia
2016/133 (PDF ) On the nonlinearity of monotone Boolean functions Claude Carlet
2016/132 (PDF ) Cryptanalysis of 6-round PRINCE using 2 Known Plaintexts Shahram Rasoolzadeh, Håvard Raddum
2016/131 (PDF ) New Attacks on the Concatenation and XOR Hash Combiners Itai Dinur
2016/130 (PDF ) On the Computation of the Optimal Ate Pairing at the 192-bit Security Level Loubna Ghammam, Emmanuel Fouotsa
2016/129 (PDF ) ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer
2016/128 (PDF ) Removing the Strong RSA Assumption from Arguments over the Integers Geoffroy Couteau, Thomas Peters, David Pointcheval
2016/127 (PDF ) A subfield lattice attack on overstretched NTRU assumptions: Cryptanalysis of some FHE and Graded Encoding Schemes Martin Albrecht, Shi Bai, Léo Ducas
2016/126 (PDF ) Server Notaries: A Complementary Approach to the Web PKI Trust Model Emre Yüce, Ali Aydın Selçuk
2016/125 (PDF ) Compact Identity Based Encryption from LWE Daniel Apon, Xiong Fan, Feng-Hao Liu
2016/124 (PDF ) Collecting relations for the Number Field Sieve in $GF(p^6)$ Pierrick Gaudry, Laurent Grémy, Marion Videau
2016/123 (PDF ) Robust Password-Protected Secret Sharing Michel Abdalla, Mario Cornejo, Anca Nitulescu, David Pointcheval
2016/122 (PDF ) Simpira v2: A Family of Efficient Permutations Using the AES Round Function Shay Gueron, Nicky Mouha
2016/120 (PDF ) Oblivious Transfer from Any Non-Trivial Elastic Noisy Channels via Secret Key Agreement Ignacio Cascudo, Ivan Damgård, Felipe Lacerda, Samuel Ranellucci
2016/119 (PDF ) Lightweight Multiplication in GF(2^n) with Applications to MDS Matrices Christof Beierle, Thorsten Kranz, Gregor Leander
2016/118 (PDF ) Circuit-ABE from LWE: Unbounded Attributes and Semi-Adaptive Security Zvika Brakerski, Vinod Vaikuntanathan
2016/117 (PDF ) Circular Security Separations for Arbitrary Length Cycles from LWE Venkata Koppula, Brent Waters
2016/116 (PDF ) Interactive Oracle Proofs Eli Ben-Sasson, Alessandro Chiesa, Nicholas Spooner
2016/115 (PDF ) Efficiently Computing Data-Independent Memory-Hard Functions Joel Alwen, Jeremiah Blocki
2016/114 (PDF ) The Magic of ELFs Mark Zhandry
2016/113 (PDF ) On the Composition of Two-Prover Commitments, and Applications to Multi-Round Relativistic Commitments Serge Fehr, Max Fillinger
2016/112 (PDF ) On the (In)security of SNARKs in the Presence of Oracles Dario Fiore, Anca Nitulescu
2016/111 (PDF ) Scalable and Secure Logistic Regression via Homomorphic Encryption Yoshinori Aono, Takuya Hayashi, Le Trieu Phong, Lihua Wang
2016/110 (PDF ) Three's Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWE Navid Alamati, Chris Peikert
2016/109 (PDF ) Fast Multiparty Multiplications from shared bits Ivan Damgård, Tomas Toft, Rasmus Winther Zakarias
2016/108 (PDF ) An Efficient Toolkit for Computing Private Set Operations Alex Davidson, Carlos Cid
2016/107 (PDF ) Fully Anonymous Transferable Ecash Hitesh Tewari, Arthur Hughes
2016/106 (PDF ) Access Control Encryption: Enforcing Information Flow with Cryptography Ivan Damgård, Helene Haagh, Claudio Orlandi
2016/105 (PDF ) Can there be efficient and natural FHE schemes? Kristian Gjøsteen, Martin Strand
2016/104 (PDF ) Open Sesame: The Password Hashing Competition and Argon2 Jos Wetzels
2016/103 (PDF ) Speed Optimizations in Bitcoin Key Recovery Attacks Nicolas Courtois, Guangyan Song, Ryan Castellucci
2016/102 (PDF ) Breaking the Sub-Exponential Barrier in Obfustopia Sanjam Garg, Omkant Pandey, Akshayaram Srinivasan, Mark Zhandry
2016/101 (PDF ) Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions Benoit Libert, San Ling, Fabrice Mouhartem, Khoa Nguyen, Huaxiong Wang
2016/100 (PDF ) On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model Joël Alwen, Binyi Chen, Chethan Kamath, Vladimir Kolmogorov, Krzysztof Pietrzak, Stefano Tessaro
2016/099 (PDF ) Attribute-Based Fully Homomorphic Encryption with a Bounded Number of Inputs Michael Clear, Ciaran McGoldrick
2016/098 (PDF ) Haraka v2 - Efficient Short-Input Hashing for Post-Quantum Applications Stefan Kölbl, Martin M. Lauridsen, Florian Mendel, Christian Rechberger
2016/097 (PDF ) A Maiorana-McFarland Construction of a GBF on Galois ring Shashi Kant Pandey, P. R. Mishra, B. K. Dass
2016/096 (PDF ) Provable Security Evaluation of Structures against Impossible Differential and Zero Correlation Linear Cryptanalysis Bing Sun, Meicheng Liu, Jian Guo, Vincent Rijmen, Ruilin Li
2016/095 (PDF ) Obfuscation without Multilinear Maps Dingfeng Ye, Peng Liu
2016/094 (PDF ) Tightly CCA-Secure Encryption without Pairings Romain Gay, Dennis Hofheinz, Eike Kiltz, Hoeteck Wee
2016/093 (PDF ) Valiant's Universal Circuit is Practical Ágnes Kiss, Thomas Schneider
2016/092 (PDF ) Cryptanalysis of the Full Spritz Stream Cipher Subhadeep Banik, Takanori Isobe
2016/091 (PDF ) On the Security of the Algebraic Eraser Tag Authentication Protocol Simon R. Blackburn, M. J. B. Robshaw
2016/090 (PDF ) Spectral characterization of iterating lossy mappings Joan Daemen
2016/089 (PDF ) On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack Johannes Buchmann, Florian Göpfert, Rachel Player, Thomas Wunderer
2016/088 (PDF ) On Linear Hulls and Trails Tomer Ashur, Vincent Rijmen
2016/087 (PDF ) Safely Exporting Keys from Secure Channels: On the Security of EAP-TLS and TLS Key Exporters Chris Brzuska, Håkon Jacobsen, Douglas Stebila
2016/086 (PDF ) Intel SGX Explained Victor Costan, Srinivas Devadas
2016/085 (PDF ) Cryptanalysis of ring-LWE based key exchange with key share reuse Scott Fluhrer
2016/084 (PDF ) Truncated Differential Analysis of Round-Reduced RoadRunneR Block Cipher Qianqian Yang, Lei Hu, Siwei Sun, Ling Song
2016/083 (PDF ) NSEC5 from Elliptic Curves: Provably Preventing DNSSEC Zone Enumeration with Shorter Responses Sharon Goldberg, Moni Naor, Dimitrios Papadopoulos, Leonid Reyzin
2016/082 (PDF ) Non-Interactive Plaintext (In-)Equality Proofs and Group Signatures with Verifiable Controllable Linkability Olivier Blazy, David Derler, Daniel Slamanig, Raphael Spreitzer
2016/081 (PDF ) A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila
2016/080 (PDF ) Cryptanalysis of PRINCE with Minimal Data Shahram Rasoolzadeh, Håvard Raddum
2016/079 (PDF ) Protect both Integrity and Confidentiality in Outsourcing Collaborative Filtering Computations Qiang Tang, Balazs Pejo, Husen Wang
2016/078 (PDF ) Non-Interactive Verifiable Secret Sharing For Monotone Circuits Ge Bai, Ivan Damgård, Claudio Orlandi, Yu Xia
2016/077 (PDF ) Improved Multi-Dimensional Meet-in-the-Middle Cryptanalysis of KATAN Shahram Rasoolzadeh, Håvard Raddum
2016/076 (PDF ) New Efficient and Flexible Algorithms for Secure Outsourcing of Bilinear Pairings Xi-Jun Lin, Haipeng Qu, Xiaoshuai Zhang
2016/075 (PDF ) Weaknesses in Hadamard Based Symmetric Key Encryption Schemes Gajraj Kuldeep, Devendra Kumar Yadav, A. K. Sharma
2016/074 (PDF ) On the Power of Secure Two-Party Computation Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
2016/073 (PDF ) MU-ORAM: Dealing with Stealthy Privacy Attacks in Multi-User Data Outsourcing Services Jinsheng Zhang, Wensheng Zhang, Daji Qiao
2016/072 (PDF ) Downgrade Resilience in Key-Exchange Protocols Karthikeyan Bhargavan, Chris Brzuska, Cédric Fournet, Matthew Green, Markulf Kohlweiss, Santiago Zanella-Béguelin
2016/071 (PDF ) Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1 (Full Version) Alex Biryukov, Léo Perrin, Aleksei Udovenko
2016/070 (PDF ) Domain-Specific Pseudonymous Signatures Revisited Kamil Kluczniak
2016/069 (PDF ) Verification Methods for the Computationally Complete Symbolic Attacker Based on Indistinguishability Gergei Bana, Rohit Chadha
2016/067 (PDF ) OPFE: Outsourcing Computation for Private Function Evaluation Henry Carter, Patrick Traynor
2016/066 (PDF ) Linear Hull Attack on Round-Reduced Simeck with Dynamic Key-guessing Techniques Lingyue Qin, Huaifeng Chen, Xiaoyun Wang
2016/065 (PDF ) A note on Tensor Simple Matrix Encryption Scheme Yasufumi Hashimoto
2016/064 (PDF ) Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness Yohei Watanabe, Goichiro Hanaoka, Junji Shikata
2016/063 (PDF ) Analysing and Exploiting the Mantin Biases in RC4 Remi Bricout, Sean Murphy, Kenneth G. Paterson, Thyla van der Merwe
2016/062 (PDF ) Verifiable Dynamic Symmetric Searchable Encryption: Optimality and Forward Security Raphael Bost, Pierre-Alain Fouque, David Pointcheval
2016/061 (PDF ) Accountable Privacy for Decentralized Anonymous Payments Christina Garman, Matthew Green, Ian Miers
2016/060 (PDF ) Automated key setup and recovery from key exposure for power networks Amir Herzberg, Yehonatan Kfir
2016/059 (PDF ) Secure positioning and quantum non-local correlations Muhammad Nadeem
2016/058 (PDF ) New Lattice Attacks on DSA Schemes Dimitrios Poulakis
2016/057 (PDF ) On the Architectural Analysis of Arbiter Delay PUF Variants DURGA PRASAD SAHOO, PHUONG HA NGUYEN, RAJAT SUBHRA CHAKRABORTY, DEBDEEP MUKHOPADHYA
2016/056 (PDF ) Blindly Signed Contracts: Anonymous On-Blockchain and Off-Blockchain Bitcoin Transactions Ethan Heilman, Foteini Baldimtsi, Sharon Goldberg
2016/055 (PDF ) Attacking NTP's Authenticated Broadcast Mode Aanchal Malhotra, Sharon Goldberg
2016/054 (PDF ) Fully Homomorphic Public-Key Encryption with Two Ciphertexts based on Discrete Logarithm Problem Masahiro Yagisawa
2016/053 (PDF ) Speed and Area Optimized Parallel Higher-Radix Modular Multipliers khalid Javeed, Xiaojun Wang
2016/052 (PDF ) Fault-Tolerant Aggregate Signatures Gunnar Hartung, Björn Kaidel, Alexander Koch, Jessica Koch, Andy Rupp
2016/051 (PDF ) Capacity and Data Complexity in Multidimensional Linear Attack Jialin Huang, Serge Vaudenay, Xuejia Lai, Kaisa Nyberg
2016/050 (PDF ) Improved Fully Homomorphic Encryption with Composite Number Modulus Masahiro Yagisawa
2016/049 (PDF ) Implementing a Toolkit for Ring-LWE Based Cryptography in Arbitrary Cyclotomic Number Fields Christoph M. Mayer
2016/048 (PDF ) Better Preprocessing for Secure Multiparty Computation Carsten Baum, Ivan Damgård, Tomas Toft, Rasmus Zakarias
2016/047 (PDF ) Comb to Pipeline: Fast Software Encryption Revisited Andrey Bogdanov, Martin M. Lauridsen, Elmar Tischhauser
2016/046 (PDF ) How To Simulate It - A Tutorial on the Simulation Proof Technique Yehuda Lindell
2016/045 (PDF ) New Approaches for Secure Outsourcing Algorithm for Modular Exponentiations Xi-Jun Lin, Lin Sun, Haipeng Qu, Xiaoshuai Zhang
2016/044 (PDF ) Defeating the Ben-Zvi, Blackburn, and Tsaban Attack on the Algebraic Eraser Iris Anshel, Derek Atkins, Dorian Goldfeld, Paul E. Gunnells
2016/043 (PDF ) Strong Continuous Non-malleable Encoding Schemes with Tamper-Detection Amir S. Mortazavi, Mahmoud Salmasizadeh, Amir Daneshgar
2016/042 (PDF ) Neeva: A Lightweight Hash Function Khushboo Bussi, Dhananjoy Dey, Manoj Kumar, B. K. Dass
2016/041 (PDF ) A NEW UNLINKABLE SECRET HANDSHAKES SCHEME BASED ON ZSS Preeti Kulshrestha, Arun Kumar
2016/039 (PDF ) Standard quantum bit commitment – an indefinite commitment time Muhammad Nadeem
2016/038 (PDF ) Collateral Damage in Online Social Networks: computing the significance of information collection Iraklis Symeonids, Bart Preneel
2016/037 (PDF ) A Framework for Outsourcing of Secure Computation Thomas P. Jakobsen, Jesper Buus Nielsen, Claudio Orlandi
2016/036 (PDF ) Characterizations of the Degraded Boolean Function and Cryptanalysis of the SAFER Family wentan Yi, Shaozhen Chen
2016/035 (PDF ) Simple Proofs of Space-Time and Rational Proofs of Storage Tal Moran, Ilan Orlov
2016/034 (PDF ) Universal Composition with Responsive Environments Jan Camenisch, Robert R. Enderlein, Stephan Krenn, Ralf Kuesters, Daniel Rausch
2016/033 (PDF ) Towards a Unified Security Model for Physically Unclonable Functions Frederik Armknecht, Daisuke Moriyama, Ahmad-Reza Sadeghi, Moti Yung
2016/032 (PDF ) On the Leakage-Resilient Key Exchange Janaka Alawatugoda
2016/031 (PDF ) Beyond the selective disclosure of ABCs on RAM-constrained devices Antonio de la Piedra
2016/030 (PDF ) An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation Sedat Akleylek, Nina Bindel, Johannes Buchmann, Juliane Krämer, Giorgia Azzurra Marson
2016/029 (PDF ) Simple SIMON: FPGA implementations of the SIMON 64/128 Block Cipher Jos Wetzels, Wouter Bokslag
2016/028 (PDF ) Sponges and Engines: An introduction to Keccak and Keyak Jos Wetzels, Wouter Bokslag
2016/027 (PDF ) Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks Dan Boneh, Henry Corrigan-Gibbs, Stuart Schechter
2016/026 (PDF ) A Practical Template Attack on MICKEY-128 2.0 Using PSO Generated IVs and LS-SVM Abhishek Chakraborty, Debdeep Mukhopadhyay
2016/025 (PDF ) Human-readable Proof of the Related-Key Security of AES-128 Khoongming Khoo, Eugene Lee, Thomas Peyrin, Siang Meng Sim
2016/024 (PDF ) Refund attacks on Bitcoin’s Payment Protocol Patrick McCorry, Siamak F. Shahandashti, Feng Hao
2016/023 (PDF ) Improved on an improved remote user authentication scheme with key agreement Yalin Chen, Jue-Sam Chou, I - Chiung Liao
2016/022 (PDF ) On derivatives of polynomials over finite fields through integration Enes Pasalic, Amela Muratovic-Ribic, Samir Hodzic, Sugata Gangopadhyay
2016/021 (PDF ) Quasi-Linear Size Zero Knowledge from Linear-Algebraic PCPs Eli Ben-Sasson, Alessandro Chiesa, Ariel Gabizon, Madars Virza
2016/020 (PDF ) Truncated Differential Based Known-Key Attacks on Round-Reduced Simon Yonglin Hao, Willi Meier
2016/019 (PDF ) Analysis of Gong et al.'s CCA2-Secure Homomorphic Encryption Hyung Tae Lee, San Ling, Huaxiong Wang
2016/018 (PDF ) Private Functional Encryption: Indistinguishability-Based Definitions and Constructions from Obfuscation Afonso Arriaga, Manuel Barbosa, Pooya Farshim
2016/017 (PDF ) Valiant's Universal Circuit: Improvements, Implementation, and Applications Helger Lipmaa, Payman Mohassel, Saeed Sadeghian
2016/016 (PDF ) A trustless privacy-preserving reputation system Alexander Schaub, Rémi Bazin, Omar Hasan, Lionel Brunie
2016/015 (PDF ) Quantum Collision-Resistance of Non-Uniformly Distributed Functions Ehsan Ebrahimi Targhi, Gelo Noel Tabia, Dominique Unruh
2016/014 (PDF ) Foundations of Hardware-Based Attested Computation and Application to SGX Manuel Barbosa, Bernardo Portela, Guillaume Scerri, Bogdan Warinschi
2016/013 (PDF ) Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security Rosario Gennaro, Steven Goldfeder, Arvind Narayanan
2016/012 (PDF ) Cryptography for Big Data Security Ariel Hamlin, Nabil Schear, Emily Shen, Mayank Varia, Sophia Yakoubov, Arkady Yerukhimovich
2016/011 (PDF ) Better Security for Functional Encryption for Inner Product Evaluations Michel Abdalla, Florian Bourse, Angelo De Caro, David Pointcheval
2016/010 (PDF ) Eliminating Decryption Failures from the Simple Matrix Encryption Scheme Albrecht Petzoldt, Jintai Ding, Lih-Chung Wang
2016/009 (PDF ) PUF-BASED SOLUTIONS FOR SECURE COMMUNICATIONS IN ADVANCED METERING INFRASTRUCTURE (AMI) Mahshid Delavar, Sattar Mirzakuchaki, Mohammad Hassan Ameri, Javad Mohajeri
2016/008 (PDF ) cMix: Mixing with Minimal Real-Time Asymmetric Cryptographic Operations David Chaum, Debajyoti Das, Farid Javani, Aniket Kate, Anna Krasnova, Joeri de Ruiter, Alan T. Sherman
2016/007 (PDF ) Easing Coppersmith Methods using Analytic Combinatorics: Applications to Public-Key Cryptography with Weak Pseudorandomness Fabrice Benhamouda, Céline Chevalier, Adrian Thillard, Damien Vergnaud
2016/006 (PDF ) Indistinguishability Obfuscation with Non-trivial Efficiency Huijia Lin, Rafael Pass, Karn Seth, Sidharth Telang
2016/005 (PDF ) A Columnar Transposition cipher in a contemporary setting. John Jones
2016/004 (PDF ) Bounding basis reduction properties Arnold Neumaier
2016/003 (PDF ) On Splitting a Point with Summation Polynomials in Binary Elliptic Curves Nicolas T. Courtois
2016/002 (PDF ) Remote Cache-Timing Attack without Learning Phase Ali Can Atici, Cemal Yilmaz, Erkay Savas
2016/001 (PDF ) Improved on an efficient user authentication scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment Yalin Chen, Jue-Sam Chou, Hung-Sheng Wu
2015/1256 (PDF ) Mitigating Multi-Target Attacks in Hash-based Signatures Andreas Hülsing, Joost Rijneveld, Fang Song
2015/1255 (PDF ) Functional Encryption for Inner Product with Full Function Privacy Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
2015/1254 (PDF ) Identity-based Hierarchical Key-insulated Encryption without Random Oracles Yohei Watanabe, Junji Shikata
2015/1253 (PDF ) Non-Malleable Functions and Their Applications Yu Chen, Baodong Qin, Jiang Zhang, Yi Deng, Sherman S. M. Chow
2015/1252 (PDF ) Improved Test Pattern Generation for Hardware Trojan Detection using Genetic Algorithm and Boolean Satisfiability Sayandeep Saha, Rajat Subhra Chakraborty, Srinivasa Shashank Nuthakki, Anshul, Debdeep Mukhopadhyay
2015/1251 (PDF ) Comment on Quantum Cryptography---Which is More Important, Signal Security, Information Security or Communication Reliability Zhengjun Cao, Zhenfu Cao
2015/1250 (PDF ) Adaptively Secure Garbled Circuits from One-Way Functions Brett Hemenway, Zahra Jafargholi, Rafail Ostrovsky, Alessandra Scafuro, Daniel Wichs
2015/1249 (PDF ) Trap Me If You Can -- Million Dollar Curve Thomas Baignères, Cécile Delerablée, Matthieu Finiasz, Louis Goubin, Tancrède Lepoint, Matthieu Rivain
2015/1248 (PDF ) Generic Transformation of a CCA2-Secure Public-Key Encryption Scheme to an eCK-Secure Key Exchange Protocol in the Standard Model Janaka Alawatugoda
2015/1247 (PDF ) Missing a trick: Karatsuba variations Mike Scott
2015/1246 (PDF ) Universally Composable Direct Anonymous Attestation Jan Camenisch, Manu Drijvers, Anja Lehmann
2015/1245 (PDF ) Variation of GGH15 Multilinear Maps Gu Chunsheng
2015/1244 (PDF ) On values of vectorial Boolean functions and related problems in APN functions George Shushuev
2015/1243 (PDF ) Verifiable ASICs Riad S. Wahby, Max Howald, Siddharth Garg, abhi shelat, Michael Walfish
2015/1242 (PDF ) Quantum Cryptography Beyond Quantum Key Distribution Anne Broadbent, Christian Schaffner
2015/1241 (PDF ) Verifiable side-channel security of cryptographic implementations: constant-time MEE-CBC José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir
2015/1239 (PDF ) Secure Goods Supply Chain and Key Exchange with Virtual Proof of Reality Yansong Gao, Damith C. Ranasinghe, Said F. Al-Sarawi, Derek Abbott
2015/1238 (PDF ) Asynchronous Secure Multiparty Computation in Constant Time Ran Cohen
2015/1237 (PDF ) On the Security of One Password Authenticated Key Exchange Protocol Stanislav V. Smyshlyaev, Igor B. Oshkin, Evgeniy K. Alekseev, Liliya R. Ahmetzyanova
2015/1236 (PDF ) A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-Dimensional Side-Channel Attacks Liron David, Avishai Wool
2015/1235 (PDF ) Constant-round Leakage-resilient Zero-knowledge from Collision Resistance Susumu Kiyoshima
2015/1234 (PDF ) On Cryptographic Anonimity and Unpredicatbility in Secret Sharing Ruxandra Olimid, Anat Paskin-Cherniavsky
2015/1233 (PDF ) Degenerate Curve Attacks Samuel Neves, Mehdi Tibouchi
2015/1232 (PDF ) Extend FHEW to General Case Zhou Tanping, Liu Longfei, Yang Xiaoyuan, Han Yiliang
2015/1231 (PDF ) When are Identification Protocols with Sparse Challenges Safe? The Case of the Coskun and Herley Attack Hassan Jameel Asghar, Mohamed Ali Kaafar
2015/1230 (PDF ) Indistinguishable Proofs of Work or Knowledge Foteini Baldimtsi, Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang
2015/1229 (PDF ) Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction Jintai Ding, Momonari Kudo, Shinya Okumura, Tsuyoshi Takagi, Chengdong Tao
2015/1228 (PDF ) Privacy protection in electronic education based on polymorphic pseudonymization Eric R. Verheul
2015/1227 (PDF ) Single Key Recovery Attacks on 9-round Kalyna-128/256 and Kalyna-256/512 Akshima, Donghoon Chang, Mohona Ghosh, Aarushi Goel, Somitra Kumar Sanadhya
2015/1226 (PDF ) Cryptoleq: A Heterogeneous Abstract Machine for Encrypted and Unencrypted Computation Oleg Mazonka, Nektarios Georgios Tsoutsos, Michail Maniatakos
2015/1225 (PDF ) ECC on Your Fingertips: A Single Instruction Approach for Lightweight ECC Design in GF (p) Debapriya Basu Roy, Poulami Das, Debdeep Mukhopadhyay
2015/1224 (PDF ) Twisted Polynomials and Forgery Attacks on GCM Mohamed Ahmed Abdelraheem, Peter Beelen, Andrey Bogdanov, Elmar Tischhauser
2015/1223 (PDF ) Chosen-Ciphertext Security from Subset Sum Sebastian Faust, Daniel Masny, Daniele Venturi
2015/1222 (PDF ) On the Asymptotic Complexity of Solving LWE Gottfried Herold, Elena Kirshanova, Alexander May
2015/1220 (PDF ) Two-Round Man-in-the-Middle Security from LPN David Cash, Eike Kiltz, Stefano Tessaro
2015/1219 (PDF ) Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks Michel Abdalla, Sonia Belaïd, David Pointcheval, Sylvain Ruhault, Damien Vergnaud
2015/1217 (PDF ) Two-faced processes and existence of RNG with proven properties Boris Ryabko
2015/1216 (PDF ) Non-Transferable Proxy Re-Encryption Hui Guo, Zhenfeng Zhang, Jing Xu
2015/1215 (PDF ) Simpler, Faster, and More Robust T-test Based Leakage Detection A. Adam Ding, Cong Chen, Thomas Eisenbarth
2015/1214 (PDF ) Simple Security Definitions for and Constructions of 0-RTT Key Exchange Britta Hale, Tibor Jager, Sebastian Lauer, Jörg Schwenk
2015/1213 (PDF ) Footprint scheduling for Dining-Cryptographer networks Anna Krasnova, Moritz Neikes, Peter Schwabe
2015/1212 (PDF ) Choosing and generating parameters for low level pairing implementation on BN curves Sylvain Duquesne, Nadia El Mrabet, Safia Haloui, Franck Rondepierre
2015/1211 (PDF ) Log Analysis of Estonian Internet Voting 2013--2015 Sven Heiberg, Arnis Parsovs, Jan Willemson
2015/1210 (PDF ) Quantum Security of the Fujisaki-Okamoto and OAEP Transforms Ehsan Ebrahimi Targhi, Dominique Unruh
2015/1209 (PDF ) Fast Optimistically Fair Cut-and-Choose 2PC Alptekin Kupcu, Payman Mohassel
2015/1208 (PDF ) Two Kinds of Biclique Attacks on Lightweight Block Cipher PRINCE Zheng Yuan, Zhen Peng, Haiwen Ou
2015/1207 (PDF ) Comment on Demonstrations of Shor's Algorithm in the Past Decades Zhengjun Cao, Zhenfu Cao, Lihua Liu
2015/1206 (PDF ) Simple Photonic Emission Attack with Reduced Data Complexity Elad Carmon, Jean-Pierre Seifert, Avishai Wool
2015/1205 (PDF ) Deniable Functional Encryption Angelo De Caro, Vincenzo Iovino, Adam O'Neill
2015/1204 (PDF ) Secret, verifiable auctions from elections Elizabeth A. Quaglia, Ben Smyth
2015/1203 (PDF ) The graph of minimal distances of bent functions and its properties Nikolay Kolomeec
2015/1202 (PDF ) CCA Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts Kwangsu Lee, Dong Hoon Lee, Jong Hwan Park, Moti Yung
2015/1201 (PDF ) A Star-based Independent Biclique Attack on Full Rounds SQUARE Zheng Yuan, Zhen Peng, Ming Mao
2015/1200 (PDF ) Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates Christoph Dobraunig, Maria Eichlseder, Florian Mendel
2015/1199 (PDF ) A compression method for homomorphic ciphertexts S. Carpov, R. Sirdey
2015/1198 (PDF ) Symmetric and Dual PRFs from Standard Assumptions: A Generic Validation of an HMAC Assumption Mihir Bellare, Anna Lysyanskaya
2015/1197 (PDF ) On-the-fly Homomorphic Batching/Unbatching Yarkın Doröz, Berk Sunar, Gizem S. Çetin
2015/1196 (PDF ) Secure Distributed Computation on Private Inputs Geoffroy Couteau, Thomas Peters, David Pointcheval
2015/1195 (PDF ) ARITHMETIC USING WORD-WISE HOMOMORPHIC ENCRYPTION Gizem S. Cetin, Yarkin Doroz, Berk Sunar, William J. Martin
2015/1194 (PDF ) HOMOMORPHIC AUTOCOMPLETE Gizem S. Çetin, Wei Dai, Yarkın Doröz, Berk Sunar
2015/1193 (PDF ) Collision Attacks against CAESAR Candidates -- Forgery and Key-Recovery against AEZ and Marble Thomas Fuhr, Gaëtan Leurent, Valentin Suder
2015/1192 (PDF ) A Guide to Fully Homomorphic Encryption Frederik Armknecht, Colin Boyd, Christopher Carr, Kristian Gjøsteen, Angela Jäschke, Christian A. Reuter, Martin Strand
2015/1191 (PDF ) A Formal Analysis of Prefetching in Profiled Cache-Timing Attacks on Block Ciphers Chester Rebeiro, Debdeep Mukhopadhyay
2015/1190 (PDF ) Private Large-Scale Databases with Distributed Searchable Symmetric Encryption Yuval Ishal, Eyal Kushilevitz, Steve Lu, Rafail Ostrovsky
2015/1189 (PDF ) Invariant Subspace Attack Against Full Midori64 Jian Guo, Jérémy Jean, Ivica Nikolić, Kexin Qiao, Yu Sasaki, Siang Meng Sim
2015/1188 (PDF ) Compact Attribute-Based Encryption and Signcryption for General Circuits from Multilinear Maps Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
2015/1187 (PDF ) On an almost-universal hash function family with applications to authentication and secrecy codes Khodakhast Bibak, Bruce M. Kapron, Venkatesh Srinivasan, László Tóth
2015/1186 (PDF ) Restricted linear congruences Khodakhast Bibak, Bruce M. Kapron, Venkatesh Srinivasan, Roberto Tauraso, László Tóth
2015/1185 (PDF ) Efficient Pseudorandom Functions via On-the-Fly Adaptation Nico Doettling, Dominique Schröder
2015/1184 (PDF ) Extension Field Cancellation: a New Central Trapdoor for Multivariate Quadratic Systems Alan Szepieniec, Jintai Ding, Bart Preneel
2015/1183 (PDF ) Authenticated Range \& Closest Point Queries in Zero-Knowledge Esha Ghosh, Olga Ohrimenko, Roberto Tamassia
2015/1182 (PDF ) Chaskey: a MAC Algorithm for Microcontrollers -- Status Update and Proposal of Chaskey-12 -- Nicky Mouha
2015/1181 (PDF ) Construction of Transition Matrices for Binary FCSRs Zhiqiang Lin, Dingyi Pei, Dongdai Lin
2015/1180 (PDF ) Secure Comparator: a ZKP-Based Authentication System Ignat Korchagin, Eugene Pilyankevich
2015/1179 (PDF ) A construction of 3-dimensional lattice sieve for number field sieve over F_{p^n} Kenichiro Hayasaka, Kazumaro Aoki, Tetsutaro Kobayashi, Tsuyoshi Takagi
2015/1178 (PDF ) Textbook Non-Malleable Commitments Vipul Goyal, Omkant Pandey, Silas Richelson
2015/1177 (PDF ) On the CCA (in)security of MTProto Jakob Jakobsen, Claudio Orlandi
2015/1176 (PDF ) On the Efficiency of FHE-based Private Queries Myungsun Kim, Hyung Tae Lee, San Ling, Huaxiong Wang
2015/1175 (PDF ) Improved Data Confidentiality of Audit Trail Data in Multi-Tenant Cloud Bhanu Prakash Gopularam, Nalini. N
2015/1174 (PDF ) On Data Complexity of Distinguishing Attacks vs. Message Recovery Attacks on Stream Ciphers Goutam Paul, Souvik Ray
2015/1173 (PDF ) Secure Multiparty Computation with General Interaction Patterns Shai Halevi, Yuval Ishai, Abhishek Jain, Eyal Kushilevitz, Tal Rabin
2015/1170 (PDF ) Characterizing NTRU-Variants Using Group Ring and Evaluating their Lattice Security Takanori Yasuda, Xavier Dahan, Kouichi Sakurai
2015/1169 (PDF ) Strength in Numbers: Threshold ECDSA to Protect Keys in the Cloud Marc Green, Thomas Eisenbarth
2015/1167 (PDF ) Constraining Pseudorandom Functions Privately Dan Boneh, Kevin Lewi, David J. Wu
2015/1166 (PDF ) Ceremonies for End-to-End Verifiable Elections Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang
2015/1165 (PDF ) Meet-in-the-Middle Attacks on Reduced-Round Midori-64 Li Lin, Wenling Wu
2015/1164 (PDF ) Beyond Bitcoin - Part I: A critical look at blockchain-based systems Pasquale Forte, Diego Romano, Giovanni Schmid
2015/1163 (PDF ) A Guess-and-Determine Attack on Reduced-Round Khudra and Weak Keys of Full Cipher Mehmet Özen, Mustafa Çoban, Ferhat Karakoç
2015/1162 (PDF ) The Moral Character of Cryptographic Work Phillip Rogaway
2015/1161 (PDF ) Cyber and Physical Access Control in Legacy System Using Passwords Jia Xu, Jianying Zhou, Liming Lu
2015/1160 (PDF ) Cryptanalysis of multi-HFE Yasufumi Hashimoto
2015/1159 (PDF ) Students and Taxes: a Privacy-Preserving Social Study Using Secure Computation Dan Bogdanov, Liina Kamm, Baldur Kubo, Reimo Rebane, Ville Sokk, Riivo Talviste
2015/1158 (PDF ) A note on the optimality of frequency analysis vs. $\ell_p$-optimization Marie-Sarah Lacharité, Kenneth G. Paterson
2015/1157 (PDF ) From Identification to Signatures, Tightly: A Framework and Generic Transforms Mihir Bellare, Bertram Poettering, Douglas Stebila
2015/1155 (PDF ) Cross Processor Cache Attacks Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar
2015/1154 (PDF ) NORX8 and NORX16: Authenticated Encryption for Low-End Systems Jean-Philippe Aumasson, Philipp Jovanovic, Samuel Neves
2015/1153 (PDF ) Obliv-C: A Language for Extensible Data-Oblivious Computation Samee Zahur, David Evans
2015/1152 (PDF ) Privacy-preserving Friendship-based Recommender Systems Qiang Tang, Jun Wang
2015/1151 (PDF ) Fully Leakage-Resilient Codes Antonio Faonio, Jesper Buus Nielsen
2015/1150 (PDF ) From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS Colin Boyd, Britta Hale, Stig Frode Mjølsnes, Douglas Stebila
2015/1149 (PDF ) An Asymptotically Optimal Method for Converting Bit Encryption to Multi-Bit Encryption Takahiro Matsuda, Goichiro Hanaoka
2015/1148 (PDF ) An Inverse-free Single-Keyed Tweakable Enciphering Scheme Ritam Bhaumik, Mridul Nandi
2015/1146 (PDF ) libgroupsig: An extensible C library for group signatures Jesus Diaz, David Arroyo, Francisco B. Rodriguez
2015/1145 (PDF ) Lattice Attacks on the DGHV Homomorphic Encryption Scheme Abderrahmane Nitaj, Tajjeeddine Rachidi
2015/1144 (PDF ) Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions Olivier Blazy, Céline Chevalier, Damien Vergnaud
2015/1142 (PDF ) Midori: A Block Cipher for Low Energy (Extended Version) Subhadeep Banik, Andrey Bogdanov, Takanori Isobe, Kyoji Shibutani, Harunaga Hiwatari, Toru Akishita, Francesco Regazzoni
2015/1141 (PDF ) Amplifying Side Channels Through Performance Degradation Thomas Allan, Billy Bob Brumley, Katrina Falkner, Joop van de Pol, Yuval Yarom
2015/1140 (PDF ) Modular Inversion Hidden Number Problem- A Lattice Approach Pranjal Dutta
2015/1139 (PDF ) Secret Sharing Schemes with General Access Structures (Full version) Jian Liu, Sihem Mesnager, Lusheng Chen
2015/1138 (PDF ) Lightweight CRC-based Authentication Elena Dubrova, Mats Näslund, Göran Selander, Fredrik Lindqvist
2015/1137 (PDF ) Improved Factoring Attacks on Multi-Prime RSA with Small Prime Difference Mengce Zheng, Noboru Kunihiro, Honggang Hu
2015/1136 (PDF ) Multi-Input Functional Encryption for Unbounded Arity Functions Saikrishna Badrinarayanan, Divya Gupta, Abhishek Jain, Amit Sahai
2015/1135 (PDF ) On the Security of the Schnorr Signature Scheme and DSA against Related-Key Attacks Hiraku Morita, Jacob C. N. Schuldt, Takahiro Matsuda, Goichiro Hanaoka, Tetsu Iwata
2015/1134 (PDF ) $\Lambda \circ \lambda$: Functional Lattice Cryptography Eric Crockett, Chris Peikert
2015/1133 (PDF ) Comment on ``Realization of a scalable Shor algorithm" Zhengjun Cao, Lihua Liu
2015/1132 (PDF ) Tighter Security for Efficient Lattice Cryptography via the Rényi Divergence of Optimized Orders Katsuyuki Takashima, Atsushi Takayasu
2015/1131 (PDF ) On the Usability of Two-Factor Authentication Ding Wang, Ping Wang
2015/1130 (PDF ) A Note on Perfect Correctness by Derandomization Nir Bitansky, Vinod Vaikuntanathan
2015/1129 (PDF ) Lucky Microseconds: A Timing Attack on Amazon's s2n Implementation of TLS Martin R. Albrecht, Kenneth G. Paterson
2015/1128 (PDF ) New directions in nearest neighbor searching with applications to lattice sieving Anja Becker, Léo Ducas, Nicolas Gama, Thijs Laarhoven
2015/1127 (PDF ) Pseudo-Free Families of Finite Computational Elementary Abelian $p$-Groups Mikhail Anokhin
2015/1126 (PDF ) A Practical Oblivious Map Data Structure with Secure Deletion and History Independence Daniel S. Roche, Adam J. Aviv, Seung Geol Choi
2015/1125 (PDF ) Practical Order-Revealing Encryption with Limited Leakage Nathan Chenette, Kevin Lewi, Stephen A. Weis, David J. Wu
2015/1124 (PDF ) Secret Sharing Schemes Based on Resilient Boolean Maps Juan Carlos Ku-Cauich, Guillermo Morales-Luna
2015/1123 (PDF ) Practical, Predictable Lattice Basis Reduction Daniele Micciancio, Michael Walter
2015/1121 (PDF ) On the First Fall Degree of Summation Polynomials Stavros Kousidis, Andreas Wiemers
2015/1120 (PDF ) Even More Practical Key Exchanges for the Internet using Lattice Cryptography Vikram Singh, Arjun Chopra
2015/1119 (PDF ) On the Possibility of Non-Interactive E-Voting in the Public-key Setting Rosario Giustolisi, Vincenzo Iovino, Peter B. Rønne
2015/1118 (PDF ) Bitsliced Implementations of the PRINCE, LED and RECTANGLE Block Ciphers on AVR 8-bit Microcontrollers Zhenzhen Bao, Peng Luo, Dongdai Lin
2015/1117 (PDF ) Efficient implementation of AND, OR and NOT operators for ABCs Antonio de la Piedra
2015/1116 (PDF ) CHf-ORAM: A Constant Communication ORAM without Homomorphic Encryption Tarik Moataz, Erik-Oliver Blass, Travis Mayberry
2015/1115 (PDF ) Efficient Threshold Secret Sharing Schemes Secure against Rushing Cheaters Avishek Adhikari, Kirill Morozov, Satoshi Obana, Partha Sarathi Roy, Kouichi Sakurai, Rui Xu
2015/1114 (PDF ) Faster arithmetic on elliptic curves using Fp2. Application to GLV-GLS and NIST elliptic curves over Fp isomorphic to twisted Hessian curves over fields extension Michał Wroński
2015/1113 (PDF ) Multi-Input Functional Encryption with Unbounded-Message Security Vipul Goyal, Aayush Jain, Adam O' Neill
2015/1112 (PDF ) Efficient Culpably Sound NIZK Shuffle Argument without Random Oracles Prastudy Fauzi, Helger Lipmaa
2015/1110 (PDF ) Privacy-Aware Authentication in the Internet of Things Hannes Gross, Marko Hölbl, Daniel Slamanig, Raphael Spreitzer
2015/1109 (PDF ) Efficient and Low-complexity Hardware Architecture of Gaussian Normal Basis Multiplication over GF(2m) for Elliptic Curve Cryptosystems Bahram Rashidi, Sayed Masoud Sayedi, Reza Rezaeian Farashahi
2015/1108 (PDF ) Recommender Systems and their Security Concerns Jun Wang, Qiang Tang
2015/1107 (PDF ) Concurrent Secure Computation via Non-Black Box Simulation Vipul Goyal, Divya Gupta, Amit Sahai
2015/1106 (PDF ) POPE: Partial Order Preserving Encoding Daniel S. Roche, Daniel Apon, Seung Geol Choi, Arkady Yerukhimovich
2015/1105 (PDF ) Selene: Voting with Transparent Verifiability and Coercion-Mitigation Peter Y A Ryan, Peter B Roenne, Vincenzo Iovino
2015/1104 (PDF ) Computing Jacobi's \theta in quasi-linear time Hugo Labrande
2015/1103 (PDF ) Linear codes with few weights from weakly regular bent functions based on a generic construction Sihem Mesnager
2015/1102 (PDF ) A Practical Cryptanalysis of the Algebraic Eraser Adi Ben-Zvi, Simon R. Blackburn, Boaz Tsaban
2015/1101 (PDF ) Virtual Smart Cards: How to Sign with a Password and a Server Jan Camenisch, Anja Lehmann, Gregory Neven, Kai Samelin
2015/1100 (PDF ) Area-Efficient Hardware Implementation of the Optimal Ate Pairing over BN curves. Anissa Sghaier, Loubna Ghammam, Medyen Zeghid, Sylvain Duquesne, Mohsen Machhout
2015/1099 (PDF ) Device-Enhanced Password Protocols with Optimal Online-Offline Protection Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena
2015/1098 (PDF ) Ring Signature Confidential Transactions for Monero Shen Noether
2015/1097 (PDF ) On the Communication required for Unconditionally Secure Multiplication Ivan Damgård, Jesper Buus Nielsen, Antigoni Polychroniadou, Michael Raskin
2015/1096 (PDF ) Watermarking Cryptographic Capabilities Aloni Cohen, Justin Holmgren, Ryo Nishimaki, Vinod Vaikuntanathan, Daniel Wichs
2015/1095 (PDF ) Non-Malleable Multi-Prover Interactive Proofs and Witness Signatures Vipul Goyal, Aayush Jain, Dakshita Khurana
2015/1094 (PDF ) Affine-malleable Extractors, Spectrum Doubling, and Application to Privacy Amplification Divesh Aggarwal, Kaave Hosseini, Shachar Lovett
2015/1093 (PDF ) C$\emptyset$C$\emptyset$: A Framework for Building Composable Zero-Knowledge Proofs Ahmed Kosba, Zhichao Zhao, Andrew Miller, Yi Qian, Hubert Chan, Charalampos Papamanthou, Rafael Pass, abhi shelat, Elaine Shi
2015/1092 (PDF ) Post-quantum key exchange - a new hope Erdem Alkim, Léo Ducas, Thomas Pöppelmann, Peter Schwabe
2015/1090 (PDF ) Do Distributed Differentially-Private Protocols Require Oblivious Transfer? Vipul Goyal, Dakshita Khurana, Ilya Mironov, Omkant Pandey, Amit Sahai
2015/1089 (PDF ) Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions Ronald Cramer, Ivan Bjerre Damgård, Nico Döttling, Serge Fehr, Gabriele Spini
2015/1088 (PDF ) Note on the RKA security of Continuously Non-Malleable Key-Derivation Function from PKC 2015 Eiichiro Fujisaki, Keita Xagawa
2015/1086 (PDF ) Chicken or the Egg - Computational Data Attacks or Physical Attacks Julien Allibert, Benoit Feix, Georges Gagnerot, Ismael Kane, Hugues Thiebeauld, Tiana Razafindralambo
2015/1085 (PDF ) Malicious Keccak Pawel Morawiecki
2015/1084 (PDF ) Patchable Indistinguishability Obfuscation: iO for Evolving Software Prabhanjan Ananth, Abhishek Jain, Amit Sahai
2015/1083 (PDF ) Implementation Attacks on Post-Quantum Cryptographic Schemes Mostafa Taha, Thomas Eisenbarth
2015/1082 (PDF ) Delegating RAM Computations with Adaptive Soundness and Privacy Prabhanjan Ananth, Yu-Chi Chen, Kai-Min Chung, Huijia Lin, Wei-Kai Lin
2015/1081 (PDF ) NEON PQCryto: Fast and Parallel Ring-LWE Encryption on ARM NEON Architecture Reza Azarderakhsh, Zhe Liu, Hwajeong Seo, Howon Kim
2015/1080 (PDF ) Variations to the cryptographics algorithms AES and TWOFISH P. Freyre, N. Díaz, O. Cuellar
2015/1079 (PDF ) De Bruijn Sequences from Symmetric Shift Registers Ming Li, Mingxing Wang, Dongdai Lin
2015/1078 (PDF ) Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium Sanjam Garg, Omkant Pandey, Akshayaram Srinivasan
2015/1077 (PDF ) Fault Analysis on the Stream Ciphers LILI-128 and Achterbahn Dibyendu Roy, Sourav Mukhopadhyay
2015/1076 (PDF ) An appendix for a recent paper of Kim Razvan Barbulescu
2015/1075 (PDF ) Cybersecurity in an era with quantum computers: will we be ready? Michele Mosca
2015/1074 (PDF ) Succinct Adaptive Garbled RAM Ran Canetti, Yilei Chen, Justin Holmgren, Mariana Raykova
2015/1073 (PDF ) Practical Witness Encryption for Algebraic Languages Or How to Encrypt Under Groth-Sahai Proofs David Derler, Daniel Slamanig
2015/1071 (PDF ) Revisiting Secure Two-Party Computation with Rational Players Arpita Maitra, Goutam Paul, Asim K. Pal
2015/1070 (PDF ) Barriers to Black-Box Constructions of Traitor Tracing Systems Bo Tang, Jiapeng Zhang
2015/1069 (PDF ) Indifferentiability of 8-Round Feistel Networks Yuanxi Dai, John Steinberger
2015/1068 (PDF ) Black-Box Parallel Garbled RAM Steve Lu, Rafail Ostrovsky
2015/1067 (PDF ) Public Verifiability in the Covert Model (Almost) for Free Vladimir Kolesnikov, Alex J. Malozemoff
2015/1066 (PDF ) Cryptanalysis of A Privacy-Preserving Smart Metering Scheme Using Linkable Anonymous Credential Haipeng Qu, Peng Shang, Xi-Jun Lin, Lin Sun
2015/1065 (PDF ) Bucket ORAM: Single Online Roundtrip, Constant Bandwidth Oblivious RAM Christopher Fletcher, Muhammad Naveed, Ling Ren, Elaine Shi, Emil Stefanov
2015/1064 (PDF ) Déjà Q: Encore! Un Petit IBE Hoeteck Wee
2015/1063 (PDF ) Optimal Computational Split-state Non-malleable Codes Divesh Aggarwal, Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran
2015/1062 (PDF ) Lower Bounds on Assumptions behind Indistinguishability Obfuscation Mohammad Mahmoody, Ameer Mohammed, Soheil Nematihaji, Rafael Pass, abhi shelat
2015/1061 (PDF ) On Basing Private Information Retrieval on NP-Hardness Tianren Liu, Vinod Vaikuntanathan
2015/1060 (PDF ) Complete addition formulas for prime order elliptic curves Joost Renes, Craig Costello, Lejla Batina
2015/1059 (PDF ) A General Framework for Redactable Signatures and New Constructions David Derler, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
2015/1058 (PDF ) Rational Sumchecks Siyao Guo, Pavel Hubacek, Alon Rosen, Margarita Vald
2015/1057 (PDF ) The Complexity of Computing the Optimal Composition of Differential Privacy Jack Murtagh, Salil Vadhan
2015/1056 (PDF ) Information-theoretic Local Non-malleable Codes and their Applications Nishanth Chandran, Bhavana Kanukurthi, Srinivasan Raghuraman
2015/1055 (PDF ) Making the Best of a Leaky Situation: Zero-Knowledge PCPs from Leakage-Resilient Circuits Yuval Ishai, Mor Weiss, Guang Yang
2015/1054 (PDF ) Computational Soundness of Uniformity Properties for Multi-party Computation based on LSSS HUI ZHAO, Kouichi Sakurai
2015/1053 (PDF ) Oblivious Parallel RAM: Improved Efficiency and Generic Constructions Binyi Chen, Huijia Lin, Stefano Tessaro
2015/1052 (PDF ) PLayPUF: Programmable Logically Erasable PUFs for Forward and Backward Secure Key Management Chenglu Jin, Xiaolin Xu, Wayne Burleson, Ulrich Rührmair, Marten van Dijk
2015/1051 (PDF ) Cryptanalysis and Improvement of Identity-based Proxy Multi-signature scheme Jayaprakash Kar
2015/1050 (PDF ) Comparison Between Irreducible and Separable Goppa Code in McEliece Cryptosystem Thuraya M. Qaradaghi, Newroz N. Abdulrazaq
2015/1049 (PDF ) Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers Thomas Peyrin, Yannick Seurin
2015/1048 (PDF ) Verifiable Random Functions from Standard Assumptions Dennis Hofheinz, Tibor Jager
2015/1047 (PDF ) Reconfigurable Cryptography: A flexible approach to long-term security Julia Hesse, Dennis Hofheinz, Andy Rupp
2015/1046 (PDF ) From Private Simultaneous Messages to Zero-Information Arthur-Merlin Protocols and Back Benny Applebaum, Pavel Raykov
2015/1045 (PDF ) Exploiting Transformations of the Galois Configuration to Improve Guess-and-Determine Attacks on NFSRs Gefei Li, Yuval Yarom, Damith C. Ranasinghe
2015/1044 (PDF ) Homomorphic evaluation requires depth Andrej Bogdanov, Chin Ho Lee
2015/1043 (PDF ) The Index j in RC4 is not Pseudo-random due to Non-existence of Finney Cycle Subhamoy Maitra
2015/1042 (PDF ) ARMed SPHINCS -- Computing a 41KB signature in 16KB of RAM Andreas Hülsing, Joost Rijneveld, Peter Schwabe
2015/1041 (PDF ) The Number of Boolean Functions with Multiplicative Complexity 2 Magnus Gausdal Find, Daniel Smith-Tone, Meltem Sonmez Turan
2015/1040 (PDF ) Fully Homomorphic Encryption with Composite Number Modulus Masahiro Yagisawa
2015/1039 (PDF ) Maturity and Performance of Programmable Secure Computation David W. Archer, Dan Bogdanov, Benny Pinkas, Pille Pullonen
2015/1038 (PDF ) Revisiting LEGOs: Optimizations, Analysis, and their Limit Yan Huang, Ruiyu Zhu
2015/1037 (PDF ) Cryptanalysis of GGH15 Multilinear Maps Jean-Sebastien Coron, Moon Sung Lee, Tancrede Lepoint, Mehdi Tibouchi
2015/1036 (PDF ) Patterson-Wiedemann type functions on 21 variables with Nonlinearity greater than Bent Concatenation bound Selcuk Kavut, Subhamoy Maitra
2015/1035 (PDF ) CARIBE: Cascaded IBE for Maximum Flexibility and User-side Control Britta Hale, Christopher Carr, Danilo Gligoroski
2015/1034 (PDF ) Real time detection of cache-based side-channel attacks using Hardware Performance Counters Marco Chiappetta, Erkay Savas, Cemal Yilmaz
2015/1033 (PDF ) The Ultimate Transposition Cipher (UTC) Gideon Samid
2015/1032 (PDF ) Essentially Optimal Robust Secret Sharing with Maximal Corruptions Allison Bishop, Valerio Pastro, Rajmohan Rajaraman, Daniel Wichs
2015/1031 (PDF ) Secure Dating with Four or Fewer Cards Antonio Marcedone, Zikai Wen, Elaine Shi
2015/1030 (PDF ) SECOND COORDINATE SEQUENCE OF MP-LRS OVER NONTRIVIAL GALOIS RING OF ODD CHARACTERISTIC Vadim N. Tsypyschev
2015/1029 (PDF ) The Energy Budget for Wireless Security: Extended Version Dave Singelée, Stefaan Seys, Lejla Batina, Ingrid Verbauwhede
2015/1028 (PDF ) Reviving the Idea of Incremental Cryptography for the Zettabyte era Use case: Incremental Hash Functions Based on SHA-3 Hristina Mihajloska, Danilo Gligoroski, Simona Samardjiska
2015/1027 (PDF ) Extended Tower Number Field Sieve: A New Complexity for the Medium Prime Case Taechan Kim, Razvan Barbulescu
2015/1026 (PDF ) Hardness Estimation of LWE via Band Pruning Yoshinori Aono, Le Trieu Phong, Lihua Wang
2015/1025 (PDF ) PAGES+,PAGES-, and PAGES-- - Three Families of Block Ciphers Dieter Schmidt
2015/1023 (PDF ) Indistinguishability Obfuscation for Turing Machines: Constant Overhead and Amortization Prabhanjan Ananth, Abhishek Jain, Amit Sahai
2015/1022 (PDF ) Recent progress on the elliptic curve discrete logarithm problem Steven D. Galbraith, Pierrick Gaudry
2015/1021 (PDF ) New Proof Techniques for DLIN-Based Adaptively Secure Attribute-Based Encryption Katsuyuki Takashima
2015/1020 (PDF ) Attacking the Network Time Protocol Aanchal Malhotra, Isaac E. Cohen, Erik Brakke, Sharon Goldberg
2015/1019 (PDF ) Speed-Security Tradeoffs in Blockchain Protocols Aggelos Kiayias, Giorgos Panagiotakos
2015/1018 (PDF ) A Riddle Wrapped in an Enigma Neal Koblitz, Alfred J. Menezes
2015/1017 (PDF ) Functional Encryption: Decentralised and Delegatable Nishanth Chandran, Vipul Goyal, Aayush Jain, Amit Sahai
2015/1016 (PDF ) One-Key Compression Function Based MAC with Security beyond Birthday Bound Avijit Dutta, Mridul Nandi, Goutam Paul
2015/1015 (PDF ) On Bitcoin as a public randomness source Joseph Bonneau, Jeremy Clark, Steven Goldfeder
2015/1014 (PDF ) Fast Fourier Orthogonalization Léo Ducas, Thomas Prest
2015/1013 (PDF ) Inception Makes Non-malleable Codes Stronger Divesh Aggarwal, Tomasz Kazana, Maciej Obremski
2015/1012 (PDF ) An Efficient Multiple PKG Compatible Identity Based Authenticated Key Agreement protocol Harish Karthikeyan, Suvradip Chakraborty, Kunwar Singh, C. Pandu Rangan
2015/1011 (PDF ) Hierarchical Functional Encryption Zvika Brakerski, Gil Segev
2015/1010 (PDF ) TWORAM: Round-Optimal Oblivious RAM with Applications to Searchable Encryption Sanjam Garg, Payman Mohassel, Charalampos Papamanthou
2015/1009 (PDF ) Applications of Key Recovery Cube-attack-like Pawel Morawiecki, Josef Pieprzyk, Michal Straus, Marian Srebrny
2015/1008 (PDF ) Provisions: Privacy-preserving proofs of solvency for Bitcoin exchanges Gaby G. Dagher, Benedikt Buenz, Joseph Bonneau, Jeremy Clark, Dan Boneh
2015/1007 (PDF ) How to Vote Privately Using Bitcoin Zhichao Zhao, T-H. Hubert Chan
2015/1006 (PDF ) Confidential Benchmarking based on Multiparty Computation Ivan Damgård, Kasper Damgård, Kurt Nielsen, Peter Sebastian Nordholt, Tomas Toft
2015/1005 (PDF ) Cryptanalysis of Yasuda, Takagi and Sakurai's Signature Scheme Using Invariant Subspaces Wenbin Zhang, Chik How Tan
2015/1004 (PDF ) Security Analysis of Cryptosystems Using Short Generators over Ideal Lattices Shinya Okumura, Shingo Sugiyama, Masaya Yasuda, Tsuyoshi Takagi
2015/1003 (PDF ) Results on polynomial interpolation with mixed modular operations and unknown moduli Oscar Garcia-Morchon, Ronald Rietman, Igor Shparlinski, Ludo Tolhuizen
2015/1002 (PDF ) got HW crypto? On the (in)security of a Self-Encrypting Drive series Gunnar Alendal, Christian Kison, modg
2015/1001 (PDF ) Dismantling real-world ECC with Horizontal and Vertical Template Attacks Margaux Dugardin, Louiza Papachristodoulou, Zakaria Najm, Lejla Batina, Jean-Luc Danger, Sylvain Guilley, Jean-Christophe Courrege, Carine Therond
2015/1000 (PDF ) Factoring as a Service Luke Valenta, Shaanan Cohney, Alex Liao, Joshua Fried, Satya Bodduluri, Nadia Heninger
2015/999 (PDF ) Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption Robert Granger, Philipp Jovanovic, Bart Mennink, Samuel Neves
2015/998 (PDF ) All or Nothing at All Paolo D'Arco, Navid Nasr Esfahani, Douglas R. Stinson
2015/997 (PDF ) Incremental Program Obfuscation Sanjam Garg, Omkant Pandey
2015/996 (PDF ) Multi-user Schnorr security, revisited Daniel J. Bernstein
2015/995 (PDF ) Updates on Sorting of Fully Homomorphic Encrypted Data Nitesh Emmadi, Praveen Gauravaram, Harika Narumanchi, Habeeb Syed
2015/993 (PDF ) Bi-Deniable Inner Product Encryption from LWE Daniel Apon, Xiong Fan, Feng-Hao Liu
2015/992 (PDF ) Multilinear Map via Scale-Invariant FHE: Enhancing Security and Efficiency Jinsu Kim, Sungwook Kim, Jae Hong Seo
2015/991 (PDF ) Ed3363 (HighFive) -- An alternative Elliptic Curve Mike Scott
2015/990 (PDF ) Encryption Switching Protocols Geoffroy Couteau, Thomas Peters, David Pointcheval
2015/989 (PDF ) Fast Oblivious AES\\A dedicated application of the MiniMac protocol Ivan Damgård, Rasmus Winther Zakarias
2015/988 (PDF ) Improved Linear Cryptanalysis of reduced-round SIMON-32 and SIMON-48 Mohamed Ahmed Abdelraheem, Javad Alizadeh, Hoda A. Alkhzaimi, Mohammad Reza Aref, Nasour Bagheri, Praveen Gauravaram
2015/987 (PDF ) Blazing Fast 2PC in the Offline/Online Setting with Security for Malicious Adversaries Yehuda Lindell, Ben Riva
2015/986 (PDF ) Bit Coincidence Mining Algorithm Koh-ichi Nagao
2015/985 (PDF ) Polynomial time reduction from 3SAT to solving low first fall degree multivariable cubic equations system Koh-ichi Nagao
2015/984 (PDF ) Complexity of ECDLP under the First Fall Degree Assumption Koh-ichi Nagao
2015/983 (PDF ) Fast, uniform, and compact scalar multiplication for elliptic curves and genus 2 Jacobians with applications to signature schemes Ping Ngai Chung, Craig Costello, Benjamin Smith
2015/982 (PDF ) A note on constructions of bent functions from involutions Sihem Mesnager
2015/981 (PDF ) Searching and Sorting of Fully Homomorphic Encrypted Data on Cloud Ayantika Chatterjee, Indranil Sengupta
2015/980 (PDF ) Analysis of an RFID Authentication Protocol in Accordance with EPC Standards Behzad Abdolmaleki, Hamidreza Bakhshi, Karim Baghery, Mohammad Reza Aref
2015/979 (PDF ) Guidelines for Using the CryptDB System Securely Raluca Ada Popa, Nickolai Zeldovich, Hari Balakrishnan
2015/978 (PDF ) The OPTLS Protocol and TLS 1.3 Hugo Krawczyk, Hoeteck Wee
2015/977 (PDF ) Faster point scalar multiplication on NIST elliptic curves over GF(p) using (twisted) Edwards curves over GF(p³) Michał Wroński
2015/976 (PDF ) On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure Alex Biryukov, Léo Perrin
2015/975 (PDF ) Extended Functionality in Verifiable Searchable Encryption James Alderman, Christian Janson, Keith M. Martin, Sarah Louise Renwick
2015/974 (PDF ) The Conjoined Microprocessor Ehsan Aerabi, A. Elhadi Amirouche, Houda Ferradi, Rémi Géraud, David Naccache, Jean Vuillemin
2015/973 (PDF ) Some Cryptanalytic Results on Zipper Hash and Concatenated Hash Ashwin Jha, Mridul Nandi
2015/972 (PDF ) Cut Down the Tree to Achieve Constant Complexity in Divisible E-Cash David Pointcheval, Olivier Sanders, Jacques Traoré
2015/971 (PDF ) Attacks on the Search-RLWE problem with small error Hao Chen, Kristin E. Lauter, Katherine E. Stange
2015/969 (PDF ) Zero-Knowledge Interactive Proof Systems for New Lattice Problems Claude Crepéau, Raza Ali Kazmi
2015/968 (PDF ) Improved Differential-Linear Cryptanalysis of 7-round Chaskey with Partitioning Gaëtan Leurent
2015/967 (PDF ) Freestart collision for full SHA-1 Marc Stevens, Pierre Karpman, Thomas Peyrin
2015/966 (PDF ) Vulnerabilities of ``McEliece in the World of Escher" Dustin Moody, Ray Perlner
2015/965 (PDF ) Private Genome Analysis through Homomorphic Encryption Miran Kim, Kristin Lauter
2015/964 (PDF ) Improved Linear (hull) Cryptanalysis of Round-reduced Versions of KATAN Danping Shi, Lei Hu, Siwei Sun, Ling Song
2015/963 (PDF ) When Organized Crime Applies Academic Results - A Forensic Analysis of an In-Card Listening Device Houda Ferradi, Rémi Géraud, David Naccache, Assia Tria
2015/962 (PDF ) SOME REMARKS ON THE LOGARITHMIC SIGNATURES OF FINITE ABELIAN GROUPS Thuong T. Dang, Tri T. Ton, Van H. Dang, Thuc D. Nguyen
2015/961 (PDF ) Short Structure-Preserving Signatures Essam Ghadafi
2015/960 (PDF ) More Efficient Secure Outsourcing Methods for Bilinear Maps Öznur Arabacı, Mehmet Sabir Kiraz, İsa Sertkaya, Osmanbey Uzunkol
2015/959 (PDF ) Cryptanalysis of the Round-Reduced Kupyna Hash Function Jian Zou, Le Dong
2015/957 (PDF ) Delegating RAM Computations Yael Tauman Kalai, Omer Paneth
2015/956 (PDF ) Analysis of the Kupyna-256 Hash Function Christoph Dobraunig, Maria Eichlseder, Florian Mendel
2015/955 (PDF ) On the Power of Pair Encodings: Frameworks for Predicate Cryptographic Primitives Mridul Nandi, Tapas Pandit
2015/954 (PDF ) Online-Offline Homomorphic Signatures for Polynomial Functions Kaoutar Elkhiyaoui, Melek Önen, Refik Molva
2015/953 (PDF ) Gaussian Sampling Precision in Lattice Cryptography Markku-Juhani O. Saarinen
2015/952 (PDF ) Commitment and Oblivious Transfer in the Bounded Storage Model with Errors Rafael Dowsley, Felipe Lacerda, Anderson C. A. Nascimento
2015/951 (PDF ) Nearly Optimal Robust Secret Sharing Mahdi Cheraghchi
2015/950 (PDF ) A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer Shota Goto, Junji Shikata
2015/949 (PDF ) Private Processing of Outsourced Network Functions: Feasibility and Constructions Luca Melis, Hassan Jameel Asghar, Emiliano De Cristofaro, Mohamed Ali Kaafar
2015/948 (PDF ) A Provably Secure Short Signature Scheme from Coding Theory Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Mohammad Reza Aref
2015/947 (PDF ) Weave ElGamal Encryption for Secure Outsourcing Algebraic Computations over Zp Yi-Ruei Chen, Shiuan-Tzuo Shen, Wen-Guey Tzeng
2015/946 (PDF ) Equihash: Asymmetric Proof-of-Work Based on the Generalized Birthday Problem Alex Biryukov, Dmitry Khovratovich
2015/945 (PDF ) Secure Set-based Policy Checking and Its Application to Password Registration Changyu Dong, Franziskus Kiefer
2015/944 (PDF ) New Complexity Trade-Offs for the (Multiple) Number Field Sieve Algorithm in Non-Prime Fields Palash Sarkar, Shashank Singh
2015/943 (PDF ) Sandy2x: New Curve25519 Speed Records Tung Chou
2015/942 (PDF ) Ballot secrecy: Security definition, sufficient conditions, and analysis of Helios Ben Smyth
2015/941 (PDF ) Cryptanalysis of the New Multilinear Map over the Integers Brice Minaud, Pierre-Alain Fouque
2015/940 (PDF ) Secure Association for the Internet of Things Almog Benin, Sivan Toledo, Eran Tromer
2015/939 (PDF ) A Decade of Lattice Cryptography Chris Peikert
2015/938 (PDF ) Lattice Based Cryptography for Beginners Dong Pyo Chi, Jeong Woon Choi, Jeong San Kim, Taewan Kim
2015/937 (PDF ) End-to-end Design of a PUF-based Privacy Preserving Authentication Protocol Aydin Aysu, Ege Gulcan, Daisuke Moriyama, Patrick Schaumont, Moti Yung
2015/935 (PDF ) Joint Data and Key Distribution of Simple, Multiple, and Multidimensional Linear Cryptanalysis Test Statistic and Its Impact to Data Complexity Céline Blondeau, Kaisa Nyberg
2015/934 (PDF ) Cryptanalysis of the New CLT Multilinear Maps Jung Hee Cheon, Changmin Lee, Hansol Ryu
2015/933 (PDF ) Cryptanalysis of Provably Secure Certicateless Short Signature Scheme Jayaprakash Kar
2015/932 (PDF ) Using Tweaks To Design Fault Resistant Ciphers Sikhar Patranabis, Debapriya Basu Roy, Debdeep Mukhopadhyay
2015/931 (PDF ) Fast and Secure Three-party Computation: The Garbled Circuit Approach Payman Mohassel, Mike Rosulek, Ye Zhang
2015/930 (PDF ) Nearly Sparse Linear Algebra and application to Discrete Logarithms Computations Antoine Joux, Cécile Pierrot
2015/929 (PDF ) Are you The One to Share? Secret Transfer with Access Structure Yongjun Zhao, Sherman S. M. Chow
2015/928 (PDF ) HLDCA-WSN: Homomorphic Lightweight Data Confidentiality Algorithm for Wireless Sensor Network Hassan Noura, Damien Couroussé
2015/927 (PDF ) Rich Queries on Encrypted Data: Beyond Exact Matches Sky Faber, Stanislaw Jarecki, Hugo Krawczyk, Quan Nguyen, Marcel Rosu, Michael Steiner
2015/926 (PDF ) CRITERION OF MAXIMAL PERIOD OF A TRINOMIAL OVER NONTRIVIAL GALOIS RING OF ODD CHARACTERISTIC Vadim N. Tsypyschev, Julia S. Vinogradova
2015/925 (PDF ) Exploiting the Order of Multiplier Operands: A Low Cost Approach for HCCA Resistance Poulami Das, Debapriya Basu Roy, Debdeep Mukhopadhyay
2015/924 (PDF ) Masking Large Keys in Hardware: A Masked Implementation of McEliece Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt
2015/923 (PDF ) DYNAMIC KEY-AGGREGATE CRYPTOSYSTEM ON ELLIPTIC CURVES FOR ONLINE DATA SHARING Sikhar Patranabis, Yash Shrivastava, Debdeep Mukhopadhyay
2015/922 (PDF ) Localised Multisecret Sharing Thalia M. Laing, Keith M. Martin, Maura B. Paterson, Douglas R. Stinson
2015/921 (PDF ) Identity-Based Revocation from Subset Difference Methods under Simple Assumptions Kwangsu Lee, Jong Hwan Park
2015/920 (PDF ) Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage Giuseppe Ateniese, Antonio Faonio, Seny Kamara
2015/918 (PDF ) Finding State Collisions in the Authenticated Encryption Stream Cipher ACORN Md Iftekhar Salam, Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson, Josef Pieprzyk
2015/917 (PDF ) Private Proximity Testing on Steroids: An NTRU-based Protocol Constantinos Patsakis, Panayiotis Kotzanikolaou, M ́elanie Bouroche
2015/916 (PDF ) Rigorous Upper Bounds on Data Complexities of Block Cipher Cryptanalysis Subhabrata Samajder, Palash Sarkar
2015/915 (PDF ) A Generic Construction for Verifiable Attribute-based Keyword Search Schemes Mohammmad Hassan Ameri, Maryam Rajabzadeh Assar, Javad Mohajeri, Mahmoud Salmasizadeh
2015/914 (PDF ) A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila
2015/913 (PDF ) Functional Signcryption: Notion, Construction, and Applications Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
2015/912 (PDF ) Extraction of intrinsic structure for Hardware Trojan detection Maxime Lecomte, Jacques Fournier, Philippe Maurine
2015/911 (PDF ) Security Evaluation on Simeck against Zero Correlation Linear Cryptanalysis Kai Zhang, Jie Guan, Bin Hu, Dongdai Lin
2015/910 (PDF ) QA-NIZK Arguments in Asymmetric Groups: New Tools and New Constructions Alonso González, Alejandro Hevia, Carla Ràfols
2015/909 (PDF ) On the Impact of Known-Key Attacks on Hash Functions Bart Mennink, Bart Preneel
2015/908 (PDF ) Linear Distinguishers in the Key-less Setting: Application to PRESENT Martin M. Lauridsen, Christian Rechberger
2015/907 (PDF ) Cryptographic Assumptions: A Position Paper Shafi Goldwasser, Yael Tauman Kalai
2015/906 (PDF ) RoadRunneR: A Small And Fast Bitslice Block Cipher For Low Cost 8-bit Processors Adnan Baysal, Suhap Sahin
2015/905 (PDF ) Mapping the Intel Last-Level Cache Yuval Yarom, Qian Ge, Fangfei Liu, Ruby B. Lee, Gernot Heiser
2015/904 (PDF ) Almost-tight Identity Based Encryption against Selective Opening Attack Junqing Gong, Xiaolei Dong, Zhenfu Cao, Jie Chen
2015/903 (PDF ) A Note on the Indifferentiability of the 10-Round Feistel Construction Yannick Seurin
2015/902 (PDF ) Differential Analysis on Simeck and SIMON with Dynamic Key-guessing Techniques Kexin Qiao, Lei Hu, Siwei Sun
2015/901 (PDF ) A Unified Approach to MPC with Preprocessing using OT Tore Kasper Frederiksen, Marcel Keller, Emmanuela Orsini, Peter Scholl
2015/900 (PDF ) New Results on Identity-based Encryption from Quadratic Residuosity Ferucio Laurentiu Tiplea, Emil Simion
2015/899 (PDF ) Privacy-preserving Attribute Based Searchable Encryption Payal Chaudhari, Maniklal Das
2015/898 (PDF ) Seriously, get off my cloud! Cross-VM RSA Key Recovery in a Public Cloud Mehmet Sinan Inci, Berk Gulmezoglu, Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar
2015/897 (PDF ) Integrity-Aware Parallelizable Cipher Feedback Mode for Real-time Cryptography Prosanta Gope
2015/896 (PDF ) Improved Attacks on Reduced-Round Camellia-128/192/256 Xiaoyang Dong, Leibo Li, Keting Jia, Xiaoyun Wang
2015/895 (PDF ) Rogue Decryption Failures: Reconciling AE Robustness Notions Guy Barwell, Dan Page, Martijn Stam
2015/894 (PDF ) Comparison of cube attacks over different vector spaces Richard Winter, Ana Salagean, Raphael C. -W. Phan
2015/893 (PDF ) Robust Authenticated Encryption and the Limits of Symmetric Cryptography Christian Badertscher, Christian Matt, Ueli Maurer, Phillip Rogaway, Björn Tackmann
2015/892 (PDF ) Security Against Related Randomness Attacks via Reconstructive Extractors Kenneth G. Paterson, Jacob C. N. Schuldt, Dale L. Sibborn, Hoeteck Wee
2015/891 (PDF ) Private Ciphertext-Policy Attribute-based Encryption Schemes With Constant-Size Ciphertext Supporting CNF Access Policy Sébastien Canard, Viet Cuong Trinh
2015/890 (PDF ) MI-T-HFE, a New Multivariate Signature Scheme Wenbin Zhang, Chik How Tan
2015/889 (PDF ) Which Ring Based Somewhat Homomorphic Encryption Scheme is Best? Anamaria Costache, Nigel P. Smart
2015/888 (PDF ) Tweak-Length Extension for Tweakable Blockciphers Kazuhiko Minematsu, Tetsu Iwata
2015/887 (PDF ) Composable Security in the Tamper Proof Hardware Model under Minimal Complexity Carmit Hazay, Antigoni Polychroniadou, Muthuramakrishnan Venkitasubramaniam
2015/886 (PDF ) Applying Cryptographic Acceleration Techniques to Error Correction Rémi Géraud, Diana-Stefania Maimut, David Naccache, Rodrigo Portella do Canto, Emil Simion
2015/885 (PDF ) A New Standard of Ukraine: The Kupyna Hash Function Roman Oliynykov, Ivan Gorbenko, Oleksandr Kazymyrov, Victor Ruzhentsev, Oleksandr Kuznetsov, Yurii Gorbenko, Artem Boiko, Oleksandr Dyrda, Viktor Dolgov, Andrii Pushkaryov
2015/884 (PDF ) General Circuit Realizing Compact Revocable Attribute-Based Encryption from Multilinear Maps Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
2015/882 (PDF ) Using Modular Extension to Provably Protect Edwards Curves Against Fault Attacks Margaux Dugardin, Sylvain Guilley, Martin Moreau, Zakaria Najm, Pablo Rauzy
2015/881 (PDF ) Generic Security of NMAC and HMAC with Input Whitening Peter Gaži, Krzysztof Pietrzak, Stefano Tessaro
2015/880 (PDF ) Generic Efficient Dynamic Proofs of Retrievability Mohammad Etemad, Alptekin Küpçü
2015/879 (PDF ) Computing information on domain parameters from public keys selected uniformly at random Martin Ekerå
2015/878 (PDF ) Making Existential-Unforgeable Signatures Strongly Unforgeable in the Quantum Random-Oracle Model Edward Eaton, Fang Song
2015/877 (PDF ) Study of a Parity Check Based Fault-Detection Countermeasure for the AES Key Schedule Christophe Clavier, Julien Francq, Antoine Wurcker
2015/876 (PDF ) 10-Round Feistel is Indifferentiable from an Ideal Cipher Dana Dachman-Soled, Jonathan Katz, Aishwarya Thiruvengadam
2015/875 (PDF ) Bent and Semi-bent Functions via Linear Translators Neşe Koçak, Sihem Mesnager, Ferruh Özbudak
2015/874 (PDF ) Indifferentiability of 10-Round Feistel Networks Yuanxi Dai, John Steinberger
2015/873 (PDF ) On the Diffusion Property of Iterated Functions Jian Liu, Sihem Mesnager, Lusheng Chen
2015/872 (PDF ) Traceability Improvements of a New RFID Protocol Based On EPC C1G2 Seyed Salman Sajjadi GhaemMaghami, Afrooz Haghbin, Mahtab Mirmohseni
2015/871 (PDF ) Photonic Side Channel Analysis of Arbiter PUFs Shahin Tajik, Enrico Dietz, Sven Frohmann, Helmar Dittrich, Dmitry Nedospasov, Clemens Helfmeier, Jean-Pierre Seifert, Christian Boit, Heinz-Wilhelm Hübers
2015/870 (PDF ) Gambling, Computational Information and Encryption Security Mohammad Hajiabadi, Bruce M. Kapron
2015/869 (PDF ) New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators Tatsuaki Okamoto, Krzysztof Pietrzak, Brent Waters, Daniel Wichs
2015/868 (PDF ) Optimally Secure Block Ciphers from Ideal Primitives Stefano Tessaro
2015/867 (PDF ) Multilinear and Aggregate Pseudorandom Functions: New Constructions and Improved Security Michel Abdalla, Fabrice Benhamouda, Alain Passelègue
2015/866 (PDF ) Graded Encoding, Variations on a Scheme Shai Halevi
2015/865 (PDF ) Card-based Cryptographic Protocols Using a Minimal Number of Cards Alexander Koch, Stefan Walzer, Kevin Härtel
2015/864 (PDF ) Encryption Performance Improvements of the Paillier Cryptosystem Christine Jost, Ha Lam, Alexander Maximov, Ben Smeets
2015/863 (PDF ) Is There an Oblivious RAM Lower Bound? Elette Boyle, Moni Naor
2015/862 (PDF ) Idealizing Identity-Based Encryption Dennis Hofheinz, Christian Matt, Ueli Maurer
2015/861 (PDF ) A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers Chun Guo, Dongdai Lin
2015/860 (PDF ) Selective Opening Security for Receivers Carmit Hazay, Arpita Patra, Bogdan Warinschi
2015/859 (PDF ) Factor Base Discrete Logarithms in Kummer Extensions Dianyan Xiao, Jincheng Zhuang, Qi Cheng
2015/858 (PDF ) Skipping the $q$ in Group Signatures Olivier Blazy, Saqib A. Kakvi
2015/857 (PDF ) Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy Benjamin Fuller, Ariel Hamlin
2015/856 (PDF ) MGR HASH FUNCTION Khushboo Bussi, Dhananjoy Dey, P. R. Mishra, B. K. Dass
2015/854 (PDF ) Efficient Fuzzy Extraction of PUF-Induced Secrets: Theory and Applications Jeroen Delvaux, Dawu Gu, Ingrid Verbauwhede, Matthias Hiller, Meng-Day (Mandel) Yu
2015/853 (PDF ) Standard Security Does Imply Security Against Selective Opening for Markov Distributions Georg Fuchsbauer, Felix Heuer, Eike Kiltz, Krzysztof Pietrzak
2015/852 (PDF ) Analysis of a key exchange protocol based on tropical matrix algebra Matvei Kotov, Alexander Ushakov
2015/851 (PDF ) Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing Benoît Cogliati, Yannick Seurin
2015/850 (PDF ) Traceable CP-ABE on Prime Order Groups: Fully Secure and Fully Collusion-resistant Blackbox Traceable Zhen Liu, Duncan S. Wong
2015/849 (PDF ) Regulating the Pace of von Neumann Correctors Houda Ferradi, Rémi Géraud, Diana Maimuţ, David Naccache, Amaury de Wargny
2015/848 (PDF ) The Multiplicative Complexity of Boolean Functions on Four and Five Variables Meltem Sonmez Turan, Rene Peralta
2015/847 (PDF ) Exploring Energy Efficiency of Lightweight Block Ciphers Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni
2015/846 (PDF ) Characterization of Secure Multiparty Computation Without Broadcast Ran Cohen, Iftach Haitner, Eran Omri, Lior Rotem
2015/845 (PDF ) Cryptanalysis of the Quadratic Zero-Testing of GGH Zvika Brakerski, Craig Gentry, Shai Halevi, Tancrède Lepoint, Amit Sahai, Mehdi Tibouchi
2015/844 (PDF ) DA-Encrypt: Homomorphic Encryption via Non-Archimedean Diophantine Approximation --- Preliminary Report Jeff Hoffstein, Jill Pipher, John M. Schanck, Joseph H. Silverman, William Whyte, Zhenfei Zhang
2015/843 (PDF ) Rethinking Privacy for Extended Sanitizable Signatures and a Black-Box Construction of Strongly Private Schemes David Derler, Daniel Slamanig
2015/842 (PDF ) On Linkability and Malleability in Self-blindable Credentials Jaap-Henk Hoepman, Wouter Lueks, Sietse Ringers
2015/841 (PDF ) An Efficient CP-ABE with Constant Size Secret Keys using ECC for Lightweight Devices Vanga Odelu, Ashok Kumar Das, Adrijit Goswami
2015/840 (PDF ) Related-key Impossible Differential Analysis of Full Khudra Qianqian Yang, Lei Hu, Siwei Sun, Ling Song
2015/839 (PDF ) Timing and Lattice Attacks on a Remote ECDSA OpenSSL Server: How Practical Are They Really? David Wong
2015/838 (PDF ) Offline Witness Encryption Hamza Abusalah, Georg Fuchsbauer, Krzysztof Pietrzak
2015/837 (PDF ) Multi-Variate High-Order Attacks of Shuffled Tables Recomputation Nicolas BRUNEAU, Sylvain GUILLEY, Zakaria NAJM, Yannick TEGLIA
2015/836 (PDF ) Ciphertext-Policy Attribute-Based Broadcast Encryption with Small Keys Benjamin Wesolowski, Pascal Junod
2015/835 (PDF ) On near prime-order elliptic curves with small embedding degrees (Full version) Duc-Phong Le, Nadia El Mrabet, Chik How Tan
2015/833 (PDF ) Efficient Key Authentication Service for Secure End-to-end Communications Mohammad Etemad, Alptekin Küpçü
2015/832 (PDF ) Characterising and Comparing the Energy Consumption of Side Channel Attack Countermeasures and Lightweight Cryptography on Embedded Devices David McCann, Kerstin Eder, Elisabeth Oswald
2015/831 (PDF ) M-MAP: Multi-Factor Memory Authentication for Secure Embedded Processors Syed Kamran Haider, Masab Ahmad, Farrukh Hijaz, Astha Patni, Ethan Johnson, Matthew Seita, Omer Khan, Marten van Dijk
2015/830 (PDF ) Unique Signature with Short Output from CDH Assumption Shiuan-Tzuo Shen, Amir Rezapour, Wen-Guey Tzeng
2015/829 (PDF ) Reducing Depth in Constrained PRFs: From Bit-Fixing to NC1 Nishanth Chandran, Srinivasan Raghuraman, Dhinakaran Vinayagamurthy
2015/828 (PDF ) State-recovery analysis of Spritz Ralph Ankele, Stefan Koelbl, Christian Rechberger
2015/827 (PDF ) Unbounded Hierarchical Identity-Based Encryption with Efficient Revocation Geumsook Ryu, Kwangsu Lee, Seunghwan Park, Dong Hoon Lee
2015/826 (PDF ) Programmable Hash Functions go Private:Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys Dario Catalano, Dario Fiore, Luca Nizzardo
2015/825 (PDF ) The Emperor's New Password Creation Policies Ding Wang, Ping Wang
2015/824 (PDF ) Efficient Fully Structure-Preserving Signatures for Large Messages Jens Groth
2015/823 (PDF ) Efficient (ideal) lattice sieving using cross-polytope LSH Anja Becker, Thijs Laarhoven
2015/822 (PDF ) Efficiently Obfuscating Re-Encryption Program under DDH Assumption Akshayaram Srinivasan, C. Pandu Rangan
2015/821 (PDF ) A general framework for building noise-free homomorphic cryptosystems Gérald Gavin
2015/820 (PDF ) Extended Nested Dual System Groups, Revisited Junqing Gong, Jie Chen, Xiaolei Dong, Zhenfu Cao, Shaohua Tang
2015/819 (PDF ) Improving the Big Mac Attack on Elliptic Curve Cryptography Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, Cédric Murdica, David Naccache
2015/818 (PDF ) cuHE: A Homomorphic Encryption Accelerator Library Wei Dai, Berk Sunar
2015/817 (PDF ) Secure Multiparty Computation of a Social Network Varsha Bhat Kukkala, Jaspal Singh Saini, S. R. S. Iyengar
2015/816 (PDF ) Analysis of Keyless Massive MIMO-based Cryptosystem Security Valery Korzhik, Guillermo Morales-Luna, Sergei Tikhonov, Victor Yakovlev
2015/815 (PDF ) On the Power of Hierarchical Identity-Based Encryption Mohammad Mahmoody, Ameer Mohammed
2015/814 (PDF ) CLKS: Certificateless Keyword Search on Encrypted Data Qingji Zheng, Xiangxue Li, Aytac Azgin
2015/813 (PDF ) Revisiting Turning Online Cipher Off Ritam Bhaumik, Mridul Nandi
2015/812 (PDF ) The Secret Structure of the S-Box of Streebog, Kuznechik and Stribob Alex Biryukov, Léo Perrin, Aleksei Udovenko
2015/811 (PDF ) Key-recovery attacks against the MAC algorithm Chaskey Chrysanthi Mavromati
2015/810 (PDF ) Improved OR Composition of Sigma-Protocols Michele Ciampi, Giuseppe Persiano, Alessandra Scafuro, Luisa Siniscalchi, Ivan Visconti
2015/809 (PDF ) New Techniques for Electronic Voting Alan Szepieniec, Bart Preneel
2015/808 (PDF ) Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks Mihir Bellare, Joseph Jaeger, Daniel Kane
2015/807 (PDF ) Fair Distributed Computation of Reactive Functions Juan Garay, Björn Tackmann, Vassilis Zikas
2015/806 (PDF ) Fault Space Transformation: A Generic Approach to Counter Differential Fault Analysis and Differential Fault Intensity Analysis on AES-like Block Ciphers Sikhar Patranabis, Abhishek Chakraborty, Debdeep Mukhopadhyay, P. P. Chakrabarti
2015/805 (PDF ) A classification of elliptic curves with respect to the GHS attack in odd characteristic Tsutomu Iijima, Fumiyuki Momose, Jinhui Chao
2015/804 (PDF ) SECURE MULTI-PARTY COMPUTATION: HOW TO SOLVE THE CONFLICT BETWEEN SECURITY & BUSINESS INTELLIGENCE Sumit Chakraborty
2015/803 (PDF ) Statistical and Algebraic Properties of DES Stian Fauskanger, Igor Semaev
2015/802 (PDF ) Ciphertext-only attack on d*d Hill in O(d13^d) Shahram Khazaei, Siavash Ahmadi
2015/801 (PDF ) Scalar Blinding on Elliptic Curves based on Primes with Special Structure Scott Fluhrer
2015/799 (PDF ) Secure Binary Field Multiplication Hwajeong Seo, Chien-Ning Chen, Zhe Liu, Yasuyuki Nogami, Taehwan Park, Jongseok Choi, Howon Kim
2015/797 (PDF ) What Security Can We Achieve within 4 Rounds? Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
2015/796 (PDF ) Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack Kartik Nayak, Srijan Kumar, Andrew Miller, Elaine Shi
2015/795 (PDF ) Fast and Memory-Efficient Key Recovery in Side-Channel Attacks Andrey Bogdanov, Ilya Kizhvatov, Kamran Manzoor, Elmar Tischhauser, Marc Witteman
2015/794 (PDF ) Safe-Errors on SPA Protected implementations with the Atomicity Technique Pierre-Alain Fouque, Sylvain Guilley, Cédric Murdica, David Naccache
2015/793 (PDF ) Algorithmic Information Theory for Obfuscation Security Rabih Mohsen, Alexandre Miranda Pinto
2015/792 (PDF ) Standard Security Does Not Imply Indistinguishability Under Selective Opening Dennis Hofheinz, Vanishree Rao, Daniel Wichs
2015/791 (PDF ) On the Equivalence of Obfuscation and Multilinear Maps Omer Paneth, Amit Sahai
2015/790 (PDF ) On weak and strong 2^k-bent Boolean functions Pantelimon Stanica
2015/789 (PDF ) Efficient Hardware Implementations of the Warbler Pseudorandom Number Generator Gangqiang Yang, Mark D. Aagaard, Guang Gong
2015/788 (PDF ) Cracking-Resistant Password Vaults using Natural Language Encoders Rahul Chatterjee, Joseph Bonneau, Ari Juels, Thomas Ristenpart
2015/787 (PDF ) Backtracking-Assisted Multiplication Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, Hang Zhou
2015/786 (PDF ) Buying AES Design Resistance with Speed and Energy Jean-Michel Cioranesco, Roman Korkikian, David Naccache, Rodrigo Portella do Canto
2015/785 (PDF ) Double-Speed Barrett Moduli Rémi Géraud, Diana Maimut, David Naccache
2015/784 (PDF ) Threshold FlipThem: When the winner does not need to take all David Leslie, Chris Sherfield, Nigel P. Smart
2015/783 (PDF ) Cryptanalysis of the Authenticated Encryption Algorithm COFFE Ivan Tjuawinata, Tao Huang, Hongjun Wu
2015/782 (PDF ) Secure two-party computation in applied pi-calculus: models and verification Sergiu Bursuc
2015/781 (PDF ) Twisted Hessian curves Daniel J. Bernstein, Chitchanok Chuengsatiansup, David Kohel, Tanja Lange
2015/780 (PDF ) Multilinear Maps from Obfuscation Martin R. Albrecht, Pooya Farshim, Shuai Han, Dennis Hofheinz, Enrique Larraia, Kenneth G. Paterson
2015/779 (PDF ) A Simple Scheme, for Strengthening Product-sum Type PKC Masao KASAHARA
2015/776 (PDF ) Functional Encryption for Turing Machines Prabhanjan Ananth, Amit Sahai
2015/775 (PDF ) Efficient MDS Diffusion Layers Through Decomposition of Matrices S. M. Dehnavi, M. R. Mirzaee Shamsabad, A. Mahmoodi Rishakani, Y. Fekri Dabanloo
2015/774 (PDF ) Revisiting Prime Power RSA Santanu Sarkar
2015/773 (PDF ) Distinguishing a truncated random permutation from a random function Shoni Gilboa, Shay Gueron
2015/772 (PDF ) Non-Malleable Encryption: Simpler, Shorter, Stronger Sandro Coretti, Yevgeniy Dodis, Björn Tackmann, Daniele Venturi
2015/771 (PDF ) A SAT-based Public Key Cryptography Scheme Sebastian E. Schmittner
2015/770 (PDF ) A Transform for NIZK Almost as Efficient and General as the Fiat-Shamir Transform Without Programmable Random Oracles Michele Ciampi, Giuseppe Persiano, Luisa Siniscalchi, Ivan Visconti
2015/769 (PDF ) On the Hardness of Learning with Rounding over Small Modulus Andrej Bogdanov, Siyao Guo, Daniel Masny, Silas Richelson, Alon Rosen
2015/768 (PDF ) Interdiction in Practice – Hardware Trojan Against a High-Security USB Flash Drive Pawel Swierczynski, Marc Fyrbiak, Philipp Koppe, Amir Moradi, Christof Paar
2015/767 (PDF ) Dual EC: A Standardized Back Door Daniel J. Bernstein, Tanja Lange, Ruben Niederhagen
2015/766 (PDF ) Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications Peng Wang, Yuling Li, Liting Zhang, Kaiyan Zheng
2015/765 (PDF ) Sanitizable Signcryption: Sanitization over Encrypted Data (Full Version) Victoria Fehr, Marc Fischlin
2015/764 (PDF ) On Generating Coset Representatives of PGL_2(\F_q) in PGL_2(\F_{q^2}) Jincheng Zhuang, Qi Cheng
2015/763 (PDF ) Highly Efficient GF(2^8) Inversion Circuit Based on Redundant GF Arithmetic and Its Application to AES Design Rei Ueno, Naofumi Homma, Yukihiro Sugawara, Yasuyuki Nogami, Takafumi Aoki
2015/762 (PDF ) A Meet-in-the-Middle Attack on Reduced-Round Kalyna-b/2b Riham AlTawy, Ahmed Abdelkhalek, Amr M. Youssef
2015/761 (PDF ) Implementation of the SCREAM Tweakable Block Cipher in MSP430 Assembly Language William Diehl
2015/760 (PDF ) Investigating SRAM PUFs in large CPUs and GPUs Pol Van Aubel, Daniel J. Bernstein, Ruben Niederhagen
2015/759 (PDF ) Cryptanalysis of Gu's ideal multilinear map Alice Pellet-Mary, Damien Stehle
2015/758 (PDF ) Ring-LWE Cryptography for the Number Theorist Yara Elias, Kristin E. Lauter, Ekin Ozman, Katherine E. Stange
2015/757 (PDF ) Stream Cipher Operation Modes with Improved Security against Generic Collision Attacks Matthias Hamann, Matthias Krause
2015/756 (PDF ) Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme Yandong Zheng, Hua Guo
2015/755 (PDF ) Revisiting TESLA in the quantum random oracle model Erdem Alkim, Nina Bindel, Johannes Buchmann, Özgür Dagdelen, Edward Eaton, Gus Gutoski, Juliane Krämer, Filip Pawlega
2015/754 (PDF ) Related-Key Attack on Full-Round PICARO Anne Canteaut, Virginie Lallemand, María Naya-Plasencia
2015/753 (PDF ) Differential Computation Analysis: Hiding your White-Box Designs is Not Enough Joppe W. Bos, Charles Hubain, Wil Michiels, Philippe Teuwen
2015/752 (PDF ) On Constructing One-Way Permutations from Indistinguishability Obfuscation Gilad Asharov, Gil Segev
2015/751 (PDF ) Fast Garbling of Circuits Under Standard Assumptions Shay Gueron, Yehuda Lindell, Ariel Nof, Benny Pinkas
2015/750 (PDF ) Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key Ryo Nishimaki, Daniel Wichs, Mark Zhandry
2015/749 (PDF ) Affine Equivalence and its Application to Tightening Threshold Implementations Pascal Sasdrich, Amir Moradi, Tim Güneysu
2015/748 (PDF ) A More Cautious Approach to Security Against Mass Surveillance Jean Paul Degabriele, Pooya Farshim, Bertram Poettering
2015/747 (PDF ) Self-bilinear Map from One Way Encoding System and Indistinguishability Obfuscation Huang Zhang, Fangguo Zhang, Baodian Wei, Yusong Du
2015/746 (PDF ) A 2^{70} Attack on the Full MISTY1 Achiya Bar-On
2015/745 (PDF ) Faster ECC over F2571 (feat. PMULL) Hwajeong Seo
2015/744 (PDF ) BitCryptor: Bit-Serialized Compact Crypto Engine on Reconfigurable Hardware Ege Gulcan, Aydin Aysu, Patrick Schaumont
2015/743 (PDF ) Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions Benoit Libert, Thomas Peters, Moti Yung
2015/742 (PDF ) A Matrix Decomposition Method for Optimal Normal Basis Multiplication Can Kızılkale, Ömer Eǧecioǧlu, Çetin Kaya Koç
2015/741 (PDF ) On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes Mohammad Hajiabadi, Bruce M. Kapron, Venkatesh Srinivasan
2015/740 (PDF ) Predictable Arguments of Knowledge Antonio Faonio, Jesper Buus Nielsen, Daniele Venturi
2015/738 (PDF ) Authenticated Encryption with Small Stretch (or, How to Accelerate AERO) Kazuhiko Minematsu
2015/737 (PDF ) New multilinear maps from ideal lattices Gu Chunsheng
2015/735 (PDF ) Cutting-Edge Cryptography Through the Lens of Secret Sharing Ilan Komargodski, Mark Zhandry
2015/733 (PDF ) Fully Homomorphic Encryption on Octonion Ring Masahiro Yagisawa
2015/732 (PDF ) Compact Implementations of LEA Block Cipher for Low-End Microprocessors Hwajeong Seo, Zhe Liu, Jongseok Choi, Taehwan Park, Howon Kim
2015/731 (PDF ) Same Value Analysis on Edwards Curves Rodrigo Abarzúa, Santi Martínez, Valeria Mendoza
2015/730 (PDF ) Indistinguishability Obfuscation from Functional Encryption for Simple Functions Prabhanjan Ananth, Abhishek Jain, Amit Sahai
2015/729 (PDF ) Provably-Secure Remote Memory Attestation to Prevent Heap Overflow Attacks Alexandra Boldyreva, Taesoo Kim, Richard Lipton, Bogdan Warinschi
2015/728 (PDF ) Provable Virus Detection: Using the Uncertainty Principle to Protect Against Malware Richard J. Lipton, Rafail Ostrovsky, Vassilis Zikas
2015/727 (PDF ) DPA, Bitslicing and Masking at 1 GHz Josep Balasch, Benedikt Gierlichs, Oscar Reparaz, Ingrid Verbauwhede
2015/726 (PDF ) Compositions of linear functions and applications to hashing Vladimir Shpilrain, Bianca Sosnovski
2015/725 (PDF ) The self-blindable U-Prove scheme from FC'14 is forgeable Eric Verheul, Sietse Ringers, Jaap-Henk Hoepman
2015/724 (PDF ) A masked ring-LWE implementation Oscar Reparaz, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede
2015/723 (PDF ) Cryptanalysis of Feistel Networks with Secret Round Functions Alex Biryukov, Gaëtan Leurent, Léo Perrin
2015/722 (PDF ) Oblivious Substring Search with Updates Tarik Moataz, Erik-Oliver Blass
2015/721 (PDF ) KDM-Security via Homomorphic Smooth Projective Hashing Hoeteck Wee
2015/720 (PDF ) Output-Compressing Randomized Encodings and Applications Huijia Lin, Rafael Pass, Karn Seth, Sidharth Telang
2015/719 (PDF ) Consolidating masking schemes Oscar Reparaz, Begül Bilgin, Svetla Nikova, Benedikt Gierlichs, Ingrid Verbauwhede
2015/718 (PDF ) Efficient Asynchronous Accumulators for Distributed PKI Leonid Reyzin, Sophia Yakoubov
2015/717 (PDF ) Towards Secure Cryptographic Software Implementation Against Side-Channel Power Analysis Attacks Pei Luo, Liwei Zhang, Yunsi Fei, A. Adam Ding
2015/716 (PDF ) Linear Cryptanalysis of Reduced-Round SIMECK Variants Nasour Bagheri
2015/715 (PDF ) New Circular Security Counterexamples from Decision Linear and Learning with Errors Allison Bishop, Susan Hohenberger, Brent Waters
2015/714 (PDF ) New classes of public key cryptosystem K(XVI)SE(1)PKC constructed based on Reed-Solomon code over extension field of m=8 and K(XVI)SE(2)PKC, based on binary cyclic code. Masao KASAHARA
2015/712 (PDF ) Adaptive Proofs have Straightline Extractors (in the Random Oracle Model) David Bernhard, Bogdan Warinschi, Ngoc Khanh Nguyen
2015/711 (PDF ) Construction of Lightweight S-Boxes using Feistel and MISTY structures (Full Version) Anne Canteaut, Sébastien Duval, Gaëtan Leurent
2015/710 (PDF ) Privacy-Preserving Content-Based Image Retrieval in the Cloud (Extended Version) Bernardo Ferreira, João Rodrigues, João Leitão, Henrique Domingos
2015/709 (PDF ) Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception Luka Malisa, Kari Kostiainen, Srdjan Capkun
2015/708 (PDF ) Choosing Parameters for NTRUEncrypt Jeff Hoffstein, Jill Pipher, John M. Schanck, Joseph H. Silverman, William Whyte, Zhenfei Zhang
2015/707 (PDF ) Reconciling User Privacy and Implicit Authentication for Mobile Devices Siamak F. Shahandashti, Reihaneh Safavi-Naini, Nashad Ahmed Safa
2015/706 (PDF ) A Brief Comparison of Simon and Simeck Stefan Kölbl, Arnab Roy
2015/705 (PDF ) Linear Overhead Optimally-resilient Robust MPC Using Preprocessing Ashish Choudhury, Emmanuela Orsini, Arpita Patra, Nigel P. Smart
2015/704 (PDF ) Indistinguishability Obfuscation: from Approximate to Exact Nir Bitansky, Vinod Vaikuntanathan
2015/703 (PDF ) Point-Function Obfuscation: A Framework and Generic Constructions Mihir Bellare, Igors Stepanovs
2015/702 (PDF ) Demystifying incentives in the consensus computer Loi Luu, Jason Teutsch, Raghav Kulkarni, Prateek Saxena
2015/701 (PDF ) Differentially private instance-based noise mechanisms in practice Sébastien Canard, Baptiste Olivier, Tony Quertier
2015/700 (PDF ) Four Neighbourhood Cellular Automata as Better Cryptographic Primitives Jimmy Jose, Dipanwita RoyChowdhury
2015/699 (PDF ) FURISC: FHE Encrypted URISC Design Ayantika Chatterjee, Indranil Sengupta
2015/698 (PDF ) Chosen IV Cryptanalysis on Reduced Round ChaCha and Salsa Subhamoy Maitra
2015/697 (PDF ) On the Security of a Self-healing Group Key Distribution Scheme Yandong Zheng, Hua Guo
2015/696 (PDF ) Novel algorithms and hardware architectures for Montgomery Multiplication over GF(p) Miguel Morales Sandoval, Arturo Diaz Perez
2015/695 (PDF ) Cliptography: Clipping the Power of Kleptographic Attacks Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou
2015/694 (PDF ) On the Complexity of Additively Homomorphic UC Commitments Tore Kasper Frederiksen, Thomas P. Jakobsen, Jesper Buus Nielsen, Roberto Trifiletti
2015/693 (PDF ) Foundations of Reactive Garbling Schemes Jesper Buus Nielsen, Samuel Ranellucci
2015/692 (PDF ) Fast and Secure Linear Regression and Biometric Authentication with Security Update Yoshinori Aono, Takuya Hayashi, Le Trieu Phong, Lihua Wang
2015/691 (PDF ) SpecTre: A Tiny Side-Channel Resistant Speck Core for FPGAs Cong Chen, Mehmet Sinan Inci, Mostafa Taha, Thomas Eisenbarth
2015/690 (PDF ) Systematic Reverse Engineering of Cache Slice Selection in Intel Processors Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar
2015/689 (PDF ) Counting Keys in Parallel After a Side Channel Attack Daniel P. Martin, Jonathan F. O'Connell, Elisabeth Oswald, Martijn Stam
2015/688 (PDF ) Binary Field Multiplication on ARMv8 Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Howon Kim
2015/687 (PDF ) Classical Cryptographic Protocols in a Quantum World Sean Hallgren, Adam Smith, Fang Song
2015/686 (PDF ) Cryptanalysis for Secure and Efficient Smart-Card-Based Remote User Authentication Scheme for Multi-server Environment Azeem Irshad, Muhammad Sher, Shahzad Ashraf, Shahzad faisal, Mahmood Ul Hassan
2015/685 (PDF ) On the discrete logarithm problem in finite fields of fixed characteristic Robert Granger, Thorsten Kleinjung, Jens Zumbrägel
2015/684 (PDF ) A One-time Stegosystem and Applications to Efficient Covert Communication Aggelos Kiayias, Yona Raekow, Alexander Russell, Narasimha Shashidhar
2015/683 (PDF ) Security of Linear Secret-Sharing Schemes against Mass Surveillance Irene Giacomelli, Ruxandra F. Olimid, Samuel Ranellucci
2015/682 (PDF ) Integral Cryptanalysis on Full MISTY1 Yosuke Todo
2015/681 (PDF ) ANONIZE: A Large-Scale Anonymous Survey System Susan Hohenberger, Steven Myers, Rafael Pass, abhi shelat
2015/680 (PDF ) Indifferentiability of Confusion-Diffusion Networks Yevgeniy Dodis, Tianren Liu, Martijn Stam, John Steinberger
2015/679 (PDF ) Another Look at Normal Approximations in Cryptanalysis Subhabrata Samajder, Palash Sarkar
2015/678 (PDF ) Optimizing MAKWA on GPU and CPU Thomas Pornin
2015/677 (PDF ) EdDSA for more curves Daniel J. Bernstein, Simon Josefsson, Tanja Lange, Peter Schwabe, Bo-Yin Yang
2015/676 (PDF ) Quantum Cryptanalysis of NTRU Scott Fluhrer
2015/675 (PDF ) Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts Ahmed Kosba, Andrew Miller, Elaine Shi, Zikai Wen, Charalampos Papamanthou
2015/674 (PDF ) Preprocessing-Based Verification of Multiparty Protocols with Honest Majority Roman Jagomägis, Peeter Laud, Alisa Pankova
2015/673 (PDF ) Decaf: Eliminating cofactors through point compression Mike Hamburg
2015/672 (PDF ) Function-Hiding Inner Product Encryption Allison Bishop, Abhishek Jain, Lucas Kowalczyk
2015/671 (PDF ) Privacy-preserving Frequent Itemset Mining for Sparse and Dense Data Peeter Laud, Alisa Pankova
2015/670 (PDF ) Smart Security Management in Secure Devices Bruno Robisson, Michel Agoyan, Patrick Soquet, Sébastien Le Henaff, Franck Wajsbürt, Pirouz Bazargan-Sabet, Guillaume Phan
2015/669 (PDF ) GMU Hardware API for Authenticated Ciphers Ekawat Homsirikamol, William Diehl, Ahmed Ferozpuri, Farnoud Farahmand, Malik Umar Sharif, Kris Gaj
2015/668 (PDF ) The Fallacy of Composition of Oblivious RAM and Searchable Encryption Muhammad Naveed
2015/667 (PDF ) De Bruijn Sequences from Joining Cycles of Nonlinear Feedback Shift Registers Ming Li, Cees J. A. Jansen, Dongdai Lin, Qiuyan Wang
2015/666 (PDF ) Improved Linear Hull Attack on Round-Reduced \textsc{Simon} with Dynamic Key-guessing Techniques Huaifeng Chen, Xiaoyun Wang
2015/665 (PDF ) Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based Encryption. Romain Gay, Iordanis Kerenidis, Hoeteck Wee
2015/664 (PDF ) Secure Multi-Party Shuffling Mahnush Movahedi, Jared Saia, Mahdi Zamani
2015/663 (PDF ) Analyzing the Efficiency of Biased-Fault Based Attacks Nahid Farhady Ghalaty, Bilgiday Yuce, Patrick Schaumont
2015/662 (PDF ) Strong Security of the Strongly Multiplicative Ramp Secret Sharing based on Algebraic Curves Ryutaroh Matsumoto
2015/661 (PDF ) Cryptanalysis of a modern rotor machine in a multicast setting Shane Kepley, David Russo, Rainer Steinwandt
2015/659 (PDF ) Diversity and Transparency for ECC Jean-Pierre Flori, Jérôme Plût, Jean-René Reinhard, Martin Ekerå
2015/658 (PDF ) Single-Cycle Implementations of Block Ciphers Pieter Maene, Ingrid Verbauwhede
2015/657 (PDF ) Randomizing the Montgomery Powering Ladder Duc-Phong Le, Chik How Tan, Michael Tunstall
2015/656 (PDF ) Cryptanalysis of a Markov Chain Based User Authentication Scheme Ruhul Amin, G. P. Biswas
2015/655 (PDF ) An Efficient Multi-Message Multi-Receiver Signcryption Scheme with Forward Secrecy on Elliptic Curves Nizamud Din, Arif Iqbal Umar, Abdul Waheed, Noor Ul Amin
2015/654 (PDF ) DAA-TZ: An Efficient DAA Scheme for Mobile Devices using ARM TrustZone Bo Yang, Kang Yang, Yu Qin, Zhenfeng Zhang, Dengguo Feng
2015/652 (PDF ) Modelling ciphersuite and version negotiation in the TLS protocol Benjamin Dowling, Douglas Stebila
2015/651 (PDF ) Secure Execution Architecture based on PUF-driven Instruction Level Code Encryption Stephan Kleber, Florian Unterstein, Matthias Matousek, Frank Kargl, Frank Slomka, Matthias Hiller
2015/650 (PDF ) A New Encryption Standard of Ukraine: The Kalyna Block Cipher Roman Oliynykov, Ivan Gorbenko, Oleksandr Kazymyrov, Victor Ruzhentsev, Oleksandr Kuznetsov, Yurii Gorbenko, Oleksandr Dyrda, Viktor Dolgov, Andrii Pushkaryov, Ruslan Mordvinov, Dmytro Kaidalov
2015/649 (PDF ) On the Hardness of Proving CCA-security of Signed ElGamal David Bernhard, Marc Fischlin, Bogdan Warinschi
2015/648 (PDF ) Adaptive Proofs of Knowledge in the Random Oracle Model David Bernhard, Marc Fischlin, Bogdan Warinschi
2015/647 (PDF ) Efficient ephemeral elliptic curve cryptographic keys Andrea Miele, Arjen K. Lenstra
2015/646 (PDF ) Decomposition attack on SASASASAS Alex Biryukov, Dmitry Khovratovich
2015/644 (PDF ) The Pythia PRF Service Adam Everspaugh, Rahul Chatterjee, Samuel Scott, Ari Juels, Thomas Ristenpart
2015/643 (PDF ) Short Accountable Ring Signatures Based on DDH Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Essam Ghadafi, Jens Groth, Christophe Petit
2015/642 (PDF ) A New Partial Key Exposure Attack on Multi-power RSA Muhammed F. Esgin, Mehmet S. Kiraz, Osmanbey Uzunkol
2015/641 (PDF ) Noise-Free Symmetric Fully Homomorphic Encryption Based on Non-Commutative Rings Jing Li, Licheng Wang
2015/640 (PDF ) Very-efficient simulatable flipping of many coins into a well Luís T. A. N. Brandão
2015/638 (PDF ) An Efficient Many-Core Architecture for Elliptic Curve Cryptography Security Assessment Marco Indaco, Fabio Lauri, Andrea Miele, Pascal Trotta
2015/637 (PDF ) A Novel Cyberspace-Oriented Access Control Model Fenghua Li, Yanchao Wang, Rongna Xie, Jinbo Xiong, Fangfang Shan
2015/636 (PDF ) On Stream Ciphers with Provable Beyond-the-Birthday-Bound Security against Time-Memory-Data Tradeoff Attacks Matthias Hamann, Matthias Krause
2015/635 (PDF ) Microcash: Efficient Off-Line Small Payments Chris Pavlovski, Colin Boyd
2015/634 (PDF ) Phasing: Private Set Intersection using Permutation-based Hashing Benny Pinkas, Thomas Schneider, Gil Segev, Michael Zohner
2015/633 (PDF ) An Efficient ID-Based Message Recoverable Privacy-Preserving Auditing Scheme Mehmet Sabır Kiraz, İsa Sertkaya, Osmanbey Uzunkol
2015/632 (PDF ) On the Impossibility of Virtual Black-Box Obfuscation in Idealized Models Mohammad Mahmoody, Ameer Mohammed, Soheil Nematihaji
2015/631 (PDF ) Accelerating Homomorphic Evaluation on Reconfigurable Hardware Thomas Pöppelmann, Michael Naehrig, Andrew Putnam, Adrian Macias
2015/630 (PDF ) Unconditionally Secure Computation with Reduced Interaction Ivan Damgård, Jesper Buus Nielsen, Rafail Ostovsky, Adi Rosen
2015/629 (PDF ) BeleniosRF: A Non-interactive Receipt-Free Electronic Voting Scheme Pyrros Chaidos, Véronique Cortier, Georg Fuchsbauer, David Galindo
2015/628 (PDF ) An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme Daniel Cabarcas, Denise Demirel, Florian Göpfert, Jean Lancrenon, Thomas Wunderer
2015/627 (PDF ) On Necessary Padding with IO Justin Holmgren
2015/626 (PDF ) Practical Round-Optimal Blind Signatures in the Standard Model Georg Fuchsbauer, Christian Hanser, Daniel Slamanig
2015/625 (PDF ) Ed448-Goldilocks, a new elliptic curve Mike Hamburg
2015/624 (PDF ) Automated Analysis and Synthesis of Authenticated Encryption Schemes Viet Tung Hoang, Jonathan Katz, Alex J. Malozemoff
2015/622 (PDF ) Random Digit Representation of Integers Nicolas Méloni, M. Anwar Hasan
2015/621 (PDF ) Who watches the watchmen? : Utilizing Performance Monitors for Compromising keys of RSA on Intel Platforms Sarani Bhattacharya, Debdeep Mukhopadhyay
2015/620 (PDF ) Statistical Concurrent Non-malleable Zero-knowledge from One-way Functions Susumu Kiyoshima
2015/619 (PDF ) Construction of Arithmetic Secret Sharing Schemes by Using Torsion Limits Seher Tutdere, Osmanbey Uzunkol
2015/618 (PDF ) An Authentication Code over Galois Rings with Optimal Impersonation and Substitution Probabilities Juan Carlos Ku-Cauich, Guillermo Morales-Luna, Horacio Tapia-Recillas
2015/617 (PDF ) Generalised tally-based decoders for traitor tracing and group testing Boris Skoric, Wouter de Groot
2015/616 (PDF ) The leaking battery: A privacy analysis of the HTML5 Battery Status API Lukasz Olejnik, Gunes Acar, Claude Castelluccia, Claudia Diaz
2015/615 (PDF ) Security Analysis of Niu et al. Authentication and Ownership Management Protocol Nasour Bagheri, Masoumeh Safkhani, Hoda Jannati
2015/614 (PDF ) Bit Security of the Hyperelliptic Curves Diffie-Hellman Problem Fangguo Zhang
2015/613 (PDF ) Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud Jianting Ning, Xiaolei Dong, Zhenfu Cao, Lifei Wei
2015/612 (PDF ) The Simeck Family of Lightweight Block Ciphers Gangqiang Yang, Bo Zhu, Valentin Suder, Mark D. Aagaard, Guang Gong
2015/610 (PDF ) McBits: fast constant-time code-based cryptography Daniel J. Bernstein, Tung Chou, Peter Schwabe
2015/609 (PDF ) Experimental Study of DIGIPASS GO3 and the Security of Authentication Igor Semaev
2015/608 (PDF ) Fully Secure Functional Encryption for Inner Products, from Standard Assumptions Shweta Agrawal, Benoit Libert, Damien Stehle
2015/607 (PDF ) Netcoin - A Traceable P2P Electronic Cash System Hitesh Tewari, Eamon O Nuallain
2015/606 (PDF ) Constructing Efficient PAKE Protocols from Identity-Based KEM/DEM Kyu Young Choi, Jihoon Cho, Jung Yeon Hwang, Taekyoung Kwon
2015/605 (PDF ) Computing Elliptic Curve Discrete Logarithms with Improved Baby-step Giant-step Algorithm Steven D. Galbraith, Ping Wang, Fangguo Zhang
2015/604 (PDF ) Structure-Preserving Signatures from Standard Assumptions, Revisited Eike Kiltz, Jiaxin Pan, Hoeteck Wee
2015/603 (PDF ) Complementary Dual Codes for Counter-measures to Side-Channel Attacks Claude Carlet, Sylvain Guilley
2015/602 (PDF ) Combined Side-Channel and Fault Analysis Attack on Protected Grain Family of Stream Ciphers Abhishek Chakraborty, Bodhisatwa Mazumdar, Debdeep Mukhopadhay
2015/601 (PDF ) A Secure Oblivious Transfer Protocol from Indistinguishing Obfuscation Mei Wang, Zheng Yuan, Xiao Feng
2015/600 (PDF ) Predictive Models for Min-Entropy Estimation John Kelsey, Kerry A. McKay, Meltem Sonmez Turan
2015/599 (PDF ) The Chain Rule for HILL Pseudoentropy, Revisited Krzysztof Pietrzak, Maciej Skorski
2015/598 (PDF ) Combining Differential Privacy and Secure Multiparty Computation Martin Pettai, Peeter Laud
2015/597 (PDF ) Assessment of Hiding the Higher-Order Leakages in Hardware - what are the achievements versus overheads? Amir Moradi, Alexander Wild
2015/596 (PDF ) Zeroizing Without Low-Level Zeroes: New MMAP Attacks and Their Limitations Jean-Sébastien Coron, Craig Gentry, Shai Halevi, Tancrède Lepoint, Hemanta K. Maji, Eric Miles, Mariana Raykova, Amit Sahai, Mehdi Tibouchi
2015/594 (PDF ) Disk Encryption: Do We Need to Preserve Length? Debrup Chakraborty, Cuauhtemoc Mancillas-Lopez, Palash Sarkar
2015/593 (PDF ) A Physical Approach for Stochastic Modeling of TERO-based TRNG Patrick HADDAD, Viktor FISCHER, Florent BERNARD, Jean NICOLAI
2015/592 (PDF ) Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information Milivoj Simeonovski, Fabian Bendun, Muhammad Rizwan Asghar, Michael Backes, Ninja Marnau, Peter Druschel
2015/591 (PDF ) How much randomness can be extracted from memoryless Shannon entropy sources? Maciej Skorski
2015/590 (PDF ) TriviA: A Fast and Secure Authenticated Encryption Scheme Avik Chakraborti, Anupam Chattopadhyay, Muhammad Hassan, Mridul Nandi
2015/589 (PDF ) Generating S-Box Multivariate Quadratic Equation Systems And Estimating Algebraic Attack Resistance Aided By SageMath A. -M. Leventi-Peetz, J. -V. Peetz
2015/588 (PDF ) An analysis of the $C$ class of bent functions Bimal Mandal, Pantelimon Stanica, Sugata Gangopadhyay, Enes Pasalic
2015/587 (PDF ) AN ENHANCED BIOMETRIC BASED REMOTE USER AUTHENTICATION SCHEME USING SMART CARD Trupil Limbasiya, Nishant Doshi
2015/585 (PDF ) SIMON and SPECK: Block Ciphers for the Internet of Things Ray Beaulieu, Douglas Shors, Jason Smith, Stefan Treatman-Clark, Bryan Weeks, Louis Wingers
2015/584 (PDF ) How to Securely Prolong the Computational Bindingness of Pedersen Commitments Denise Demirel, Jean Lancrenon
2015/583 (PDF ) Secure Key Generation from Biased PUFs Roel Maes, Vincent van der Leest, Erik van der Sluis, Frans Willems
2015/582 (PDF ) How Secure and Quick is QUIC? Provable Security and Performance Analyses Robert Lychev, Samuel Jero, Alexandra Boldyreva, Cristina Nita-Rotaru
2015/581 (PDF ) Universal Computational Extractors and the Superfluous Padding Assumption for Indistinguishability Obfuscation Chris Brzuska, Arno Mittelbach
2015/580 (PDF ) Composable & Modular Anonymous Credentials: Definitions and Practical Constructions Jan Camenisch, Maria Dubovitskaya, Kristiyan Haralambiev, Markulf Kohlweiss
2015/579 (PDF ) A Simple Proof of a Distinguishing Bound of Iterated Uniform Random Permutation Mridul Nandi
2015/578 (PDF ) Tampering with the Delivery of Blocks and Transactions in Bitcoin Arthur Gervais, Hubert Ritzdorf, Ghassan O. Karame, Srdjan Capkun
2015/577 (PDF ) Twist Insecurity Manfred Lochter, Andreas Wiemers
2015/576 (PDF ) The Carnac protocol -- or how to read the contents of a sealed envelope Michael Scott, Brian Spector
2015/575 (PDF ) Known-key Distinguisher on Full PRESENT Céline Blondeau, Thomas Peyrin, Lei Wang
2015/574 (PDF ) Fair and Robust Multi-Party Computation using a Global Transaction Ledger Aggelos Kiayias, Hong-Sheng Zhou, Vassilis Zikas
2015/573 (PDF ) Last fall degree, HFE, and Weil descent attacks on ECDLP Ming-Deh A. Huang, Michiel Kosters, Sze Ling Yeo
2015/572 (PDF ) On Public Key Encryption from Noisy Codewords Eli Ben-Sasson, Iddo Ben-Tov, Ivan Damgard, Yuval Ishai, Noga ron-Zewi
2015/571 (PDF ) Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order - Extended Version Tobias Schneider, Amir Moradi, Tim Güneysu
2015/570 (PDF ) Constant Communication ORAM with Small Blocksize Tarik Moataz, Travis Mayberry, Erik-Oliver Blass
2015/569 (PDF ) Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grøstl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions (Full Version) Bingke Ma, Bao Li, Ronglin Hao, Xiaoqian Li
2015/568 (PDF ) Cryptanalysis of Reduced-Round Whirlwind (Full Version) Bingke Ma, Bao Li, Ronglin Hao, Xiaoqian Li
2015/567 (PDF ) Key-Recovery Attack on the ASASA Cryptosystem with Expanding S-boxes Henri Gilbert, Jérôme Plût, Joana Treger
2015/566 (PDF ) A Framework for Identity-Based Encryption with Almost Tight Security Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada
2015/565 (PDF ) FourQ: four-dimensional decompositions on a Q-curve over the Mersenne prime Craig Costello, Patrick Longa
2015/564 (PDF ) Sanctum: Minimal Hardware Extensions for Strong Software Isolation Victor Costan, Ilia Lebedev, Srinivas Devadas
2015/563 (PDF ) Privacy in the Genomic Era Muhammad Naveed, Erman Ayday, Ellen W. Clayton, Jacques Fellay, Carl A. Gunter, Jean-Pierre Hubaux, Bradley A. Malin, XiaoFeng Wang
2015/562 (PDF ) PUDA – Privacy and Unforgeability for Data Aggregation Iraklis Leontiadis, Kaoutar Elkhiyaoui, Melek Önen, Refik Molva
2015/561 (PDF ) SoC it to EM: electromagnetic side-channel attacks on a complex system-on-chip J. Longo, E. De Mulder, D. Page, M. Tunstall
2015/560 (PDF ) Generic Construction of UC-Secure Oblivious Transfer Olivier Blazy, Céline Chevalier
2015/559 (PDF ) Concurrent Secure Computation with Optimal Query Complexity Ran Canetti, Vipul Goyal, Abhishek Jain
2015/558 (PDF ) Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer, Rolf Haenni, Reto Koenig, Philemon von Bergen
2015/557 (PDF ) Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block Ciphers Takanori Isobe, Kyoji Shibutani
2015/556 (PDF ) Lightweight Coprocessor for Koblitz Curves: 283-bit ECC Including Scalar Conversion with only 4300 Gates Sujoy Sinha Roy, Kimmo Järvinen, Ingrid Verbauwhede
2015/555 (PDF ) Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability and IND-CCA2 Security in Adaptive-Predicates Attack Tapas Pandit, Sumit Kumar Pandey, Rana Barua
2015/554 (PDF ) An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security Michel Abdalla, Fabrice Benhamouda, Alain Passelègue
2015/553 (PDF ) Round-Optimal Black-Box Two-Party Computation Rafail Ostrovsky, Silas Richelson, Alessandra Scafuro
2015/552 (PDF ) An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices Paul Kirchner, Pierre-Alain Fouque
2015/551 (PDF ) Quantum homomorphic encryption for circuits of low $T$-gate complexity Anne Broadbent, Stacey Jeffery
2015/550 (PDF ) Upending Stock Market Structure Using Secure Multi-Party Computation Charanjit S. Jutla
2015/549 (PDF ) ILTRU: An NTRU-Like Public Key Cryptosystem Over Ideal Lattices Amir Hassani Karbasi, Reza Ebrahimi Atani
2015/548 (PDF ) Message Transmission with Reverse Firewalls---Secure Communication on Corrupted Machines Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz
2015/547 (PDF ) Secure Computation of MIPS Machine Code Xiao Wang, S. Dov Gordon, Allen McIntosh, Jonathan Katz
2015/546 (PDF ) Actively Secure OT Extension with Optimal Overhead Marcel Keller, Emmanuela Orsini, Peter Scholl
2015/545 (PDF ) FROPUF: How to Extract More Entropy from Two Ring Oscillators in FPGA-Based PUFs Qinglong Zhang, Zongbin Liu, Cunqing Ma, Changting Li, Jiwu Jing
2015/544 (PDF ) Alternative cubics' rules with an algebraic appeal Daniel R. L. Brown
2015/543 (PDF ) Bloom Filters in Adversarial Environments Moni Naor, Eylon Yogev
2015/542 (PDF ) Improved Side-Channel Analysis of Finite-Field Multiplication Sonia Belaïd, Jean-Sébastien Coron, Pierre-Alain Fouque, Benoît Gérard, Jean-Gabriel Kammerer, Emmanuel Prouff
2015/541 (PDF ) Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption Bart Mennink, Reza Reyhanitabar, Damian Vizár
2015/539 (PDF ) Tweaking Even-Mansour Ciphers Benoît Cogliati, Rodolphe Lampe, Yannick Seurin
2015/538 (PDF ) Pairing Based Mutual Healing in Wireless Sensor Networks Sarita Agrawal, Jay Patel, Manik Lal Das
2015/537 (PDF ) Towards Easy Leakage Certification François Durvaux, François-Xavier Standaert, Santos Merino Del Pozo
2015/536 (PDF ) From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces François Durvaux, François-Xavier Standaert
2015/535 (PDF ) ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When? Vincent Grosso, François-Xavier Standaert
2015/534 (PDF ) Problems, solutions and experience of the first international student's Olympiad in cryptography Sergey Agievich, Anastasiya Gorodilova, Nikolay Kolomeec, Svetla Nikova, Bart Preneel, Vincent Rijmen, George Shushuev, Natalia Tokareva, Valeria Vitkup
2015/533 (PDF ) Related-Key Rectangle Attack on Round-reduced \textit{Khudra} Block Cipher Xiaoshuang Ma, Kexin Qiao
2015/531 (PDF ) Reproducible Circularly-Secure Bit Encryption: Applications and Realizations Mohammad Hajiabadi, Bruce M. Kapron
2015/530 (PDF ) Practical Free-Start Collision Attacks on 76-step SHA-1 Pierre Karpman, Thomas Peyrin, Marc Stevens
2015/529 (PDF ) Power Analysis Attacks against IEEE 802.15.4 Nodes Colin O'Flynn, Zhizhang Chen
2015/528 (PDF ) SpaceMint: A Cryptocurrency Based on Proofs of Space Sunoo Park, Albert Kwon, Georg Fuchsbauer, Peter Gaži, Joël Alwen, Krzysztof Pietrzak
2015/527 (PDF ) Robust Profiling for DPA-Style Attacks Carolyn Whitnall, Elisabeth Oswald
2015/526 (PDF ) Generic Key Recovery Attack on Feistel Scheme Takanori Isobe, Kyoji Shibutani
2015/525 (PDF ) Short Randomizable Signatures David Pointcheval, Olivier Sanders
2015/524 (PDF ) Secure Key Exchange Protocol based on Virtual Proof of Reality Yansong Gao
2015/523 (PDF ) Efficient Constant Round Multi-Party Computation Combining BMR and SPDZ Yehuda Lindell, Benny Pinkas, Nigel P. Smart, Avishay Yanai
2015/522 (PDF ) Speeding-up lattice sieving without increasing the memory, using sub-quadratic nearest neighbor search Anja Becker, Nicolas Gama, Antoine Joux
2015/521 (PDF ) Democoin: A Publicly Verifiable and Jointly Serviced Cryptocurrency Sergey Gorbunov, Silvio Micali
2015/520 (PDF ) A Constant Time, Single Round Attribute-Based Authenticated Key Exchange in Random Oracle Model Suvradip Chakraborty, Y. Sreenivasarao, C. Pandu Rangan, Srinivasan Raghuraman
2015/519 (PDF ) Notes on Two Fully Homomorphic Encryption Schemes Without Bootstrapping Yongge Wang
2015/518 (PDF ) Broadcasting Intermediate Blocks as a Defense Mechanism Against Selfish-Mine in Bitcoin Ren Zhang, Bart Preneel
2015/517 (PDF ) Subversion-Resilient Signatures: Definitions, Constructions and Applications Giuseppe Ateniese, Bernardo Magri, Daniele Venturi
2015/516 (PDF ) Key-Recovery Attacks on ASASA Brice Minaud, Patrick Derbez, Pierre-Alain Fouque, Pierre Karpman
2015/515 (PDF ) Higher-Order Differential Meet-in-The-Middle Preimage Attacks on SHA-1 and BLAKE Thomas Espitau, Pierre-Alain Fouque, Pierre Karpman
2015/514 (PDF ) Time-Lock Puzzles from Randomized Encodings Nir Bitansky, Shafi Goldwasser, Abhishek Jain, Omer Paneth, Vinod Vaikuntanathan, Brent Waters
2015/513 (PDF ) Computing Individual Discrete Logarithms Faster in $GF(p^n)$ Aurore Guillevic
2015/512 (PDF ) Key Extraction from the Primary Side of a Switched-Mode Power Supply Sami Saab, Andrew Leiserson, Michael Tunstall
2015/511 (PDF ) Near Collision Side Channel Attacks Baris Ege, Thomas Eisenbarth, Lejla Batina
2015/510 (PDF ) Equivoe-T: Transposition Equivocation Cryptography Gideon Samid
2015/509 (PDF ) A flaw in a theorem about Schnorr signatures Daniel R. L. Brown
2015/508 (PDF ) Probabilistic Signature Based Framework for Differential Fault Analysis of Stream Ciphers Santanu Sarkar, Prakash Dey, Avishek Adhikari, Subhamoy Maitra
2015/507 (PDF ) Decomposing the ASASA Block Cipher Construction Itai Dinur, Orr Dunkelman, Thorsten Kranz, Gregor Leander
2015/506 (PDF ) Strong Non-Interference and Type-Directed Higher-Order Masking Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Pierre-Yves Strub, Rébecca Zucchini
2015/505 (PDF ) The Tower Number Field Sieve Razvan Barbulescu, Pierrick Gaudry, Thorsten Kleinjung
2015/504 (PDF ) The Iterated Random Permutation Problem with Applications to Cascade Encryption Brice Minaud, Yannick Seurin
2015/503 (PDF ) The Norwegian Internet Voting Protocol: A new Instantiation Kristian Gjøsteen, Anders Smedstuen Lund
2015/502 (PDF ) Centrally Banked Cryptocurrencies George Danezis, Sarah Meiklejohn
2015/501 (PDF ) Multi-Prover Commitments Against Non-Signaling Attacks Serge Fehr, Max Fillinger
2015/500 (PDF ) Fault Cryptanalysis of CHES 2014 Symmetric Infective Countermeasure Alberto Battistello, Christophe Giraud
2015/499 (PDF ) Algebraic partitioning: Fully compact and (almost) tightly secure cryptography Dennis Hofheinz
2015/498 (PDF ) Low Space Complexity CRT-based Bit-Parallel GF(2^n) Polynomial Basis Multipliers for Irreducible Trinomials Jiajun Zhang, Haining Fan
2015/497 (PDF ) Efficient Zero-Knowledge Proofs of Non-Algebraic Statements with Sublinear Amortized Cost Zhangxiang Hu, Payman Mohassel, Mike Rosulek
2015/496 (PDF ) Quantifying Location Privacy Leakage from Transaction Prices Arthur Gervais, Hubert Ritzdorf, Mario Lucic, Srdjan Capkun
2015/495 (PDF ) Improving algebraic attacks on stream ciphers based on linear feedback shifter registers over $F_{2^k}$ Sondre Rønjom
2015/493 (PDF ) Fault Tolerant Infective Countermeasure for AES Sikhar Patranabis, Abhishek Chakraborty, Debdeep Mukhopadhyay
2015/492 (PDF ) Masking vs. Multiparty Computation: How Large is the Gap for AES? Vincent Grosso, François-Xavier Standaert, Sebastian Faust
2015/491 (PDF ) Re-encryption, functional re-encryption, and multi-hop re-encryption: A framework for achieving obfuscation-based security and instantiations from lattices Nishanth Chandran, Melissa Chase, Feng-Hao Liu, Ryo Nishimaki, Keita Xagawa
2015/490 (PDF ) Cryptanalysis Of Dynamic ID Based Remote User Authentication Scheme With Key Agreement Sonam Devgan Kaul, Amit K. Awasthi
2015/489 (PDF ) Scalable and private media consumption with Popcorn Trinabh Gupta, Natacha Crooks, Whitney Mulhern, Srinath Setty, Lorenzo Alvisi, Michael Walfish
2015/488 (PDF ) On Black-Box Complexity of Universally Composable Security in the CRS model Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
2015/487 (PDF ) Contention in Cryptoland: Obfuscation, Leakage and UCE Mihir Bellare, Igors Stepanovs, Stefano Tessaro
2015/486 (PDF ) DECIM: Detecting Endpoint Compromise In Messaging Jiangshan Yu, Mark Ryan, Cas Cremers
2015/485 (PDF ) Turning Online Ciphers Off Elena Andreeva, Guy Barwell, Ritam Bhaumik, Mridul Nandi, Dan Page, Martijn Stam
2015/484 (PDF ) More Rounds, Less Security? Jian Guo, Jérémy Jean, Nicky Mouha, Ivica Nikolić
2015/483 (PDF ) Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance Shi Bai, Adeline Langlois, Tancrëde Lepoint, Amin Sakzad, Damien Stehle, Ron Steinfeld
2015/482 (PDF ) How to build time-lock encryption Jia Liu, Tibor Jager, Saqib A. Kakvi, Bogdan Warinschi
2015/481 (PDF ) Advanced Differential Cryptanalysis of Reduced-Round SIMON64/128 Using Large-Round Statistical Distinguishers Theodosis Mourouzis, Guangyan Song, Nicolas Courtois, Michalis Christofii
2015/480 (PDF ) Trinocchio: Privacy-Friendly Outsourcing by Distributed Verifiable Computation Berry Schoenmakers, Meilof Veeningen, Niels de Vreede
2015/479 (PDF ) A Provably Secure Group Signature Scheme from Code-Based Assumptions Martianus Frederic Ezerman, Hyung Tae Lee, San Ling, Khoa Nguyen, Huaxiong Wang
2015/477 (PDF ) Authentication Key Recovery on Galois Counter Mode (GCM) John Mattsson, Magnus Westerlund
2015/476 (PDF ) XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees Bart Mennink
2015/475 (PDF ) Randomizing scalar multiplication using exact covering systems of congruences Eleonora Guerrini, Laurent Imbert, Théo Winterhalter
2015/474 (PDF ) Fully Homomorphic Encryption without bootstrapping Masahiro Yagisawa
2015/473 (PDF ) VARIANTS OF DIFFERENTIAL AND LINEAR CRYPTANALYSIS Mehak Khurana, Meena Kumari
2015/472 (PDF ) High Performance Multi-Party Computation for Binary Circuits Based on Oblivious Transfer Sai Sheshank Burra, Enrique Larraia, Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi, Emmanuela Orsini, Peter Scholl, Nigel P. Smart
2015/471 (PDF ) A Challenge Obfuscation Method for Thwarting Model Building Attacks on PUFs Yansong Gao, Damith C. Ranasinghe, Gefei Li, Said F. Al-Sarawi, Omid Kavehei, Derek Abbott
2015/470 (PDF ) On the power of Public-key Functional Encryption with Function Privacy Vincenzo Iovino, Qiang Tang, Karol Żebrowski
2015/469 (PDF ) Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications Andrew Miller, Rob Jansen
2015/468 (PDF ) Practical Fully Homomorphic Encryption without Noise Reduction Dongxi Liu
2015/467 (PDF ) The Oblivious Machine - or: How to Put the C into MPC Marcel Keller
2015/466 (PDF ) Efficient Fully Homomorphic Encryption with Circularly Secure Key Switching Process Zhou Tanping, Yang Xiaoyuan, Zhang Wei, Wu Liqiang
2015/465 (PDF ) Efficient Arithmetic on ARM-NEON and Its Application for High-Speed RSA Implementation Hwajeong Seo, Zhe Liu, Johann Groschadl, Howon Kim
2015/464 (PDF ) Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies Florian Tschorsch, Björn Scheuermann
2015/462 (PDF ) Accelerating SWHE based PIRs using GPUs Wei Dai, Yarkın Doröz, Berk Sunar
2015/461 (PDF ) Approximate Algorithms on Lattices with Small Determinant Jung Hee Cheon, Changmin Lee
2015/460 (PDF ) Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab Kevin Delmolino, Mitchell Arnett, Ahmed Kosba, Andrew Miller, Elaine Shi
2015/459 (PDF ) New Observation on Division Property Bing Sun, Xin Hai, Wenyu Zhang, Lei Cheng, Zhichao Yang
2015/458 (PDF ) A HYBRID APPROACH FOR THE SECURE TRANSMISSION OF H.264/AVC VIDEO STREAMS Sheena Sathyan, Shaji R S
2015/457 (PDF ) Generic Conversions from CPA to CCA secure Functional Encryption Mridul Nandi, Tapas Pandit
2015/456 (PDF ) Collateral damage of Facebook Apps: an enhanced privacy scoring model Iraklis Symeonidis, Pagona Tsormpatzoudi, Bart Preneel
2015/455 (PDF ) Secure Deduplication of Encrypted Data without Additional Independent Servers Jian Liu, N. Asokan, Benny Pinkas
2015/454 (PDF ) A comprehensive and lightweight security architecture to secure the IoT throughout the lifecycle of a device based on HIMMO Oscar Garcia-Morchon, Ronald Rietman, Sahil Sharma, Ludo Tolhuizen, Jose Luis Torre-Arce
2015/453 (PDF ) An Optimization of Gu Map-1 Yupu Hu, Huiwen Jia
2015/452 (PDF ) Masks will Fall Off -- Higher-Order Optimal Distinguishers Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Olivier Rioul
2015/451 (PDF ) On the Systematic Constructions of Rotation Symmetric Bent Functions with Any Possible Algebraic Degrees Sihong Su, Xiaohu Tang
2015/450 (PDF ) Adaptively Secure Computation with Partial Erasures Carmit Hazay, Yehuda Lindell, Arpita Patra
2015/449 (PDF ) On Constructions of a Sort of MDS Block Diffusion Matrices for Block Ciphers and Hash Functions Ruoxin Zhao, Rui Zhang, Yongqiang Li, Baofeng Wu
2015/448 (PDF ) A Comment on Gu Map-1 Yupu Hu, Huiwen Jia
2015/447 (PDF ) A New Model for Error-Tolerant Side-Channel Cube Attacks Zhenqi Li, Bin Zhang, Junfeng Fan, Ingrid Verbauwhede
2015/446 (PDF ) On the Amortized Complexity of Zero-knowledge Protocols Ronald Cramer, Ivan Damgård, Marcel Keller
2015/445 (PDF ) XLS is not a Strong Pseudorandom Permutation Mridul Nandi
2015/444 (PDF ) Revisiting Security Claims of XLS and COPA Mridul Nandi
2015/443 (PDF ) Security Evaluation and Enhancement of Bistable Ring PUFs Xiaolin Xu, Ulrich Rührmair, Daniel E. Holcomb, Wayne Burleson
2015/442 (PDF ) Individualizing Electrical Circuits of Cryptographic Devices as a Means to Hinder Tampering Attacks Zoya Dyka, Thomas Basmer, Christian Wittke, Peter Langendoerfer
2015/441 (PDF ) FIDES: Enhancing Trust in Reconfigurable Based Hardware Systems Devu Manikantan Shila, Vivek Venugopalan, Cameron D Patterson
2015/440 (PDF ) Message-Locked Encryption for Lock-Dependent Messages Martín Abadi, Dan Boneh, Ilya Mironov, Ananth Raghunathan, Gil Segev
2015/439 (PDF ) On Concurrently Secure Computation in the Multiple Ideal Query Model Vipul Goyal, Abhishek Jain
2015/438 (PDF ) A Hybrid Approach for Proving Noninterference of Java Programs Ralf Kuesters, Tomasz Truderung, Bernhard Beckert, Daniel Bruns, Michael Kirsten, Martin Mohr
2015/437 (PDF ) A Note on the Unsoundness of vnTinyRAM's SNARK Bryan Parno
2015/436 (PDF ) On the Resistance of Prime-variable Rotation Symmetric Boolean Functions against Fast Algebraic Attacks Yusong Du, Baodian Wei, Fangguo Zhang, Huang Zhang
2015/435 (PDF ) On the (Fast) Algebraic Immunity of Boolean Power Functions Yusong Du, Baodian Wei, Fangguo Zhang, Huang Zhang
2015/434 (PDF ) Dickson Polynomials that are Involutions Pascale Charpin, Sihem Mesnager, Sumanta Sarkar
2015/433 (PDF ) A New Classification of 4-bit Optimal S-boxes and its Application to PRESENT, RECTANGLE and SPONGENT Wentao Zhang, Zhenzhen Bao, Vincent Rijmen, Meicheng Liu
2015/431 (PDF ) Conversions among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada
2015/430 (PDF ) Fast and Tradeoff-Resilient Memory-Hard Functions for Cryptocurrencies and Password Hashing Alex Biryukov, Daniel Dinu, Dmitry Khovratovich
2015/429 (PDF ) Cryptanalysis of Round-Reduced LED Ivica Nikolić, Lei Wang, Shuang Wu
2015/428 (PDF ) Dumb Crypto in Smart Grids: Practical Cryptanalysis of the Open Smart Grid Protocol Philipp Jovanovic, Samuel Neves
2015/427 (PDF ) A High Reliability PUF Using Hot Carrier Injection Based Response Reinforcement Mudit Bhargava, Ken Mai
2015/426 (PDF ) Complementing Feistel Ciphers Alex Biryukov, Ivica Nikolic
2015/425 (PDF ) Smaller Keys for Code-Based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices Stefan Heyse, Ingo von Maurich, Tim Güneysu
2015/424 (PDF ) FIDES: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware Begül Bilgin, Andrey Bogdanov, Miroslav Knežević, Florian Mendel, Qingju Wang
2015/423 (PDF ) On the Implementation of Unified Arithmetic on Binary Huff Curves Santosh Ghosh, Amit Kumar, Amitabh Das, Ingrid Verbauwhede
2015/422 (PDF ) Efficient Server-Aided Secure Two-Party Function Evaluation with Applications to Genomic Computation Marina Blanton, Fattaneh Bayatbabolghani
2015/421 (PDF ) VLSI Implementation of Double-Base Scalar Multiplication on a Twisted Edwards Curve with an Efficiently Computable Endomorphism Zhe Liu, Husen Wang, Johann Großschädl, Zhi Hu, Ingrid Verbauwhede
2015/420 (PDF ) What Information is Leaked under Concurrent Composition? Vipul Goyal, Divya Gupta, Abhishek Jain
2015/419 (PDF ) Non-invasive Spoofing Attacks for Anti-lock Braking Systems Yasser Shoukry, Paul Martin, Paulo Tabuada, Mani B. Srivastava
2015/418 (PDF ) Optimized Interpolation Attacks on LowMC Itai Dinur, Yunwen Liu, Willi Meier, Qingju Wang
2015/417 (PDF ) Order-Revealing Encryption and the Hardness of Private Learning Mark Bun, Mark Zhandry
2015/416 (PDF ) HETest: A Homomorphic Encryption Testing Framework Mayank Varia, Sophia Yakoubov, Yang Yang
2015/415 (PDF ) STRIBOB / WHIRLBOB Security Analysis Addendum Markku-Juhani O. Saarinen
2015/414 (PDF ) On the Optimality of Non-Linear Computations of Length-Preserving Encryption Schemes Mridul Nandi
2015/413 (PDF ) A Study of Pair Encodings: Predicate Encryption in Prime Order Groups Shashank Agrawal, Melissa Chase
2015/412 (PDF ) The Birth of Cryptographic Obfuscation -- A Survey Máté Horváth, Levente Buttyán
2015/411 (PDF ) Side-Channel Analysis of MAC-Keccak Hardware Implementations Pei Luo, Yunsi Fei, Xin Fang, A. Adam Ding, David R. Kaeli, Miriam Leeser
2015/410 (PDF ) Efficient Ring-LWE Encryption on 8-bit AVR Processors Zhe Liu, Hwajeong Seo, Sujoy Sinha Roy, Johann Großschädl, Howon Kim, Ingrid Verbauwhede
2015/409 (PDF ) Improved Dual System ABE in Prime-Order Groups via Predicate Encodings Jie Chen, Romain Gay, Hoeteck Wee
2015/408 (PDF ) Revisiting Atomic Patterns for Scalar Multiplications on Elliptic Curves Franck Rondepierre
2015/407 (PDF ) Higher-Order Cryptanalysis of LowMC Christoph Dobraunig, Maria Eichlseder, Florian Mendel
2015/406 (PDF ) Cryptography for Parallel RAM from Indistinguishability Obfuscation Yu-Chi Chen, Sherman S. M. Chow, Kai-Min Chung, Russell W. F. Lai, Wei-Kai Lin, Hong-Sheng Zhou
2015/405 (PDF ) Feasibility and Infeasibility of Secure Computation with Malicious PUFs Dana Dachman-Soled, Nils Fleischhacker, Jonathan Katz, Anna Lysyanskaya, Dominique Schröder
2015/404 (PDF ) Zero-Knowledge Accumulators and Set Operations Esha Ghosh, Olga Ohrimenko, Dimitrios Papadopoulos, Roberto Tamassia, Nikos Triandopoulos
2015/403 (PDF ) Sequential Secret Sharing as a New Hierarchical Access Structure Mehrdad Nojoumian, Douglas R. Stinson
2015/402 (PDF ) Success through confidence: Evaluating the effectiveness of a side-channel attack Adrian Thillard, Emmanuel Prouff, Thomas Roche
2015/401 (PDF ) Simple Chosen-Ciphertext Security from Low-Noise LPN Eike Kiltz, Daniel Masny, Krzysztof Pietrzak
2015/400 (PDF ) Expiration and Revocation of Keys for Attribute-based Signatures (Full Version) Stephen R. Tate, Roopa Vishwanathan
2015/399 (PDF ) New attacks on RSA with Moduli $N=p^rq$ Abderrahmane Nitaj, Tajjeeddine Rachidi
2015/398 (PDF ) Factoring RSA moduli with weak prime factors Abderrahmane Nitaj, Tajjeeddine Rachidi
2015/397 (PDF ) Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes Peter Gazi, Jooyoung Lee, Yannick Seurin, John Steinberger, Stefano Tessaro
2015/396 (PDF ) Generalizing Homomorphic MACs for Arithmetic Circuits Dario Catalano, Dario Fiore, Rosario Gennaro, Luca Nizzardo
2015/395 (PDF ) Efficient Unlinkable Sanitizable Signatures from Signatures with Re-Randomizable Keys Nils Fleischhacker, Johannes Krupp, Giulio Malavolta, Jonas Schneider, Dominique Schröder, Mark Simkin
2015/394 (PDF ) Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer Christian Badertscher, Christian Matt, Ueli Maurer, Phillip Rogaway, Björn Tackmann
2015/393 (PDF ) Biclique cryptanalysis of MIBS-80 and PRESENT-80 Mohammad Hossein Faghihi Sereshgi, Mohammad Dakhilalian, Mohsen Shakiba
2015/392 (PDF ) Forgery Attacks on round-reduced ICEPOLE-128 Christoph Dobraunig, Maria Eichlseder, Florian Mendel
2015/391 (PDF ) On the Communication Complexity of Secure Computation Deepesh Data, Manoj M. Prabhakaran, Vinod M. Prabhakaran
2015/390 (PDF ) Dual System Encryption Framework in Prime-Order Groups Nuttapong Attrapadung
2015/389 (PDF ) Keccak Guido Bertoni, Joan Daemen, Michael Peeters, Gilles Van Assche
2015/388 (PDF ) Succinct Garbled RAM Ran Canetti, Justin Holmgren
2015/387 (PDF ) Method to Protect Passwords in Databases for Web Applications Scott Contini
2015/386 (PDF ) Privately Evaluating Decision Trees and Random Forests David J. Wu, Tony Feng, Michael Naehrig, Kristin Lauter
2015/385 (PDF ) Feasibility and Completeness of Cryptographic Tasks in the Quantum World Serge Fehr, Jonathan Katz, Fang Song, Hong-Sheng Zhou, Vassilis Zikas
2015/384 (PDF ) Condensed Unpredictability Maciej Skorski, Alexander Golovnev, Krzysztof Pietrzak
2015/383 (PDF ) Impossibility of VBB Obfuscation with Ideal Constant-Degree Graded Encodings Rafael Pass, abhi shelat
2015/382 (PDF ) High-Performance Ideal Lattice-Based Cryptography on 8-bit ATxmega Microcontrollers Thomas Pöppelmann, Tobias Oder, Tim Güneysu
2015/381 (PDF ) Financial Cryptography: Algorithmic Mechanisms for a Hedonic Game Sumit Chakraborty
2015/380 (PDF ) Protecting against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation Céline Blondeau, Aslí Bay, Serge Vaudenay
2015/379 (PDF ) MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection Jingwei Li, Anna Squicciarini, Dan Lin, Smitha Sundareswaran, Chunfu Jia
2015/378 (PDF ) PAC Learning of Arbiter PUFs Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert
2015/377 (PDF ) Cluster Computing in Zero Knowledge Alessandro Chiesa, Eran Tromer, Madars Virza
2015/376 (PDF ) Cryptography from Post-Quantum Assumptions Raza Ali Kazmi
2015/375 (PDF ) Bounds on surmising remixed keys Daniel R. L. Brown
2015/374 (PDF ) On the Impossibility of Tight Cryptographic Reductions Christoph Bader, Tibor Jager, Yong Li, Sven Schäge
2015/373 (PDF ) Publicly Verifiable Software Watermarking Aloni Cohen, Justin Holmgren, Vinod Vaikuntanathan
2015/372 (PDF ) Security Analysis of PRINCE Jeremy Jean, Ivica Nikolic, Thomas Peyrin, Lei Wang, Shuang Wu
2015/371 (PDF ) Constant-Round MPC with Fairness and Guarantee of Output Delivery S. Dov Gordon, Feng-Hao Liu, Elaine Shi
2015/370 (PDF ) Financial Cryptography: Discriminatory Pricing Mechanism Sumit Chakraborty
2015/369 (PDF ) On Non-Black-Box Simulation and the Impossibility of Approximate Obfuscation Nir Bitansky, Omer Paneth
2015/368 (PDF ) Breaking the Rabin-Williams digital signature system implementation in the Crypto++ library Evgeny Sidorov
2015/367 (PDF ) Improved Higher-Order Differential Attacks on MISTY1 Achiya Bar-On
2015/366 (PDF ) A random zoo: sloth, unicorn, and trx Arjen K. Lenstra, Benjamin Wesolowski
2015/365 (PDF ) On the (im)possibility of receiving security beyond 2^l using an l-bit PRNG: the case of Wang et. al. protocol Masoumeh Safkhani, Mehdi Hosseinzadeh, Mojtaba Eslamnezhad Namin, Samad Rostampour, Nasour Bagheri
2015/364 (PDF ) Privacy-preserving Context-aware Recommender Systems: Analysis and New Solutions Qiang Tang, Jun Wang
2015/363 (PDF ) Optimally Secure Tweakable Blockciphers Bart Mennink
2015/362 (PDF ) Oblivious Transfer from weakly Random Self-Reducible Public-Key Cryptosystem Claude Crepeau, Raza Ali Kazmi
2015/361 (PDF ) Computationally binding quantum commitments Dominique Unruh
2015/360 (PDF ) Achieving Differential Privacy with Bias-Control Limited Source Yanqing Yao, Zhoujun Li
2015/359 (PDF ) Higher-Order Side Channel Security and Mask Refreshing Jean-Sebastien Coron, Emmanuel Prouff, Matthieu Rivain, Thomas Roche
2015/358 (PDF ) On Generalized First Fall Degree Assumptions Yun-Ju Huang, Christophe Petit, Naoyuki Shinohara, Tsuyoshi Takagi
2015/357 (PDF ) A Group-theory Method to The Cycle Structures of Feedback Shift Registers Ming Li, Yupeng Jiang, Dongdai Lin
2015/356 (PDF ) Succinct Randomized Encodings and their Applications Nir Bitansky, Sanjam Garg, Huijia Lin, Rafael Pass, Sidharth Telang
2015/355 (PDF ) Semantic Security and Indistinguishability in the Quantum World Tommaso Gagliardoni, Andreas Hülsing, Christian Schaffner
2015/354 (PDF ) SEMA and MESD Leakage of TinyECC 2.0 on a LOTUS Sensor Node Jacek Samotyja, Kerstin Lemke-Rust, Markus Ullmann
2015/353 (PDF ) Matrix Computational Assumptions in Multilinear Groups Paz Morillo, Carla Ràfols, Jorge L. Villar
2015/352 (PDF ) Broadcast from Minicast Secure Against General Adversaries Pavel Raykov
2015/351 (PDF ) Database Outsourcing with Hierarchical Authenticated Data Structures Mohammad Etemad, Alptekin Küpçü
2015/350 (PDF ) Improving Local Collisions: New Attacks on Reduced SHA-256 Florian Mendel, Tomislav Nad, Martin Schläffer
2015/349 (PDF ) Efficient Searchable Symmetric Encryption for Storing Multiple Source Data on Cloud Chang Liu, Liehuang Zhu, Jinjun Chen
2015/348 (PDF ) A Hardware-based Countermeasure to Reduce Side-Channel Leakage - Design, Implementation, and Evaluation Andreas Gornik, Amir Moradi, Jürgen Oehm, Christof Paar
2015/347 (PDF ) Fault Analysis of Kuznyechik Riham AlTawy, Onur Duman, Amr M. Youssef
2015/346 (PDF ) End-to-End Verifiable Elections in the Standard Model∗ Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang
2015/345 (PDF ) Two Round Multiparty Computation via Multi-Key FHE Pratyay Mukherjee, Daniel Wichs
2015/344 (PDF ) Watermarking Cryptographic Programs Against Arbitrary Removal Strategies Ryo Nishimaki, Daniel Wichs
2015/343 (PDF ) High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers Michael Düll, Björn Haase, Gesine Hinterwälder, Michael Hutter, Christof Paar, Ana Helena Sánchez, Peter Schwabe
2015/342 (PDF ) Identity-Set-based Broadcast Encryption supporting “Cut-or-Select” with Short Ciphertext Yan Zhu, Xin Wang, Di Ma, Ruiqi Guo
2015/341 (PDF ) Limits on the Power of Indistinguishability Obfuscation and Functional Encryption Gilad Asharov, Gil Segev
2015/340 (PDF ) A New Distinguisher on Grain v1 for 106 rounds Santanu Sarkar
2015/339 (PDF ) Certificate Validation in Secure Computation and Its Use in Verifiable Linear Programming Sebastiaan de Hoogh, Berry Schoenmakers, Meilof Veeningen
2015/338 (PDF ) Cryptanalysis of a fair anonymity for the tor network Amadou Moctar Kane
2015/337 (PDF ) Modular Hardware Architecture for Somewhat Homomorphic Function Evaluation Sujoy Sinha Roy, Kimmo Järvinen, Frederik Vercauteren, Vassil Dimitrov, Ingrid Verbauwhede
2015/336 (PDF ) Arithmetic Cryptography Benny Applebaum, Jonathan Avron, Chris Brzuska
2015/335 (PDF ) Continuous After-the-fact Leakage-Resilient eCK-secure Key Exchange Janaka Alawatugoda, Douglas Stebila, Colin Boyd
2015/334 (PDF ) On the Correlation Intractability of Obfuscated Pseudorandom Functions Ran Canetti, Yilei Chen, Leonid Reyzin
2015/333 (PDF ) Nearly Optimal Verifiable Data Streaming (Full Version) Johannes Krupp, Dominique Schröder, Mark Simkin, Dario Fiore, Giuseppe Ateniese, Stefan Nuernberger
2015/332 (PDF ) Security Intelligence for Broadcast : Threat Analytics Sumit Chakraborty
2015/331 (PDF ) A New Authenticated Encryption Technique for Handling Long Ciphertexts in Memory Constrained Devices Megha Agrawal, Donghoon Chang, Somitra Sanadhya
2015/330 (PDF ) Sponge based CCA2 secure asymmetric encryption for arbitrary length message Tarun Kumar Bansal, Donghoon Chang, Somitra Kumar Sanadhya
2015/329 (PDF ) PAGES - A Family of Block Ciiphers Dieter Schmidt
2015/328 (PDF ) Strongly Secure Authenticated Key Exchange from Ideal Lattices Xiaopeng Yang, Wenping Ma
2015/327 (PDF ) Some results on Sprout Subhadeep Banik
2015/326 (PDF ) Cryptanalysis of an Authenticated Image Encryption Scheme Based on Chaotic Maps and Memory Cellular Automata Saeideh Kabirirad, Hamideh Hajiabadi
2015/325 (PDF ) Secure Multi-Party Computation with Identifiable Abort Yuval Ishai, Rafail Ostrovsky, Vassilis Zikas
2015/324 (PDF ) A Note on Lower Bounds for Non-interactive Message Authentication Using Weak Keys Divesh Aggarwal, Alexander Golovnev
2015/322 (PDF ) Transformation-Based Outsourcing of Linear Equation Systems over Real Numbers Peeter Laud, Alisa Pankova
2015/320 (PDF ) Hybrid Publicly Verifiable Computation James Alderman, Christian Janson, Carlos Cid, Jason Crampton
2015/319 (PDF ) Point Decomposition Problem in Binary Elliptic Curves Koray Karabina
2015/318 (PDF ) Practical Divisible E-Cash Patrick Märtens
2015/317 (PDF ) Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice Marcin Andrychowicz, Daniel Masny, Edoardo Persichetti
2015/316 (PDF ) Non-malleability under Selective Opening Attacks: Implication and Separation Zhengan Huang, Shengli Liu, Xianping Mao, Kefei Chen
2015/315 (PDF ) Query-Complexity Amplification for Random Oracles Grégory Demay, Peter Gaži, Ueli Maurer, Björn Tackmann
2015/314 (PDF ) Certificate-Based Encryption Resilient to Key Leakage Qihong Yu, Jiguo Li, Yichen Zhang, Wei Wu, Xinyi Huang, Yang Xiang
2015/313 (PDF ) Recovering Short Generators of Principal Ideals in Cyclotomic Rings Ronald Cramer, Léo Ducas, Chris Peikert, Oded Regev
2015/312 (PDF ) Improving Key Recovery to 784 and 799 rounds of Trivium using Optimized Cube Attacks Pierre-Alain Fouque, Thomas Vannet
2015/311 (PDF ) Tagged One-Time Signatures: Tight Security and Optimal Tag Size Masayuki Abe, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo
2015/310 (PDF ) New algorithm for the discrete logarithm problem on elliptic curves Igor Semaev
2015/309 (PDF ) TinyLEGO: An Interactive Garbling Scheme for Maliciously Secure Two-Party Computation Tore Kasper Frederiksen, Thomas P. Jakobsen, Jesper Buus Nielsen, Roberto Trifiletti
2015/308 (PDF ) Authenticated Key Exchange over Bitcoin Patrick McCorry, Siamak F. Shahandashti, Dylan Clarke, Feng Hao
2015/307 (PDF ) Black-Box Garbled RAM Sanjam Garg, Steve Lu, Rafail Ostrovsky
2015/306 (PDF ) Analysis of VAES3 (FF2) Morris Dworkin, Ray Perlner
2015/305 (PDF ) Foundations of Reconfigurable PUFs (Full Version) Jonas Schneider, Dominique Schröder
2015/304 (PDF ) Communication-Optimal Proactive Secret Sharing for Dynamic Groups Joshua Baron, Karim El Defrawy, Joshua Lampkins, Rafail Ostrovsky
2015/303 (PDF ) The Design Space of Lightweight Cryptography Nicky Mouha
2015/302 (PDF ) Boosting OMD for Almost Free Authentication of Associated Data Reza Reyhanitabar, Serge Vaudenay, Damian Vizár
2015/301 (PDF ) Cryptanalysis of GGH Map Yupu Hu, Huiwen Jia
2015/300 (PDF ) Scalable Divisible E-cash Sébastien Canard, David Pointcheval, Olivier Sanders, Jacques Traoré
2015/299 (PDF ) A Note on the Lindell-Waisbard Private Web Search Scheme Zhengjun Cao, Lihua Liu
2015/298 (PDF ) Quantum Resistant Random Linear Code Based Public Key Encryption Scheme RLCE Yongge Wang
2015/297 (PDF ) Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack Junzuo Lai, Robert H. Deng, Shengli Liu, Jian Weng, Yunlei Zhao
2015/296 (PDF ) The Uniform Distribution of Sequences Generated by Iteration of Polynomials Emil Lerner
2015/295 (PDF ) Security Analysis of Re-Encryption RPC Mix Nets Ralf Kuesters, Tomasz Truderung
2015/294 (PDF ) Accelerating Somewhat Homomorphic Evaluation using FPGAs Erdi̇̀nç Öztürk, Yarkın Doröz, Berk Sunar, Erkay Savaş
2015/293 (PDF ) Adaptively Secure Unrestricted Attribute-Based Encryption with Subset Difference Revocation in Bilinear Groups of Prime Order Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
2015/292 (PDF ) Secret Shared Random Access Machine Shlomi Dolev, Yin Li
2015/291 (PDF ) Two Operands of Multipliers in Side-Channel Attack Takeshi Sugawara, Daisuke Suzuki, Minoru Saeki
2015/290 (PDF ) Automating Fast and Secure Translations from Type-I to Type-III Pairing Schemes Joseph A. Akinyele, Christina Garman, Susan Hohenberger
2015/289 (PDF ) Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks Muhammed F. Esgin, Orhun Kara
2015/288 (PDF ) Precomputation Methods for Faster and Greener Post-Quantum Cryptography on Emerging Embedded Platforms Aydin Aysu, Patrick Schaumont
2015/287 (PDF ) Circuit-extension handshakes for Tor achieving forward secrecy in a quantum world John M. Schanck, William Whyte, Zhenfei Zhang
2015/286 (PDF ) Impossible Differential Cryptanalysis of Reduced Round SIMON Zhan Chen, Ning Wang, Xiaoyun Wang
2015/285 (PDF ) Improved Linear Trails for the Block Cipher Simon Tomer Ashur
2015/284 (PDF ) A Note on Scalar Multiplication Using Division Polynomials Binglong Chen, Chuangqiang Hu, Chang-An Zhao
2015/283 (PDF ) Fully-Dynamic Verifiable Zero-Knowledge Order Queries for Network Data Esha Ghosh, Michael T. Goodrich, Olga Ohrimenko, Roberto Tamassia
2015/282 (PDF ) Non-Interactive Secure Computation Based on Cut-and-Choose Arash Afshar, Payman Mohassel, Benny Pinkas, Ben Riva
2015/281 (PDF ) Secret Sharing and Statistical Zero Knowledge Vinod Vaikuntanathan, Prashant Nalini Vasudevan
2015/280 (PDF ) Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption Jonathan Katz, Aishwarya Thiruvengadam, Hong-Sheng Zhou
2015/279 (PDF ) Improved Cryptanalysis of AES-like Permutations Jérémy Jean, Maria Naya-Plasencia, Thomas Peyrin
2015/278 (PDF ) Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting Sébastien Canard, David Pointcheval, Olivier Sanders
2015/277 (PDF ) One-Sided Device-Independent QKD and Position-based Cryptography from Monogamy Games Marco Tomamichel, Serge Fehr, Jędrzej Kaniewski, Stephanie Wehner
2015/276 (PDF ) An Improvment of the Elliptic Net Algorithm Binglong Chen, Chang-An Zhao
2015/275 (PDF ) MQ Challenge: Hardness Evaluation of Solving Multivariate Quadratic Problems Takanori Yasuda, Xavier Dahan, Yun-Ju Huang, Tsuyoshi Takagi, Kouichi Sakurai
2015/274 (PDF ) Low Depth Circuits for Efficient Homomorphic Sorting Gizem S. Çetin, Yarkın Doröz, Berk Sunar, Erkay Savaş
2015/273 (PDF ) Dual System Encryption via Predicate Encodings Hoeteck Wee
2015/272 (PDF ) Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing Baodong Qin, Shengli Liu
2015/271 (PDF ) Toward Secure Implementation of McEliece Decryption Mariya Georgieva, Frédéric de Portzamparc
2015/270 (PDF ) Fibonacci Ring Oscillators as True Random Number Generators - A Security Risk Markus Dichtl
2015/269 (PDF ) Ideal Multilinear Maps Based on Ideal Lattices Gu Chunsheng
2015/268 (PDF ) Improved Top-Down Techniques in Differential Cryptanalysis Itai Dinur, Orr Dunkelman, Masha Gutman, Adi Shamir
2015/267 (PDF ) The Simplest Protocol for Oblivious Transfer Tung Chou, Claudio Orlandi
2015/266 (PDF ) GRECS: Graph Encryption for Approximate Shortest Distance Queries Xianrui Meng, Seny Kamara, Kobbi Nissim, George Kollios
2015/265 (PDF ) Password Hashing Competition - Survey and Benchmark George Hatzivasilis, Ioannis Papaefstathiou, Charalampos Manifavas
2015/264 (PDF ) BlindBox: Deep Packet Inspection over Encrypted Traffic Justine Sherry, Chang Lan, Raluca Ada Popa, Sylvia Ratnasamy
2015/263 (PDF ) Eclipse Attacks on Bitcoin’s Peer-to-Peer Network Ethan Heilman, Alison Kendler, Aviv Zohar, Sharon Goldberg
2015/262 (PDF ) A look at the PGP ecosystem through the key server data Hanno Böck
2015/261 (PDF ) Research Perspectives and Challenges for Bitcoin and Cryptocurrencies Joseph Bonneau, Andrew Miler, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, Edward W. Felten
2015/260 (PDF ) Computational Aspects of Correlation Power Analysis Paul Bottinelli, Joppe W. Bos
2015/259 (PDF ) Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks against Reduced-Round AES Patrick Derbez, Pierre-Alain Fouque
2015/258 (PDF ) Lightweight MDS Involution Matrices Siang Meng Sim, Khoongming Khoo, Frédérique Oggier, Thomas Peyrin
2015/257 (PDF ) Quadratic Time, Linear Space Algorithms for Gram-Schmidt Orthogonalization and Gaussian Sampling in Structured Lattices Vadim Lyubashevsky, Thomas Prest
2015/256 (PDF ) Cryptanalysis of Three Certificate-Based Authenticated Key Agreement Protocols and a Secure Construction Yang Lu, Quanling Zhang, Jiguo Li
2015/255 (PDF ) A comprehensive analysis of game-based ballot privacy definitions David Bernhard, Veronique Cortier, David Galindo, Olivier Pereira, Bogdan Warinschi
2015/254 (PDF ) Tornado Attack on RC4 with Applications to WEP and WPA Pouyan Sepehrdad, Petr Susil, Serge Vaudenay, Martin Vuagnoux
2015/253 (PDF ) Stability and Linearization of Multi-valued Nonlinear Feedback Shift Registers Haiyan Wang, Dongdai Lin
2015/252 (PDF ) Linearization of Multi-valued Nonlinear Feedback Shift Registers Haiyan Wang, Jianghua Zhong, Dongdai Lin
2015/251 (PDF ) How to Construct UC-Secure Searchable Symmetric Encryption Scheme Kaoru Kurosawa, Yasuhiro Ohtaki
2015/250 (PDF ) Design and Analysis of Information-Theoretically Secure Authentication Codes with Non-Uniformly Random Keys Junji Shikata
2015/249 (PDF ) Improved (Hierarchical) Inner-Product Encryption from Lattices Keita Xagawa
2015/248 (PDF ) Verifiably Encrypted Signatures with Short Keys based on the Decisional Linear Problem and Obfuscation for Encrypted VES Ryo Nishimaki, Keita Xagawa
2015/247 (PDF ) Subgroup security in pairing-based cryptography Paulo S. L. M. Barreto, Craig Costello, Rafael Misoczki, Michael Naehrig, Geovandro C. C. F. Pereira, Gustavo Zanon
2015/246 (PDF ) Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting Fabrice Benhamouda, Geoffroy Couteau, David Pointcheval, Hoeteck Wee
2015/245 (PDF ) Practical Attacks on the Round-reduced PRINCE Pawel Morawiecki
2015/244 (PDF ) Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak-f Permutation Jeremy Jean, Ivica Nikolic
2015/243 (PDF ) Reliable communication via semilattice properties of partial knowledge Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas
2015/242 (PDF ) Compactly Hiding Linear Spans: Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications Benoit Libert, Thomas Peters, Marc Joye, Moti Yung
2015/241 (PDF ) Espresso: A Stream Cipher for 5G Wireless Communication Systems Elena Dubrova, Martin Hell
2015/240 (PDF ) Differential Analysis and Meet-in-the-Middle Attack against Round-Reduced TWINE Alex Biryukov, Patrick Derbez, Léo Perrin
2015/239 (PDF ) Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE Patrick Derbez, Léo Perrin
2015/238 (PDF ) One Time Programs with Limited Memory Konrad Durnoga, Stefan Dziembowski, Tomasz Kazana, Michał Zając
2015/237 (PDF ) Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers Wouter Lueks, Gergely Alpár, Jaap-Henk Hoepman, Pim Vullers
2015/236 (PDF ) Key Recovery from State Information of Sprout: Application to Cryptanalysis and Fault Attack Subhamoy Maitra, Santanu Sarkar, Anubhab Baksi, Pramit Dey
2015/235 (PDF ) Performance and Security Improvements for Tor: A Survey Mashael AlSabah, Ian Goldberg
2015/234 (PDF ) Collision Attack on 4-branch, Type-2 GFN based Hash Functions using Sliced Biclique Cryptanalysis Technique Megha Agrawal, Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya
2015/233 (PDF ) Election Verifiability: Cryptographic Definitions and an Analysis of Helios, Helios-C, and JCJ Ben Smyth, Steven Frink, Michael R. Clarkson
2015/232 (PDF ) Cryptanalysis of Full Sprout Virginie Lallemand, María Naya-Plasencia
2015/231 (PDF ) A Related-Key Chosen-IV Distinguishing Attack on Full Sprout Stream Cipher Yonglin Hao
2015/230 (PDF ) W-SPS: Designing a Wide-Area Secure Positioning System Der-Yeuan Yu, Aanjhan Ranganathan, Ramya Jayaram Masti, Claudio Soriente, Srdjan Capkun
2015/229 (PDF ) Improving GGH Public Key Scheme Using Low Density Lattice Codes Reza Hooshmand
2015/228 (PDF ) Leakage-Resilient Cryptography with Key Derived from Sensitive Data Konrad Durnoga, Tomasz Kazana, Michał Zając, Maciej Zdanowicz
2015/227 (PDF ) Tradeoff Cryptanalysis of Memory-Hard Functions Alex Biryukov, Dmitry Khovratovich
2015/226 (PDF ) Secure Physical Computation using Disposable Circuits Ben Fisch, Daniel Freund, Moni Naor
2015/225 (PDF ) Bitwise Linear Mappings with Good Cryptographic Properties and Efficient Implementation S. M. Dehnavi, A. Mahmoodi Rishakani, M. R. Mirzaee Shamsabad
2015/224 (PDF ) GORAM -- Group ORAM for Privacy and Access Control in Outsourced Personal Records Matteo Maffei, Giulio Malavolta, Manuel Reinert, Dominique Schröder
2015/223 (PDF ) New Distinguishers for Reduced Round Trivium and Trivia-SC using Cube Testers Anubhab Baksi, Subhamoy Maitra, Santanu Sarkar
2015/222 (PDF ) Towards Understanding the Known-Key Security of Block Ciphers Elena Andreeva, Andrey Bogdanov, Bart Mennink
2015/221 (PDF ) Tighter, faster, simpler side-channel security evaluations beyond computing power Daniel J. Bernstein, Tanja Lange, Christine van Vredendaal
2015/220 (PDF ) Key Homomorphic PRFs and Their Applications Dan Boneh, Kevin Lewi, Hart Montgomery, Ananth Raghunathan
2015/219 (PDF ) Efficient Format Preserving Encrypted Databases Prakruti C, Sashank Dara, V. N. Muralidhara
2015/218 (PDF ) Efficient k-out-of-n oblivious transfer protocol wang qinglong
2015/217 (PDF ) Salsa20 Cryptanalysis: New Moves and Revisiting Old Styles Subhamoy Maitra, Goutam Paul, Willi Meier
2015/216 (PDF ) Quasi-Adaptive NIZK for Linear Subspaces Revisited Eike Kiltz, Hoeteck Wee
2015/215 (PDF ) A revocable anonymity in Tor Amadou Moctar Kane
2015/214 (PDF ) GCM Security Bounds Reconsidered Yuichi Niwa, Keisuke Ohashi, Kazuhiko Minematsu, Tetsu Iwata
2015/213 (PDF ) Attribute-Based Versions of Schnorr and ElGamal Javier Herranz
2015/212 (PDF ) Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows Christof Beierle, Philipp Jovanovic, Martin M. Lauridsen, Gregor Leander, Christian Rechberger
2015/211 (PDF ) Faster sieving for shortest lattice vectors using spherical locality-sensitive hashing Thijs Laarhoven, Benne de Weger
2015/210 (PDF ) Secure and Efficient Initialization and Authentication Protocols for SHIELD Chenglu Jin, Marten van Dijk
2015/209 (PDF ) Triathlon of Lightweight Block Ciphers for the Internet of Things Daniel Dinu, Yann Le Corre, Dmitry Khovratovich, Léo Perrin, Johann Großschädl, Alex Biryukov
2015/208 (PDF ) Towards Secure Distance Bounding Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay
2015/207 (PDF ) Leakage Assessment Methodology - a clear roadmap for side-channel evaluations Tobias Schneider, Amir Moradi
2015/206 (PDF ) Efficient and Secure Delegation of Group Exponentiation to a Single Server Bren Cavallo, Giovanni Di Crescenzo, Delaram Kahrobaei, Vladimir Shpilrain
2015/205 (PDF ) Towards Key-Length Extension with Optimal Security: Cascade Encryption and Xor-cascade Encryption Jooyoung Lee
2015/204 (PDF ) Leakage-Resilient Symmetric Encryption via Re-keying Michel Abdalla, Sonia Belaïd, Pierre-Alain Fouque
2015/203 (PDF ) Achieving Side-Channel Protection with Dynamic Logic Reconfiguration on Modern FPGAs Pascal Sasdrich, Amir Moradi, Oliver Mischke, Tim Güneysu
2015/202 (PDF ) Adaptively Secure Coin-Flipping, Revisited Shafi Goldwasser, Yael Tauman Kalai, Sunoo Park
2015/201 (PDF ) Statistical Properties of Multiplication mod $2^n$ A. Mahmoodi Rishakani, S. M. Dehnavi, M. R. Mirzaee Shamsabad, Hamidreza Maimani, Einollah Pasha
2015/200 (PDF ) Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAs Alexander Wild, Amir Moradi, Tim Güneysu
2015/199 (PDF ) Side-Channel Security Analysis of Ultra-Low-Power FRAM-based MCUs Amir Moradi, Gesine Hinterwälder
2015/198 (PDF ) Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware - Pitfalls of Memory Primitives Pascal Sasdrich, Oliver Mischke, Amir Moradi, Tim Güneysu
2015/197 (PDF ) SCA Resistance Analysis on FPGA Implementations of Sponge based MAC-PHOTON N. Nalla Anandakumar
2015/196 (PDF ) Tighter Reductions for Forward-Secure Signature Schemes Michel Abdalla, Fabrice Benhamouda, David Pointcheval
2015/195 (PDF ) Zero-knowledge Argument for Polynomial Evaluation with Application to Blacklists Stephanie Bayer, Jens Groth
2015/194 (PDF ) Practical Homomorphic MACs for Arithmetic Circuits Dario Catalano, Dario Fiore
2015/193 (PDF ) Improving Modular Inversion in RNS using the Plus-Minus Method Karim Bigou, Arnaud Tisserand
2015/192 (PDF ) Memory-saving computation of the pairing final exponentiation on BN curves Sylvain DUQUESNE, Loubna GHAMMAM
2015/191 (PDF ) iDASH Secure Genome Analysis Competition Using ObliVM Xiao Shaun Wang, Chang Liu, Kartik Nayak, Yan Huang, Elaine Shi
2015/190 (PDF ) Multi-Client Non-Interactive Verifiable Computation Seung Geol Choi, Jonathan Katz, Ranjit Kumaresan, Carlos Cid
2015/189 (PDF ) Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance Viet Tung Hoang, Reza Reyhanitabar, Phillip Rogaway, Damian Vizár
2015/188 (PDF ) New Techniques for SPHFs and Efficient One-Round PAKE Protocols Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud
2015/187 (PDF ) How Fair is Your Protocol? A Utility-based Approach to Protocol Optimality Juan Garay, Jonathan Katz, Bjoern Tackmann, Vassilis Zikas
2015/186 (PDF ) Higher Order Differential Analysis of NORX Sourav Das, Subhamoy Maitra, Willi Meier
2015/185 (PDF ) Remotely Managed Logic Built-In Self-Test for Secure M2M Communications Elena Dubrova, Mats Näslund, Gunnar Carlsson, John Fornehed, Ben Smeets
2015/184 (PDF ) Links Between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities Céline Blondeau, Kaisa Nyberg
2015/183 (PDF ) New Links Between Differential and Linear Cryptanalysis Céline Blondeau, Kaisa Nyberg
2015/182 (PDF ) Tweakable Blockciphers with Asymptotically Optimal Security Rodolphe Lampe, Yannick Seurin
2015/181 (PDF ) Links among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis Bing Sun, Zhiqiang Liu, Vincent Rijmen, Ruilin Li, Lei Cheng, Qingju Wang, Hoda Alkhzaimi, Chao Li
2015/180 (PDF ) Key-Homomorphic Constrained Pseudorandom Functions Abhishek Banerjee, Georg Fuchsbauer, Chris Peikert, Krzysztof Pietrzak, Sophie Stevens
2015/179 (PDF ) A Simple Method for Obtaining Relations Among Factor Basis Elements for Special Hyperelliptic Curves Palash Sarkar, Shashank Singh
2015/178 (PDF ) How to Incentivize Data-Driven Collaboration Among Competing Parties Pablo Daniel Azar, Shafi Goldwasser, Sunoo Park
2015/177 (PDF ) On the Security of an Efficient Group Key Agreement Scheme for MANETs Purushothama B R, Nishat Koti
2015/176 (PDF ) Key Recovery for LWE in Polynomial Time Kim Laine, Kristin Lauter
2015/175 (PDF ) Trivial Nonce-Misusing Attack on Pure OMD Tomer Ashur, Bart Mennink
2015/174 (PDF ) A Practical Chosen Message Power Analysis Approach Against Ciphers with the Key Whitening Layers Chenyang Tu, Lingchen Zhang, Zeyi Liu, Neng Gao, Yuan Ma
2015/173 (PDF ) Indistinguishability Obfuscation from Compact Functional Encryption Prabhanjan Ananth, Abhishek Jain
2015/172 (PDF ) Silent Simon: A Threshold Implementation under 100 Slices Aria Shahverdi, Mostafa Taha, Thomas Eisenbarth
2015/171 (PDF ) Authenticated Network Time Synchronization Benjamin Dowling, Douglas Stebila, Greg Zaverucha
2015/170 (PDF ) Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer
2015/169 (PDF ) Short Schnorr signatures require a hash function with more than just random-prefix resistance Daniel R. L. Brown
2015/168 (PDF ) More PS and H-like bent functions C. Carlet
2015/167 (PDF ) Post-Zeroizing Obfuscation: The case of Evasive Circuits Saikrishna Badrinarayanan, Eric Miles, Amit Sahai, Mark Zhandry
2015/166 (PDF ) Naturally Rehearsing Passwords Jeremiah Blocki, Manuel Blum, Anupam Datta
2015/165 (PDF ) The Cryptographic Hardness of Random Local Functions -- Survey Benny Applebaum
2015/164 (PDF ) Constant Size Ring Signature Without Random Oracle Priyanka Bose, Dipanjan Das, C. Pandu Rangan
2015/163 (PDF ) Indistinguishability Obfuscation from Functional Encryption Nir Bitansky, Vinod Vaikuntanathan
2015/162 (PDF ) New Multilinear Maps over the Integers Jean-Sebastien Coron, Tancrede Lepoint, Mehdi Tibouchi
2015/161 (PDF ) Exploring the Resilience of Some Lightweight Ciphers Against Profiled Single Trace Attacks Valentina Banciu, Elisabeth Oswald, Carolyn Whitnall
2015/160 (PDF ) Differential-Linear Cryptanalysis of ICEPOLE Tao Huang, Ivan Tjuawinata, Hongjun Wu
2015/159 (PDF ) Leaked-State-Forgery Attack Against The Authenticated Encryption Algorithm ALE Shengbao Wu, Hongjun Wu, Tao Huang, Mingsheng Wang, Wenling Wu
2015/158 (PDF ) Multi-Input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions Zvika Brakerski, Ilan Komargodski, Gil Segev
2015/157 (PDF ) Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings Nuttapong Attrapadung, Shota Yamada
2015/156 (PDF ) Building Lossy Trapdoor Functions from Lossy Encryption Brett Hemenway, Rafail Ostrovsky
2015/155 (PDF ) On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining Loi Luu, Ratul Saha, Inian Parameshwaran, Prateek Saxena, Aquinas Hobor
2015/154 (PDF ) Circuits Resilient to Additive Attacks with Applications to Secure Computation Daniel Genkin, Yuval Ishai, Manoj M. Prabhakaran, Amit Sahai, Eran Tromer
2015/153 (PDF ) Functional Encryption from (Small) Hardware Tokens Kai-Min Chung, Jonathan Katz, Hong-Sheng Zhou
2015/152 (PDF ) Inverting the Final exponentiation of Tate pairings on ordinary elliptic curves using faults Ronan Lashermes, Jacques Fournier, Louis Goubin
2015/151 (PDF ) Bad directions in cryptographic hash functions Daniel J. Bernstein, Andreas Hülsing, Tanja Lange, Ruben Niederhagen
2015/150 (PDF ) Insynd: Improved Privacy-Preserving Transparency Logging Roel Peeters, Tobias Pulls
2015/149 (PDF ) Cryptanalysis of HMAC/NMAC-Whirlpool Jian Guo, Yu Sasaki, Lei Wang, Shuang Wu
2015/148 (PDF ) On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs Yossef Oren, Ahmad-Reza Sadeghi, Christian Wachsmann
2015/147 (PDF ) High Precision Fault Injections on the Instruction Cache of ARMv7-M Architectures Lionel Rivière, Zakaria Najm, Pablo Rauzy, Jean-Luc Danger, Julien Bringer, Laurent Sauvage
2015/146 (PDF ) New Attacks on Feistel Structures with Improved Memory Complexities Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir
2015/145 (PDF ) Observations on the SIMON block cipher family Stefan Kölbl, Gregor Leander, Tyge Tiessen
2015/144 (PDF ) Security of the AES with a Secret S-box Tyge Tiessen, Lars R. Knudsen, Stefan Kölbl, Martin M. Lauridsen
2015/143 (PDF ) Harder, Better, Faster, Stronger - Elliptic Curve Discrete Logarithm Computations on FPGAs Erich Wenger, Paul Wolfger
2015/142 (PDF ) Multi-Client Verifiable Computation with Stronger Security Guarantees S. Dov Gordon, Jonathan Katz, Feng-Hao Liu, Elaine Shi, Hong-Sheng Zhou
2015/141 (PDF ) Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks using the Matrix Method Céline Blondeau, Marine Minier
2015/140 (PDF ) The Random Oracle Model: A Twenty-Year Retrospective Neal Koblitz, Alfred Menezes
2015/139 (PDF ) Performance Analysis of Some Password Hashing Schemes Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya
2015/138 (PDF ) A Practical Key Exchange for the Internet using Lattice Cryptography Vikram Singh
2015/137 (PDF ) Multi-keyword Similarity Search Over Encrypted Cloud Data Mikhail Strizhov, Indrajit Ray
2015/136 (PDF ) Lyra2: Efficient Password Hashing with High Security against Time-Memory Trade-Offs Marcos A. Simplicio Jr., Leonardo C. Almeida, Ewerton R. Andrade, Paulo C. F. dos Santos, Paulo S. L. M. Barreto
2015/135 (PDF ) Generalizing Efficient Multiparty Computation Bernardo David, Ryo Nishimaki, Samuel Ranellucci, Alain Tapp
2015/134 (PDF ) From Related-Key Distinguishers to Related-Key-Recovery on Even-Mansour Constructions Pierre Karpman
2015/133 (PDF ) Private Computation on Encrypted Genomic Data Kristin Lauter, Adriana Lopez-Alt, Michael Naehrig
2015/132 (PDF ) Homomorphic Computation of Edit Distance Jung Hee Cheon, Miran Kim, Kristin Lauter
2015/131 (PDF ) On Lightweight Stream Ciphers with Shorter Internal States Frederik Armknecht, Vasily Mikhalev
2015/130 (PDF ) How to Bootstrap Anonymous Communication Sune K. Jakobsen, Claudio Orlandi
2015/129 (PDF ) Block-wise Non-Malleable Codes Nishanth Chandran, Vipul Goyal, Pratyay Mukherjee, Omkant Pandey, Jalaj Upadhyay
2015/128 (PDF ) Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro
2015/127 (PDF ) Adaptive key recovery attacks on NTRU-based somewhat homomorphic encryption schemes Ricardo Dahab, Steven Galbraith, Eduardo Morais
2015/126 (PDF ) Perfect Structure on the Edge of Chaos Nir Bitansky, Omer Paneth, Daniel Wichs
2015/125 (PDF ) Multilinear Pseudorandom Functions Aloni Cohen, Justin Holmgren
2015/124 (PDF ) GliFreD: Glitch-Free Duplication - Towards Power-Equalized Circuits on FPGAs Alexander Wild, Amir Moradi, Tim Güneysu
2015/123 (PDF ) Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting Dennis Hofheinz, Jessica Koch, Christoph Striecks
2015/122 (PDF ) Constructing Mixed-integer Programming Models whose Feasible Region is Exactly the Set of All Valid Differential Characteristics of SIMON Siwei Sun, Lei Hu, Meiqin Wang, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Danping Shi, Ling Song, Kai Fu
2015/121 (PDF ) Multi-Client Oblivious RAM secure against Malicious Servers Travis Mayberry, Erik-Oliver Blass, Guevara Noubir
2015/120 (PDF ) Reconfigurable LUT: A Double Edged Sword for Security-Critical Applications Debapriya Basu Roy, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger, Debdeep Mukhopadhyay, Xuan Thuy Ngo, Zakaria Najm
2015/119 (PDF ) Making Masking Security Proofs Concrete or How to Evaluate the Security of any Leaking Device (Extended Version) Alexandre Duc, Sebastian Faust, François-Xavier Standaert
2015/118 (PDF ) Constructing and Understanding Chosen Ciphertext Security via Puncturable Key Encapsulation Mechanisms Takahiro Matsuda, Goichiro Hanaoka
2015/117 (PDF ) Nonuniform Indistinguishability and Unpredictability Hardcore Lemmas: New Proofs and Applications to Pseudoentropy Maciej Skorski
2015/116 (PDF ) Efficient Hardware Design for Computing Pairings Using Few FPGA In-built DSPs Riadh Brinci, Walid Khmiri, Mefteh Mbarek, Abdellatif Ben Rabâa, Ammar Bouallègue
2015/115 (PDF ) Comprehensive Efficient Implementations of ECC on C54xx Family of Low-cost Digital Signal Processors Muhammad Yasir Malik
2015/114 (PDF ) Weak Ideal Functionalities for Designing Random Oracles with Applications to Fugue Shai Halevi, William E. Hall, Charanjit S. Jutla, Arnab Roy
2015/113 (PDF ) Stream ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression Anne Canteaut, Sergiu Carpov, Caroline Fontaine, Tancrède Lepoint, María Naya-Plasencia, Pascal Paillier, Renaud Sirdey
2015/112 (PDF ) Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption Satsuya Ohata, Yutaka Kawai, Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura
2015/111 (PDF ) The Multivariate Hidden Number Problem Steven D. Galbraith, Barak Shani
2015/110 (PDF ) sHMQV: An Efficient Key Exchange Protocol for Power-limited Devices Shijun Zhao, Qianying Zhang
2015/108 (PDF ) TRACING ATTACKS ON U-PROVE WITH REVOCATION MECHANISM Lucjan Hanzlik, Przemysław Kubiak, Mirosław Kutyłowski
2015/107 (PDF ) Dynamic Searchable Symmetric Encryption with Minimal Leakage and Efficient Updates on Commodity Hardware Attila A. Yavuz, Jorge Guajardo
2015/106 (PDF ) Provably weak instances of Ring-LWE Yara Elias, Kristin E. Lauter, Ekin Ozman, Katherine E. Stange
2015/105 (PDF ) Inner Product Masking Revisited Josep Balasch, Sebastian Faust, Benedikt Gierlichs
2015/104 (PDF ) Weakening the Isolation Assumption of Tamper-proof Hardware Tokens Rafael Dowsley, Jörn Müller-Quade, Tobias Nilges
2015/103 (PDF ) Mergeable Functional Encryption Vincenzo Iovino, Karol Zebrowski
2015/102 (PDF ) GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte Shay Gueron, Yehuda Lindell
2015/101 (PDF ) Multi-Key Security: The Even-Mansour Construction Revisited Nicky Mouha, Atul Luykx
2015/100 (PDF ) Influence of Electrical Circuits of ECC Designs on Shape of Electromagnetic Traces measured on FPGA Christian Wittke, Zoya Dyka, Peter Langendoerfer
2015/099 (PDF ) Universally Composable Firewall Architectures using Trusted Hardware Dirk Achenbach, Jörn Müller-Quade, Jochen Rill
2015/098 (PDF ) Adaptive-ID Secure Revocable Identity-Based Encryption from Lattices via Subset Difference Method Shantian Cheng, Juanyang Zhang
2015/097 (PDF ) Surreptitiously Weakening Cryptographic Systems Bruce Schneier, Matthew Fredrikson, Tadayoshi Kohno, Thomas Ristenpart
2015/096 (PDF ) A Meet in the Middle Attack on Reduced Round Kuznyechik Riham AlTawy, Amr M. Youssef
2015/095 (PDF ) Rotational Cryptanalysis of ARX Revisited Dmitry Khovratovich, Ivica Nikolic, Josef Pieprzyk, Przemyslaw Sokolowski, Ron Steinfeld
2015/094 (PDF ) Some New Results on Binary Polynomial Multiplication Murat Cenk, M. Anwar Hasan
2015/093 (PDF ) Generalization of Statistical Criteria for Sboxes S. M. Dehnavi, A. Mahmoodi Rishakani, M. R. Mirzaee Shamsabad, Einollah Pasha
2015/092 (PDF ) TOWARDS THE GENERATION OF A DYNAMIC KEY-DEPENDENT S-BOX TO ENHANCE SECURITY Grasha Jacob, Dr. A. Murugan, Irine Viola
2015/091 (PDF ) Related-Key Forgeries for Prøst-OTR Christoph Dobraunig, Maria Eichlseder, Florian Mendel
2015/090 (PDF ) Structural Evaluation by Generalized Integral Property Yosuke Todo
2015/089 (PDF ) On the security margin of MAC striping Thomas Eisenbarth, Aaron Meyerowitz, Rainer Steinwandt
2015/088 (PDF ) Structural Weaknesses in the Open Smart Grid Protocol Klaus Kursawe, Christiane Peters
2015/087 (PDF ) Revisiting Cryptographic Accumulators, Additional Properties and Relations to other Primitives David Derler, Christian Hanser, Daniel Slamanig
2015/086 (PDF ) Practical Compact E-Cash with Arbitrary Wallet Size Patrick Märtens
2015/085 (PDF ) On the behaviors of affine equivalent Sboxes regarding differential and linear attacks Anne Canteaut, Joëlle Roué
2015/084 (PDF ) On the Disadvantages of Pairing-based Cryptography Zhengjun Cao, Lihua Liu
2015/083 (PDF ) Key Recovery Attacks against NTRU-based Somewhat Homomorphic Encryption Schemes Massimo Chenal, Qiang Tang
2015/082 (PDF ) On the Difficulty of Securing Web Applications using CryptDB İhsan Haluk AKIN, Berk Sunar
2015/081 (PDF ) Amortizing Garbled Circuits Yan Huang, Jonathan Katz, Vladimir Kolesnikov, Ranjit Kumaresan, Alex J. Malozemoff
2015/080 (PDF ) The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group Feng Hao, Xun Yi, Liqun Chen, Siamak F. Shahandashti
2015/079 (PDF ) On the Security of the COPA and Marble Authenticated Encryption Algorithms against (Almost) Universal Forgery Attack Jiqiang Lu
2015/078 (PDF ) Fully Homomorphic Encryption from Ring-LWE:Identity-Based,Arbitrary Cyclotomic,Tighter Parameters GU Chun-xiang, Xin Dan, ZHENG Yong-hui, KANG Yuan-ji
2015/077 (PDF ) On the Primary Constructions of Vectorial Boolean Bent Functions Yuwei Xu, Chuankun Wu
2015/076 (PDF ) Fully Structure-Preserving Signatures and Shrinking Commitments Masayuki Abe, Markulf Kohlweiss, Miyako Ohkubo, Mehdi Tibouchi
2015/075 (PDF ) Equivalent Key Recovery Attacks against HMAC and NMAC with Whirlpool Reduced to 7 Rounds Jian Guo, Yu Sasaki, Lei Wang, Meiqin Wang, Long Wen
2015/074 (PDF ) Mind the Gap: Modular Machine-checked Proofs of One-Round Key Exchange Protocols Gilles Barthe, Juan Manuel Crespo, Yassine Lakhnech, Benedikt Schmidt
2015/073 (PDF ) Oblivious Network RAM and Leveraging Parallelism to Achieve Obliviousness Dana Dachman-Soled, Chang Liu, Charalampos Papamanthou, Elaine Shi, Uzi Vishkin
2015/072 (PDF ) Non-Interactive Zero-Knowledge Proofs of Non-Membership Olivier Blazy, Céline Chevalier, Damien Vergnaud
2015/071 (PDF ) Factoring N=p^r q^s for Large r and s Jean-Sebastien Coron, Jean-Charles Faugere, Guenael Renault, Rina Zeitoun
2015/070 (PDF ) The Sum Can Be Weaker Than Each Part Gaëtan Leurent, Lei Wang
2015/069 (PDF ) On the Provable Security of the Iterated Even-Mansour Cipher against Related-Key and Chosen-Key Attacks Benoît Cogliati, Yannick Seurin
2015/068 (PDF ) A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro Gregor Leander, Brice Minaud, Sondre Rønjom
2015/067 (PDF ) Non-black-box Simulation in the Fully Concurrent Setting, Revisited Susumu Kiyoshima
2015/066 (PDF ) Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware Tobias Schneider, Amir Moradi, Tim Güneysu
2015/065 (PDF ) A lightweight-friendly modifcation of GOST block cipher Andrey Dmukh, Denis Dygin, Grigory Marshalko
2015/064 (PDF ) Optimally Efficient Multi-Party Fair Exchange and Fair Secure Multi-Party Computation Handan Kılınç, Alptekin Küpçü
2015/063 (PDF ) CamlCrush: A PKCS\#11 Filtering Proxy R. Benadjila, T. Calderon, M. Daubignard
2015/062 (PDF ) Evaluation and Cryptanalysis of the Pandaka Lightweight Cipher Yuval Yarom, Gefei Li, Damith C. Ranasinghe
2015/061 (PDF ) More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries Gilad Asharov, Yehuda Lindell, Thomas Schneider, Michael Zohner
2015/060 (PDF ) Verified Proofs of Higher-Order Masking Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Pierre-Yves Strub
2015/059 (PDF ) Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation Alexandra Boldyreva, Jean Paul Degabriele, Kenneth G. Paterson, Martijn Stam
2015/058 (PDF ) Universally Verifiable Multiparty Computation from Threshold Homomorphic Cryptosystems Berry Schoenmakers, Meilof Veeningen
2015/057 (PDF ) Cold Boot Attacks in the Discrete Logarithm Setting Bertram Poettering, Dale L. Sibborn
2015/056 (PDF ) Better Algorithms for LWE and LWR Alexandre Duc, Florian Tramèr, Serge Vaudenay
2015/055 (PDF ) Richer Efficiency/Security Trade-offs in 2PC Vladimir Kolesnikov, Payman Mohassel, Ben Riva, Mike Rosulek
2015/054 (PDF ) Non-committing encryption from $\Phi$-hiding Brett Hemenway, Rafail Ostrovsky, Alon Rosen
2015/053 (PDF ) Tight Bounds for Keyed Sponges and Truncated CBC Peter Gaži, Krzysztof Pietrzak, Stefano Tessaro
2015/052 (PDF ) Interactive Message-Locked Encryption and Secure Deduplication Mihir Bellare, Sriram Keelveedhi
2015/051 (PDF ) Improved Meet-in-the-Middle Distinguisher on Feistel Schemes Li Lin, Wenling Wu
2015/050 (PDF ) Stretching Groth-Sahai: NIZK Proofs of Partial Satisfiability Carla Ràfols
2015/049 (PDF ) On Solving Lpn using BKW and Variants Sonia Bogos, Florian Tramer, Serge Vaudenay
2015/048 (PDF ) On Obfuscation with Random Oracles Ran Canetti, Yael Tauman Kalai, Omer Paneth
2015/047 (PDF ) Linearly Homomorphic Encryption from DDH Guilhem Castagnos, Fabien Laguillaumie
2015/046 (PDF ) On the concrete hardness of Learning with Errors Martin R. Albrecht, Rachel Player, Sam Scott
2015/045 (PDF ) Reliable Information Extraction for Single Trace Attacks Valentina Banciu, Elisabeth Oswald, Carolyn Whitnall
2015/044 (PDF ) Use of SIMD-Based Data Parallelism to Speed up Sieving in Integer-Factoring Algorithms Binanda Sengupta, Abhijit Das
2015/043 (PDF ) Group Signature with Deniability: How to Disavow a Signature Ai Ishida, Keita Emura, Goichiro Hanaoka, Yusuke Sakai, Keisuke Tanaka
2015/042 (PDF ) High Performance Lattice-based CCA-secure Encryption Rachid El Bansarkhani, Johannes Buchmann
2015/041 (PDF ) Parallel (probable) lock-free HashSieve: a practical sieving algorithm for the SVP Artur Mariano, Thijs Laarhoven, Christian Bischof
2015/040 (PDF ) Automated Dynamic Cube Attack on Block Ciphers: Cryptanalysis of SIMON and KATAN Zahra Ahmadian, Shahram Rasoolzadeh, Mahmoud Salmasizadeh, Mohammad Reza Aref
2015/039 (PDF ) Type-Based Verification of Electronic Voting Protocols Véronique Cortier, Fabienne Eigner, Steve Kremer, Matteo Maffei, Cyrille Wiedling
2015/038 (PDF ) Aggregate Pseudorandom Functions and Connections to Learning Aloni Cohen, Shafi Goldwasser, Vinod Vaikuntanathan
2015/037 (PDF ) Analysis and Enhancement of Desynchronization Attack on an Ultralightweight RFID Authentication Protocol Da-Zhi Sun, Zahra Ahmadian, Yue-Jiao Wang, Mahmoud Salmasizadeh, Mohammad Reza Aref
2015/036 (PDF ) Faster software for fast endomorphisms Billy Bob Brumley
2015/035 (PDF ) Cryptographically Secure CRC for Lightweight Message Authentication Elena Dubrova, Mats Näslund, Göran Selander, Fredrik Lindqvist
2015/034 (PDF ) Suit up! Made-to-Measure Hardware Implementations of Ascon Hannes Groß, Erich Wenger, Christoph Dobraunig, Christoph Ehrenhöfer
2015/033 (PDF ) On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel
2015/032 (PDF ) Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions Or: How to Secretly Embed a Circuit in Your PRF Zvika Brakerski, Vinod Vaikuntanathan
2015/031 (PDF ) Tight Parallel Repetition Theorems for Public-Coin Arguments using KL-divergence Kai-Min Chung, Rafael Pass
2015/030 (PDF ) Cryptanalysis of Ascon Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer
2015/029 (PDF ) Predicate Encryption for Circuits from LWE Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee
2015/028 (PDF ) Optimal software-implemented Itoh--Tsujii inversion for GF($2^m$) Jeremy Maitin-Shepard
2015/027 (PDF ) On the Regularity of Lossy RSA: Improved Bounds and Applications to Padding-Based Encryption Adam Smith, Ye Zhang
2015/026 (PDF ) A More Explicit Formula for Linear Probabilities of Modular Addition Modulo a Power of Two S. M. Dehnavi, A. Mahmoodi Rishakani, M. R. Mirzaee Shamsabad
2015/025 (PDF ) Obfuscating Circuits via Composite-Order Graded Encoding Benny Applebaum, Zvika Brakerski
2015/024 (PDF ) Non-Abelian Analogs of Lattice Rounding Evgeni Begelfor, Stephen D. Miller, Ramarathnam Venkatesan
2015/023 (PDF ) Multilinear Maps Using Ideal Lattices without Encodings of Zero Gu Chunsheng
2015/022 (PDF ) TMSUI: A Trust Management Scheme of USB Storage Devices for Industrial Control Systems Bo Yang, Dengguo Feng, Yu Qin, Yingjun Zhang, Weijin Wang
2015/021 (PDF ) Non-Malleable Condensers for Arbitrary Min-Entropy, and Almost Optimal Protocols for Privacy Amplification Xin Li
2015/020 (PDF ) Simpler Efficient Group Signatures from Lattices Phong Q. Nguyen, Jiang Zhang, Zhenfeng Zhang
2015/019 (PDF ) Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds Gilles Barthe, Edvard Fagerholm, Dario Fiore, Andre Scedrov, Benedikt Schmidt, Mehdi Tibouchi
2015/018 (PDF ) A LINEAR ATTACK ON A KEY EXCHANGE PROTOCOL USING EXTENSIONS OF MATRIX SEMIGROUPS JINTAI DING, ALEXEI MIASNIKOV, ALEXANDER USHAKOV
2015/017 (PDF ) Simple Functional Encryption Schemes for Inner Products Michel Abdalla, Florian Bourse, Angelo De Caro, David Pointcheval
2015/016 (PDF ) Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption Yannis Rouselakis, Brent Waters
2015/015 (PDF ) One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model Florian Bergsma, Tibor Jager, Jörg Schwenk
2015/014 (PDF ) Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-based San Ling, Khoa Nguyen, Huaxiong Wang
2015/013 (PDF ) Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification Nico Döttling
2015/012 (PDF ) Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme Used in PIR Tancrède Lepoint, Mehdi Tibouchi
2015/011 (PDF ) Block Cipher Speed and Energy Efficiency Records on the MSP430: System Design Trade-Offs for 16-bit Embedded Applications Benjamin Buhrow, Paul Riemer, Mike Shea, Barry Gilbert, Erik Daniel
2015/010 (PDF ) Simulation-based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms Shengli Liu, Kenneth G. Paterson
2015/009 (PDF ) Rig: A simple, secure and flexible design for Password Hashing Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya
2015/008 (PDF ) Post-Quantum Forward-Secure Onion Routing (Future Anonymity in Today’s Budget) Satrajit Ghosh, Aniket Kate
2015/007 (PDF ) Balloon: A Forward-Secure Append-Only Persistent Authenticated Data Structure Tobias Pulls, Roel Peeters
2015/006 (PDF ) Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions Jan Camenisch, Robert R. Enderlein, Gregory Neven
2015/005 (PDF ) Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM Srinivas Devadas, Marten van Dijk, Christopher W. Fletcher, Ling Ren, Elaine Shi, Daniel Wichs
2015/004 (PDF ) Oblivious Polynomial Evaluation and Secure Set-Intersection from Algebraic PRFs Carmit Hazay
2015/003 (PDF ) Continuous Non-Malleable Key Derivation and Its Application to Related-Key Security Baodong Qin, Shengli Liu, Tsz Hon Yuen, Robert H. Deng, Kefei Chen
2015/002 (PDF ) Characterization of MDS mappings S. M. Dehnavi, A. Mahmoodi Rishakani, M. R. Mirzaee Shamsabad
2015/001 (PDF ) A note on the security of Higher-Order Threshold Implementations Oscar Reparaz
2014/1029 (PDF ) On the Cryptographic Hardness of Finding a Nash Equilibrium Nir Bitansky, Omer Paneth, Alon Rosen
2014/1028 (PDF ) Security Weaknesses of an "Anonymous Attribute Based Encryption" appeared in ASIACCS'13 Payal Chaudhari, Manik Lal Das, Anish Mathuria
2014/1027 (PDF ) Simple Lattice Trapdoor Sampling from a Broad Class of Distributions Vadim Lyubashevsky, Daniel Wichs
2014/1026 (PDF ) Lattices with Symmetry H. W. Lenstra Jr., A. Silverberg
2014/1025 (PDF ) XPIR: Private Information Retrieval for Everyone Carlos Aguilar-Melchor, Joris Barrier, Laurent Fousse, Marc-Olivier Killijian
2014/1024 (PDF ) Cryptanalysis of the Co-ACD Assumption Pierre-Alain Fouque, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi
2014/1023 (PDF ) How to Generate Repeatable Keys Using Physical Unclonable Functions Correcting PUF Errors with Iteratively Broadening and Prioritized Search Nathan E. Price, Alan T. Sherman
2014/1022 (PDF ) Topology-Hiding Computation Tal Moran, Ilan Orlov, Silas Richelson
2014/1021 (PDF ) Tightly-Secure Signatures from Chameleon Hash Functions Olivier Blazy, Saqib A. Kakvi, Eike Kiltz, Jiaxin Pan
2014/1020 (PDF ) Side-Channel Leakage and Trace Compression using Normalized Inter-Class Variance Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm
2014/1018 (PDF ) Algebraic Algorithms for LWE Martin R. Albrecht, Carlos Cid, Jean-Charles Faugère, Ludovic Perret
2014/1017 (PDF ) Sorting and Searching Behind the Curtain: Private Outsourced Sort and Frequency-Based Ranking of Search Results Over Encrypted Data Foteini Baldimtsi, Olga Ohrimenko
2014/1015 (PDF ) Compact Accumulator using Lattices Mahabir Prasad Jhanwar, Reihaneh Safavi-Naini
2014/1014 (PDF ) Double-and-Add with Relative Jacobian Coordinates Björn Fay
2014/1013 (PDF ) Computational Independence Björn Fay
2014/1012 (PDF ) The Boomerang Attacks on BLAKE and BLAKE2 Yonglin Hao
2014/1011 (PDF ) Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay Alex Biryukov, Ivan Pustogarov
2014/1010 (PDF ) On Continuous After-the-Fact Leakage-Resilient Key Exchange Mohsen Toorani
2014/1009 (PDF ) A Preliminary FPGA Implementation and Analysis of Phatak’s Quotient-First Scaling Algorithm in the Reduced-Precision Residue Number System Christopher D. Nguyen, Dhananjay S. Phatak, Steven D. Houston, Alan T. Sherman
2014/1008 (PDF ) DTLS-HIMMO: Efficiently Securing a Post-Quantum World with a Fully-Collusion Resistant KPS Oscar Garcia-Morchon, Ronald Rietman, Sahil Sharma, Ludo Tolhuizen, Jose Luis Torre-Arce
2014/1007 (PDF ) Fair Multiple-bank E-cash in the Standard Model Jiangxiao Zhang, Yanwu Gao, Chunhui Feng, Hua Guo, Zhoujun Li
2014/1006 (PDF ) Simple composition theorems of one-way functions -- proofs and presentations Jaime Gaspar, Eerke Boiten
2014/1005 (PDF ) A pure block chain based decentralized exchange. Harsh Patel
2014/1004 (PDF ) CONIKS: Bringing Key Transparency to End Users Marcela S. Melara, Aaron Blankstein, Joseph Bonneau, Edward W. Felten, Michael J. Freedman
2014/1003 (PDF ) COFFE: Ciphertext Output Feedback Faithful Encryption Christian Forler, David McGrew, Stefan Lucks, Jakob Wenzel
2014/1002 (PDF ) Experiments in Encrypted and Searchable Network Audit Logs Bhanu Prakash Gopularam, Sashank Dara, Nalini N
2014/1000 (PDF ) Complete Characterization of Fairness in Secure Two-Party Computation of Boolean Functions Gilad Asharov, Amos Beimel, Nikolaos Makriyannis, Eran Omri
2014/999 (PDF ) First Experimental Result of Power Analysis Attacks on a FPGA Implementation of LEA Yongdae Kim, Hyunsoo Yoon
2014/998 (PDF ) Hierarchical deterministic Bitcoin wallets that tolerate key leakage Gus Gutoski, Douglas Stebila
2014/997 (PDF ) Constants Count: Practical Improvements to Oblivious RAM Ling Ren, Christopher W. Fletcher, Albert Kwon, Emil Stefanov, Elaine Shi, Marten van Dijk, Srinivas Devadas
2014/996 (PDF ) Some experiments investigating a possible L(1/4) algorithm for the discrete logarithm problem in algebraic curves Maike Massierer
2014/995 (PDF ) Partial Garbling Schemes and Their Applications Yuval Ishai, Hoeteck Wee
2014/994 (PDF ) Key-Policy Multi-authority Attribute-Based Encryption Riccardo Longo, Chiara Marcolla, Massimiliano Sala
2014/993 (PDF ) How Different Electrical Circuits of ECC Designs Influence the Shape of Power Traces measured on FPGA Thomas Basmer, Christian Wittke, Zoya Dyka, Peter Langendoerfer
2014/992 (PDF ) Incentivized Outsourced Computation Resistant to Malicious Contractors Alptekin Kupcu
2014/991 (PDF ) Constant-Round Concurrent Zero-knowledge from Indistinguishability Obfuscation Kai-Min Chung, Huijia Lin, Rafael Pass
2014/990 (PDF ) Combining Secret Sharing and Garbled Circuits for Efficient Private IEEE 754 Floating-Point Computations Pille Pullonen, Sander Siim
2014/989 (PDF ) Controlled Homomorphic Encryption: Definition and Construction Yvo Desmedt, Vincenzo Iovino, Giuseppe Persiano, Ivan Visconti
2014/988 (PDF ) Armadillo: a compilation chain for privacy preserving applications Sergiu Carpov, Paul Dubrulle, Renaud Sirdey
2014/987 (PDF ) Cryptanalysis of Full PRIDE Block Cipher Yibin Dai, Shaozhen Chen
2014/986 (PDF ) Related-Key Differential Attack on Round Reduced RECTANGLE-80 Jinyong Shan, Lei Hu, Ling Song, Siwei Sun, Xiaoshuang Ma
2014/985 (PDF ) Statistical weakness in Spritz against VMPC-R: in search for the RC4 replacement Bartosz Zoltak
2014/984 (PDF ) Undermining Isolation through Covert Channels in the Fiasco.OC Microkernel Michael Peter, Jan Nordholz, Matthias Petschick, Janis Danisevskis, Julian Vetter, Jean-Pierre Seifert
2014/983 (PDF ) Public Verification of Private Effort Giulia Alberini, Tal Moran, Alon Rosen
2014/982 (PDF ) Outlier Privacy Edward Lui, Rafael Pass
2014/981 (PDF ) Publicly Verifiable Non-Interactive Arguments for Delegating Computation Omer Paneth, Guy N. Rothblum
2014/980 (PDF ) A Fast Phase-Based Enumeration Algorithm for SVP Challenge through y-Sparse Representations of Short Lattice Vectors Dan Ding, Guizhen Zhu, Yang Yu, Zhongxiang Zheng
2014/979 (PDF ) The Chaining Lemma and its application Ivan Damgaard, Sebastian Faust, Pratyay Mukherjee, Daniele Venturi
2014/978 (PDF ) Improved Differential Analysis of Block Cipher PRIDE Qianqian Yang, Lei Hu, Siwei Sun, Kexin Qiao, Ling Song, Jinyong Shan, Xiaoshuang Ma
2014/977 (PDF ) A Survey on Lightweight Entity Authentication with Strong PUFs Jeroen Delvaux, Roel Peeters, Dawu Gu, Ingrid Verbauwhede
2014/976 (PDF ) Geppetto: Versatile Verifiable Computation Craig Costello, Cédric Fournet, Jon Howell, Markulf Kohlweiss, Benjamin Kreuter, Michael Naehrig, Bryan Parno, Samee Zahur
2014/975 (PDF ) Cryptanalysis of Two Candidate Fixes of Multilinear Maps over the Integers Jean-Sebastien Coron, Tancrede Lepoint, Mehdi Tibouchi
2014/973 (PDF ) Improved Linear (hull) Cryptanalysis of Round-reduced Versions of SIMON Danping Shi, Lei Hu, Siwei Sun, Ling Song, Kexin Qiao, Xiaoshuang Ma
2014/972 (PDF ) A Chinese Remainder Theorem Approach to Bit-Parallel GF(2^n) Polynomial Basis Multipliers for Irreducible Trinomials Haining Fan
2014/971 (PDF ) Key recovery attacks on Grain family using BSW sampling and certain weaknesses of the filtering function Y. Wei, E. Pasalic, F. Zhang, W. Wu
2014/970 (PDF ) Jackpot Stealing Information From Large Caches via Huge Pages Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar
2014/969 (PDF ) Privacy-Preserving Face Recognition with Outsourced Computation Can Xiang, Chunming Tang
2014/968 (PDF ) Attacks on Secure Ownership Transfer for Multi-Tag Multi-Owner Passive RFID Environments Jorge Munilla, Mike Burmester, Albert Peinado
2014/967 (PDF ) A Comprehensive Comparison of Shannon Entropy and Smooth Renyi Entropy Maciej Skorski
2014/966 (PDF ) Privacy-Preserving Data Publish-Subscribe Service on Cloud-based Platforms Kan Yang, Xiaohua Jia, Kuan Zhang, Xuemin (Sherman) Shen
2014/965 (PDF ) Predicate Encryption for Multi-Dimensional Range Queries from Lattices Romain Gay, Pierrick Méaux, Hoeteck Wee
2014/964 (PDF ) On two windows multivariate cryptosystem depending on random parameters Urszula Romańczuk-Polubiec, Vasyl Ustimenko
2014/963 (PDF ) Malicious-Client Security in Blind Seer: A Scalable Private DBMS Ben Fisch, Binh Vo, Fernando Krell, Abishek Kumarasubramanian, Vladimir Kolesnikov, Tal Malkin, Steven M. Bellovin
2014/962 (PDF ) Solving Polynomial Systems with Noise over F_2: Revisited Zhenyu Huang, Dongdai Lin
2014/961 (PDF ) When are Fuzzy Extractors Possible? Benjamin Fuller, Leonid Reyzin, Adam Smith
2014/960 (PDF ) Non-Interactive Secure Multiparty Computation Amos Beimel, Ariel Gabizon, Yuval Ishai, Eyal Kushilevitz, Sigurd Meldgaard, Anat Paskin-Cherniavsky
2014/959 (PDF ) Attacking Suggest Boxes in Web Applications Over HTTPS Using Side-Channel Stochastic Algorithms Alexander Schaub, Emmanuel Schneider, Alexandros Hollender, Vinicius Calasans, Laurent Jolie, Robin Touillon, Annelie Heuser, Sylvain Guilley, Olivier Rioul
2014/958 (PDF ) Authenticated Encryption: How Reordering can Impact Performance Basel Alomair
2014/957 (PDF ) Black Box Separations for Differentially Private Protocols Dakshita Khurana, Hemanta K. Maji, Amit Sahai
2014/956 (PDF ) Tamper Detection and Continuous Non-Malleable Codes Zahra Jafargholi, Daniel Wichs
2014/955 (PDF ) On the Asymptotic Idealness of the Asmuth-Bloom Threshold Secret Sharing Scheme Constantin Catalin Dragan, Ferucio Laurentiu Tiplea
2014/954 (PDF ) Algebraic Fault Analysis of Katan Frank Quedenfeld
2014/953 (PDF ) The Related-Key Security of Iterated Even-Mansour Ciphers Pooya Farshim, Gordon Procter
2014/952 (PDF ) Balanced Encoding to Mitigate Power Analysis: A Case Study Cong Chen, Thomas Eisenbarth, Aria Shahverdi, Xin Ye
2014/951 (PDF ) Modified Alternating Step Generators with Non-Linear Scrambler Robert Wicik, Tomasz Rachwalik, Rafał Gliwa
2014/950 (PDF ) Tree-Structured Composition of Homomorphic Encryption: How to Weaken Underlying Assumptions Koji Nuida, Goichiro Hanaoka, Takahiro Matsuda
2014/949 (PDF ) Simplification/complication of the basis of prime Boolean ideal Alexander Rostovtsev, Anna Shustrova
2014/948 (PDF ) Lattice Point Enumeration on Block Reduced Bases Michael Walter
2014/947 (PDF ) The SIMON and SPECK Block Ciphers on AVR 8-bit Microcontrollers Ray Beaulieu, Douglas Shors, Jason Smith, Stefan Treatman-Clark, Bryan Weeks, Louis Wingers
2014/946 (PDF ) On a new fast public key cryptosystem Samir Bouftass, Abdelhak Azhari
2014/945 (PDF ) Boomerang Attack on Step-Reduced SHA-512 Hongbo Yu, Dongxia Bai
2014/944 (PDF ) Structure-Preserving Signatures on Equivalence Classes and Constant-Size Anonymous Credentials Georg Fuchsbauer, Christian Hanser, Daniel Slamanig
2014/943 (PDF ) Advancing the State-of-the-Art in Hardware Trojans Detection Syed Kamran Haider, Chenglu Jin, Masab Ahmad, Devu Manikantan Shila, Omer Khan, Marten van Dijk
2014/942 (PDF ) Public-Coin Differing-Inputs Obfuscation and Its Applications Yuval Ishai, Omkant Pandey, Amit Sahai
2014/941 (PDF ) Garbled RAM From One-Way Functions Sanjam Garg, Steve Lu, Rafail Ostrovsky, Alessandra Scafuro
2014/940 (PDF ) Fully Secure Self-Updatable Encryption in Prime Order Bilinear Groups Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
2014/938 (PDF ) Trapdoor Computational Fuzzy Extractors and Stateless Cryptographically-Secure Physical Unclonable Functions Charles Herder, Ling Ren, Marten van Dijk, Meng-Day (Mandel) Yu, Srinivas Devadas
2014/937 (PDF ) Analysis of Lewko-Sahai-Waters Revocation System Zhengjun Cao, Lihua Liu
2014/936 (PDF ) Outsourcing Secure Two-Party Computation as a Black Box Henry Carter, Benjamin Mood, Patrick Traynor, Kevin Butler
2014/935 (PDF ) Boosting Higher-Order Correlation Attacks by Dimensionality Reduction Nicolas Bruneau, Jean-Luc Danger, Sylvain Guilley, Annelie Heuser, Yannick Teglia
2014/934 (PDF ) Efficient Generic Zero-Knowledge Proofs from Commitments Samuel Ranellucci, Alain Tapp, Rasmus Winther Zakarias
2014/933 (PDF ) Certificateless Proxy Re-Encryption Without Pairing: Revisited Akshayaram Srinivasan, C. Pandu Rangan
2014/932 (PDF ) Bicliques with Minimal Data and Time Complexity for AES (Extended Version) Andrey Bogdanov, Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya
2014/931 (PDF ) Cryptanalysis of JAMBU Thomas Peyrin, Siang Meng Sim, Lei Wang, Guoyan Zhang
2014/930 (PDF ) Immunizing Multilinear Maps Against Zeroizing Attacks Dan Boneh, David J. Wu, Joe Zimmerman
2014/929 (PDF ) Zeroizing without zeroes: Cryptanalyzing multilinear maps without encodings of zero Craig Gentry, Shai Halevi, Hemanta K. Maji, Amit Sahai
2014/928 (PDF ) Implementing Candidate Graded Encoding Schemes from Ideal Lattices Martin R. Albrecht, Catalin Cocis, Fabien Laguillaumie, Adeline Langlois
2014/927 (PDF ) Physical functions : the common factor of side-channel and fault attacks ? Bruno Robisson, Hélène Le Bouder
2014/926 (PDF ) Road-to-Vehicle Communications with Time-Dependent Anonymity: A Light Weight Construction and its Experimental Results Keita Emura, Takuya Hayashi
2014/925 (PDF ) Indistinguishability Obfuscation for Turing Machines with Unbounded Memory Venkata Koppula, Allison Bishop Lewko, Brent Waters
2014/924 (PDF ) Improving the Polynomial time Precomputation of Frobenius Representation Discrete Logarithm Algorithms - Simplified Setting for Small Characteristic Finite Fields Antoine Joux, Cécile Pierrot
2014/922 (PDF ) Differential Analysis of Block Ciphers SIMON and SPECK Alex Biryukov, Arnab Roy, Vesselin Velichkov
2014/921 (PDF ) Batch NFS Daniel J. Bernstein, Tanja Lange
2014/920 (PDF ) Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment Cezary Glowacz, Vincent Grosso, Romain Poussier, Joachim Schueth, François-Xavier Standaert
2014/919 (PDF ) Experimenting with Shuffle Block Cipher and SMT Solvers Martin Stanek
2014/918 (PDF ) Web Tap Payment Authentication and Encryption With Zero Customer Effort Henry Ng
2014/917 (PDF ) From Selective to Adaptive Security in Functional Encryption Prabhanjan Ananth, Zvika Brakerski, Gil Segev, Vinod Vaikuntanathan
2014/916 (PDF ) Adaptively Secure Fully Homomorphic Signatures Based on Lattices Xavier Boyen, Xiong Fan, Elaine Shi
2014/915 (PDF ) Cryptanalysis of the Structure-Preserving Signature Scheme on Equivalence Classes from Asiacrypt 2014 Yanbin Pan
2014/914 (PDF ) Cryptography with One-Way Communication Sanjam Garg, Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai
2014/913 (PDF ) Fully Leakage-Resilient Signatures Revisited: Graceful Degradation, Noisy Leakage, and Construction in the Bounded-Retrieval Model Antonio Faonio, Jesper Buus Nielsen, Daniele Venturi
2014/912 (PDF ) Low-Cost Concurrent Error Detection for GCM and CCM Xiaofei Guo, Ramesh Karri
2014/911 (PDF ) A Denial of Service Attack against Fair Computations using Bitcoin Deposits Jethro Beekman
2014/910 (PDF ) Adaptive Multiparty Non-interactive Key Exchange Without Setup In The Standard Model Vanishree Rao
2014/909 (PDF ) Robust Secret Sharing Schemes Against Local Adversaries Allison Bishop Lewko, Valerio Pastro
2014/908 (PDF ) Practical UC security with a Global Random Oracle Ran Canetti, Abhishek Jain, Alessandra Scafuro
2014/907 (PDF ) Finding shortest lattice vectors faster using quantum search Thijs Laarhoven, Michele Mosca, Joop van de Pol
2014/906 (PDF ) Cryptanalysis on the Multilinear Map over the Integers and its Related Problems Jung Hee Cheon, Kyoohyung Han, Changmin Lee, Hansol Ryu, Damien Stehle
2014/905 (PDF ) Primary-Secondary-Resolver Membership Proof Systems Moni Naor, Asaf Ziv
2014/904 (PDF ) How Secure is TextSecure? Tilman Frosch, Christian Mainka, Christoph Bader, Florian Bergsma, Joerg Schwenk, Thorsten Holz
2014/903 (PDF ) Falcon Codes: Fast, Authenticated LT Codes (Or: Making Rapid Tornadoes Unstoppable) Ari Juels, James Kelley, Roberto Tamassia, Nikos Triandopoulos
2014/902 (PDF ) The Power of Negations in Cryptography Siyao Guo, Tal Malkin, Igor C. Oliveira, Alon Rosen
2014/901 (PDF ) A Practical Attack Against the Use of RC4 in the HIVE Hidden Volume Encryption System Kenneth G. Paterson, Mario Strefler
2014/900 (PDF ) Some Security Results of the RC4+ Stream Cipher Subhadeep Banik, Sonu Jha
2014/899 (PDF ) Side Channel Power Analysis of an AES-256 Bootloader Colin O'Flynn, Zhizhang Chen
2014/898 (PDF ) A key recovery attack to the scale-invariant NTRU-based somewhat homomorphic encryption scheme Eduardo Morais, Ricardo Dahab
2014/897 (PDF ) Leveled Fully Homomorphic Signatures from Standard Lattices Sergey Gorbunov, Vinod Vaikuntanathan, Daniel Wichs
2014/896 (PDF ) Efficiently Making Secure Two-Party Computation Fair Handan Kılınç, Alptekin Küpçü
2014/895 (PDF ) Analysis of ARX Functions: Pseudo-linear Methods for Approximation, Differentials, and Evaluating Diffusion Kerry A. McKay, Poorvi L. Vora
2014/894 (PDF ) THE UBERCRYPT FRAMEWORK: A NEW APPROACH IN CRYPTOSYSTEMS Joe Chiarella, Greg Mosher, Dr. J. Robert Buchanan
2014/893 (PDF ) Advanced Algebraic Attack on Trivium Frank Quedenfeld, Christopher Wolf
2014/892 (PDF ) Breaking Existential Unforgeability of a Signature Scheme from Asiacrypt 2014 Georg Fuchsbauer
2014/891 (PDF ) Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity Jean-Sebastien Coron, Johann Groszschaedl, Praveen Kumar Vadnala, Mehdi Tibouchi
2014/890 (PDF ) Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-channel Countermeasures Jean-Sebastien Coron, Arnab Roy, Srinivas Vivek
2014/889 (PDF ) Efficient Zero-Knowledge Proofs for Commitments from Learning With Errors over Rings Fabrice Benhamouda, Stephan Krenn, Vadim Lyubashevsky, Krzysztof Pietrzak
2014/888 (PDF ) Distance Lower Bounding Xifan Zheng, Reihaneh Safavi-Naini, Hadi Ahmadi
2014/887 (PDF ) Hardware Implementation of Secure Shamir's Secret Sharing Scheme Pei Luo, Yu-Lun Lin, Zhen Wang, Mark Karpovsky
2014/886 (PDF ) Accountable Storage Giuseppe Ateniese, Michael T. Goodrich, Vassilios Lekakis, Charalampos Papamanthou, Evripidis Paraskevas, Roberto Tamassia
2014/885 (PDF ) Efficient Stochastic Methods: Profiled Attacks Beyond 8 Bits Marios O. Choudary, Markus G. Kuhn
2014/882 (PDF ) Obfuscation of Probabilistic Circuits and Applications Ran Canetti, Huijia Lin, Stefano Tessaro, Vinod Vaikuntanathan
2014/881 (PDF ) Overview of the Candidates for the Password Hashing Competition - And Their Resistance Against Garbage-Collector Attacks Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel
2014/880 (PDF ) Sieving for Shortest Vectors in Ideal Lattices: a Practical Perspective Joppe W. Bos, Michael Naehrig, Joop van de Pol
2014/879 (PDF ) Watch your Constants: Malicious Streebog Riham AlTawy, Amr M. Youssef
2014/878 (PDF ) Protecting obfuscation against arithmetic attacks Eric Miles, Amit Sahai, Mor Weiss
2014/877 (PDF ) CM55: special prime-field elliptic curves almost optimizing den Boer's reduction between Diffie-Hellman and discrete logs Daniel R. L. Brown
2014/876 (PDF ) Resisting Randomness Subversion: Fast Deterministic and Hedged Public-key Encryption in the Standard Model Mihir Bellare, Viet Tung Hoang
2014/875 (PDF ) Side-channel Power Analysis of Different Protection Schemes Against Fault Attacks on AES Pei Luo, Yunsi Fei, Liwei Zhang, A. Adam Ding
2014/874 (PDF ) Accelerating Bliss: the geometry of ternary polynomials Léo Ducas
2014/873 (PDF ) Bootstrapping for HElib Shai Halevi, Victor Shoup
2014/872 (PDF ) Recent Results in Scalable Multi-Party Computation Jared Saia, Mahdi Zamani
2014/871 (PDF ) An algorithm for MD5 single-block collision attack using high-performance computing cluster Anton A. Kuznetsov
2014/870 (PDF ) Dynamic Behavior of RS latches using FIB processing and probe connection Naoya Torii, Dai Yamamoto, Masahiko Takenaka, Tsutomu Matsumoto
2014/869 (PDF ) Exclusive Exponent Blinding May Not Suffice to Prevent Timing Attacks on RSA Werner Schindler
2014/868 (PDF ) Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions Ilan Komargodski, Gil Segev, Eylon Yogev
2014/867 (PDF ) Random-Oracle Uninstantiability from Indistinguishability Obfuscation Chris Brzuska, Pooya Farshim, Arno Mittelbach
2014/865 (PDF ) Impossibility of Black-Box Simulation Against Leakage Attacks Rafail Ostrovsky, Giuseppe Persiano, Ivan Visconti
2014/864 (PDF ) How to Choose Interesting Points for Template Attacks More Effectively Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng
2014/863 (PDF ) A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation Matthew D. Green, Jonathan Katz, Alex J. Malozemoff, Hong-Sheng Zhou
2014/862 (PDF ) Low-Latency ECDSA Signature Verification - A Road Towards Safer Traffic - Miroslav Knezevic, Ventzislav Nikov, Peter Rombouts
2014/861 (PDF ) Cats and Dogs An Integrity for Voting Systems Based on Paper Ballots İhsan Haluk Akın
2014/860 (PDF ) Differential Factors: Improved Attacks on SERPENT Cihangir Tezcan, Ferruh Özbudak
2014/858 (PDF ) Adaptively Secure, Universally Composable, Multi-Party Computation in Constant Rounds Dana Dachman-Soled, Jonathan Katz, Vanishree Rao
2014/857 (PDF ) Pseudonymous Broadcast and Secure Computation from Cryptographic Puzzles Jonathan Katz, Andrew Miller, Elaine Shi
2014/856 (PDF ) Leakage-Resilient Circuits Revisited -- Optimal Number of Computing Components without Leak-free Hardware Dana Dachman-Soled, Feng-Hao Liu, Hong-Sheng Zhou
2014/855 (PDF ) Relating Undisturbed Bits to Other Properties of Substitution Boxes Rusydi H. Makarim, Cihangir Tezcan
2014/854 (PDF ) Power Analysis Attack on Hardware Implementation of MAC-Keccak on FPGAs Pei Luo, Yunsi Fei, Xin Fang, A. Adam Ding, Miriam Leeser, David R. Kaeli
2014/853 (PDF ) Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation David Cash, Joseph Jaeger, Stanislaw Jarecki, Charanjit Jutla, Hugo Krawczyk, Marcel-Cătălin Roşu, Michael Steiner
2014/852 (PDF ) Faster ECC over $\mathbb{F}_{2^{521}-1}$ Robert Granger, Michael Scott
2014/851 (PDF ) Near Optimal Rate Homomorphic Encryption for Branching Programs Aggelos Kiayias, Nikos Leonardos, Helger Lipmaa, Kateryna Pavlyk, Qiang Tang
2014/850 (PDF ) The BRUTUS automatic cryptanalytic framework: Testing CAESAR authenticated encryption candidates for weaknesses Markku-Juhani O. Saarinen
2014/849 (PDF ) A Proxy Re-Encryption Scheme with the Unforgeability of Re-Encryption Keys against Collusion Attacks Ryotaro Hayashi, Tatsuyuki Matsushita
2014/848 (PDF ) Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management, Wallet and Cold Storage Solutions in Presence of Poor RNG Events Nicolas T. Courtois, Pinar Emirdag, Filippo Valsorda
2014/847 (PDF ) Reflections on Slide with a Twist Attacks Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir
2014/846 (PDF ) Verifiable computation using multiple provers Andrew J. Blumberg, Justin Thaler, Victor Vu, Michael Walfish
2014/845 (PDF ) Adaptively secure two-party computation from indistinguishability obfuscation Ran Canetti, Shafi Goldwasser, Oxana Poburinnaya
2014/844 (PDF ) Two-Round Adaptively Secure MPC from Indistinguishability Obfuscation Sanjam Garg, Antigoni Polychroniadou
2014/843 (PDF ) Solving a Class of Modular Polynomial Equations and its Relation to Modular Inversion Hidden Number Problem and Inversive Congruential Generator Jun Xu, Santanu Sarkar, Lei Hu, Zhangjie Huang, Liqiang Peng
2014/842 (PDF ) A Rate-Optimizing Compiler for Non-malleable Codes Against Bit-wise Tampering and Permutations Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran
2014/841 (PDF ) Explicit Non-malleable Codes Resistant to Permutations and Perturbations Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran
2014/840 (PDF ) Constrained PRFs for Unbounded Inputs Hamza Abusalah, Georg Fuchsbauer, Krzysztof Pietrzak
2014/839 (PDF ) A Simple and Improved Algorithm for Integer Factorization with Implicit Hints Koji Nuida, Naoto Itakura, Kaoru Kurosawa
2014/838 (PDF ) SHIELD: Scalable Homomorphic Implementation of Encrypted Data-Classifiers Alhassan Khedr, Glenn Gulak, Vinod Vaikuntanathan
2014/837 (PDF ) True Random Number Generators Secure in a Changing Environment: Improved Security Bounds Maciej Skorski
2014/836 (PDF ) A Tight Transformation between HILL and Metric Conditional Pseudoentropy Maciej Skorski
2014/835 (PDF ) Implementation of a Leakage-Resilient ElGamal Key Encapsulation Mechanism David Galindo, Johann Großschädl, Zhe Liu, Praveen Kumar Vadnala, Srinivas Vivek
2014/834 (PDF ) Semantically Secure Order-Revealing Encryption: Multi-Input Functional Encryption Without Obfuscation Dan Boneh, Kevin Lewi, Mariana Raykova, Amit Sahai, Mark Zhandry, Joe Zimmerman
2014/833 (PDF ) Efficient Distributed Tag-Based Encryption and its Application to Group Signatures with Efficient Distributed Traceability Essam Ghadafi
2014/832 (PDF ) Requirements for Standard Elliptic Curves Manfred Lochter, Johannes Merkle, Jörn-Marc Schmidt, Torsten Schütze
2014/831 (PDF ) Tweaks and Keys for Block Ciphers: the TWEAKEY Framework Jérémy Jean, Ivica Nikolić, Thomas Peyrin
2014/830 (PDF ) Adaptively Secure Multi-Party Computation from LWE (via Equivocal FHE) Ivan Damgård, Antigoni Polychroniadou, Vanishree Rao
2014/829 (PDF ) Additively Homomorphic UC commitments with Optimal Amortized Overhead Ignacio Cascudo, Ivan Damgård, Bernardo David, Irene Giacomelli, Jesper Buus Nielsen, Roberto Trifiletti
2014/828 (PDF ) Remarks on Quantum Modular Exponentiation and Some Experimental Demonstrations of Shor's Algorithm Zhengjun Cao, Zhenfu Cao, Lihua Liu
2014/827 (PDF ) Interactive Coding for Interactive Proofs Yevgeniy Dodis, Allison Bishop Lewko
2014/826 (PDF ) Learning with Errors in the Exponent Ozgur Dagdelen, Sebastian Gajek, Florian Gopfert
2014/824 (PDF ) Accountable Tracing Signatures Markulf Kohlweiss, Ian Miers
2014/823 (PDF ) On the Oblivious Transfer Capacity of Generalized Erasure Channels against Malicious Adversaries Rafael Dowsley, Anderson C. A. Nascimento
2014/822 (PDF ) Ballot secrecy with malicious bulletin boards David Bernhard, Ben Smyth
2014/821 (PDF ) Non-malleable Reductions and Applications Divesh Aggarwal, Yevgeniy Dodis, Tomasz Kazana, Maciej Obremski
2014/820 (PDF ) Operational Signature Schemes Michael Backes, Ozgur Dagdelen, Marc Fischlin, Sebastian Gajek, Sebastian Meiser, Dominique Schröder
2014/819 (PDF ) Riding on Asymmetry: Efficient ABE for Branching Programs Sergey Gorbunov, Dhinakaran Vinayagamurthy
2014/817 (PDF ) Optimized Karatsuba Squaring on 8-bit AVR Processors Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim
2014/816 (PDF ) FHEW: Bootstrapping Homomorphic Encryption in less than a second Léo Ducas, Daniele Micciancio
2014/815 (PDF ) A New Method for Decomposition in the Jacobian of Small Genus Hyperelliptic Curves Palash Sarkar, Shashank Singh
2014/814 (PDF ) Navigating in the Cayley graph of $SL_2(F_p)$ and applications to hashing Lisa Bromberg, Vladimir Shpilrain, Alina Vdovina
2014/813 (PDF ) Boosting Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data Dario Catalano, Dario Fiore
2014/812 (PDF ) Search-and-compute on Encrypted Data Jung Hee Cheon, Miran Kim, Myungsun Kim
2014/811 (PDF ) A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems Jean-Charles Faugere, Danilo Gligoroski, Ludovic Perret, Simona Samardjiska, Enrico Thomae
2014/810 (PDF ) Simulation-Based Secure Functional Encryption in the Random Oracle Model Vincenzo Iovino, Karol Zebrowski
2014/809 (PDF ) Server-Aided Two-Party Computation with Minimal Connectivity in the Simultaneous Corruption Model Ignacio Cascudo, Ivan Damgård, Oriol Farràs, Samuel Ranellucci
2014/808 (PDF ) Online/Off-line Ring Signature Scheme with Provable Security Jayaprakash Kar
2014/807 (PDF ) Leakage-resilient non-malleable codes Divesh Aggarwal, Stefan Dziembowski, Tomasz Kazana, Maciej Obremski
2014/806 (PDF ) Summation polynomial algorithms for elliptic curves in characteristic two Steven D. Galbraith, Shishay W. Gebregiyorgis
2014/805 (PDF ) Dual-System Simulation-Soundness with Applications to UC-PAKE and More Charanjit S. Jutla, Arnab Roy
2014/804 (PDF ) Short Signatures With Short Public Keys From Homomorphic Trapdoor Functions Jacob Alperin-Sheriff
2014/803 (PDF ) A Decentralized Public Key Infrastructure with Identity Retention Conner Fromknecht, Dragos Velicanu, Sophia Yakoubov
2014/802 (PDF ) Physical Characterization of Arbiter PUFs Shahin Tajik, Enrico Dietz, Sven Frohmann, Jean-Pierre Seifert, Dmitry Nedospasov, Clemens Helfmeier, Christian Boit, Helmar Dittrich
2014/801 (PDF ) Reversed Genetic Algorithms for Generation of Bijective S-boxes with Good Cryptographic Properties Georgi Ivanov, Nikolay Nikolov, Svetla Nikova
2014/800 (PDF ) Efficient Pairings and ECC for Embedded Systems Thomas Unterluggauer, Erich Wenger
2014/799 (PDF ) Verifiable Random Functions from Weaker Assumptions Tibor Jager
2014/798 (PDF ) Multi-Identity and Multi-Key Leveled FHE from Learning with Errors Michael Clear, Ciarán McGoldrick
2014/797 (PDF ) Tightly-Secure Authenticated Key Exchange Christoph Bader, Dennis Hofheinz, Tibor Jager, Eike Kiltz, Yong Li
2014/796 (PDF ) Distributed Cryptography Based on the Proofs of Work Marcin Andrychowicz, Stefan Dziembowski
2014/795 (PDF ) SPHINCS: practical stateless hash-based signatures Daniel J. Bernstein, Daira Hopwood, Andreas Hülsing, Tanja Lange, Ruben Niederhagen, Louiza Papachristodoulou, Michael Schneider, Peter Schwabe, Zooko Wilcox-O'Hearn
2014/794 (PDF ) Efficient Identity-Based Encryption over NTRU Lattices Léo Ducas, Vadim Lyubashevsky, Thomas Prest
2014/793 (PDF ) Robust Authenticated-Encryption: AEZ and the Problem that it Solves Viet Tung Hoang, Ted Krovetz, Phillip Rogaway
2014/792 (PDF ) General Classification of the Authenticated Encryption Schemes for the CAESAR Competition Farzaneh abed, Christian Forler, Stefan Lucks
2014/791 (PDF ) Quantum Bit Commitment with Application in Quantum Zero-Knowledge Proof Dongdai Lin, Yujuan Quan, Jian Weng, Jun Yan
2014/790 (PDF ) Fault Attack revealing Secret Keys of Exponentiation Algorithms from Branch Prediction Misses Sarani Bhattacharya, Debdeep Mukhopadhyay
2014/789 (PDF ) Statistical Properties of the Square Map Modulo a Power of Two S. M. Dehnavi, A. Mahmoodi Rishakani, M. R. Mirzaee Shamsabad, Einollah Pasha
2014/788 (PDF ) Tuning GaussSieve for Speed Robert Fitzpatrick, Christian Bischof, Johannes Buchmann, Ozgur Dagdelen, Florian Gopfert, Artur Mariano, Bo-Yin Yang
2014/787 (PDF ) Another Tor is possible Amadou Moctar Kane
2014/786 (PDF ) On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation Chun Guo, Dongdai Lin
2014/785 (PDF ) Divisible E-Cash Made Practical Sébastien Canard, David Pointcheval, Olivier Sanders, Jacques Traoré
2014/784 (PDF ) Weak Instances of PLWE Kirsten Eisentraeger, Sean Hallgren, Kristin Lauter
2014/783 (PDF ) Parametric Trojans for Fault-Injection Attacks on Cryptographic Hardware Raghavan Kumar, Philipp Jovanovic, Wayne Burleson, Ilia Polian
2014/782 (PDF ) Precise Fault-Injections using Voltage and Temperature Manipulation for Differential Cryptanalysis Raghavan Kumar, Philipp Jovanovic, Ilia Polian
2014/781 (PDF ) Tally-based simple decoders for traitor tracing and group testing Boris Skoric
2014/780 (PDF ) Deterministic Public-Key Encryption under Continual Leakage Venkata Koppula, Omkant Pandey, Yannis Rouselakis, Brent Waters
2014/779 (PDF ) Implementing Cryptographic Program Obfuscation Daniel Apon, Yan Huang, Jonathan Katz, Alex J. Malozemoff
2014/778 (PDF ) Anonymous IBE from Quadratic Residuosity with Improved Performance Michael Clear, Hitesh Tewari, Ciarán McGoldrick
2014/777 (PDF ) (Batch) Fully Homomorphic Encryption over Integers for Non-Binary Message Spaces Koji Nuida, Kaoru Kurosawa
2014/776 (PDF ) How to Obfuscate Programs Directly Joe Zimmerman
2014/775 (PDF ) Lock-free GaussSieve for Linear Speedups in Parallel High Performance SVP Calculation Artur Mariano, Shahar Timnat, Christian Bischof
2014/774 (PDF ) Automated Analysis and Synthesis of Block-Cipher Modes of Operation Alex J. Malozemoff, Jonathan Katz, Matthew D. Green
2014/773 (PDF ) Obfuscating Low-Rank Matrix Branching Programs Amit Sahai, Mark Zhandry
2014/772 (PDF ) Fully Secure and Succinct Attribute Based Encryption for Circuits from Multi-linear Maps Nuttapong Attrapadung
2014/771 (PDF ) Succinct Randomized Encodings and their Applications Nir Bitansky, Sanjam Garg, Sidharth Telang
2014/770 (PDF ) AES Cipher Keys Suitable for Efficient Side-Channel Vulnerability Evaluation Takaaki Mizuki, Yu-ichi Hayashi
2014/769 (PDF ) Indistinguishability Obfuscation of Iterated Circuits and RAM Programs Ran Canetti, Justin Holmgren, Abhishek Jain, Vinod Vaikuntanathan
2014/768 (PDF ) Cut-and-Choose Bilateral Oblivious Transfer and Its Application in Secure Two-party Computation Han Jiang, Xiaochao Wei, Chuan Zhao, Qiuliang Xu
2014/767 (PDF ) Algebraic Attacks on Human Identification Protocols Hassan Jameel Asghar, Ron Steinfeld, Shujun Li, Mohamed Ali Kaafar, Josef Pieprzyk
2014/766 (PDF ) Succinct Garbling Schemes and Applications Huijia Lin, Rafael Pass
2014/765 (PDF ) The Bitcoin Backbone Protocol: Analysis and Applications Juan Garay, Aggelos Kiayias, Nikos Leonardos
2014/764 (PDF ) One-out-of-Many Proofs: Or How to Leak a Secret and Spend a Coin Jens Groth, Markulf Kohlweiss
2014/763 (PDF ) On the Privacy Provisions of Bloom Filters in Lightweight Bitcoin Clients Arthur Gervais, Ghassan O. Karame, Damian Gruber, Srdjan Capkun
2014/762 (PDF ) Access Control in Publicly Verifiable Outsourced Computation James Alderman, Christian Janson, Carlos Cid, Jason Crampton
2014/761 (PDF ) Cryptanalysis of Reduced-round SIMON32 and SIMON48 Qingju Wang, Zhiqiang Liu, Kerem Varici, Yu Sasaki, Vincent Rijmen, Yosuke Todo
2014/760 (PDF ) Montgomery Modular Multiplication on ARM-NEON Revisited Hwajeong Seo, Zhe Liu, Johann Großschädl, Jongseok Choi, Howon Kim
2014/759 (PDF ) How to Efficiently Evaluate RAM Programs with Malicious Security Arash Afshar, Zhangxiang Hu, Payman Mohassel, Mike Rosulek
2014/758 (PDF ) Cryptographic Reverse Firewalls Ilya Mironov, Noah Stephens-Davidowitz
2014/757 (PDF ) Adaptively Secure Broadcast Encryption with Small System Parameters Mark Zhandry
2014/756 (PDF ) Two Halves Make a Whole: Reducing Data Transfer in Garbled Circuits using Half Gates Samee Zahur, Mike Rosulek, David Evans
2014/755 (PDF ) Computing Mod Without Mod Mark A. Will, Ryan K. L. Ko
2014/754 (PDF ) Bilinear Entropy Expansion from the Decisional Linear Assumption Lucas Kowalczyk, Allison Bishop Lewko
2014/753 (PDF ) Online Deniability for Multiparty Protocols with Applications to Externally Anonymous Authentication Alonso Gonzalez-Ulloa, Alejandro Hevia
2014/752 (PDF ) Key Indistinguishability vs. Strong Key Indistinguishability for Hierarchical Key Assignment Schemes Arcangelo Castiglione, Alfredo De Santis, Barbara Masucci
2014/751 (PDF ) Higher-Order Threshold Implementations Begül Bilgin, Benedikt Gierlichs, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen
2014/750 (PDF ) Hardware Trojan Horses in Cryptographic IP Cores Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Xuan Thuy Ngo, Laurent Sauvage
2014/749 (PDF ) Bitline PUF: Building Native Challenge-Response PUF Capability into Any SRAM Daniel E. Holcomb, Kevin Fu
2014/748 (PDF ) Efficient and Verifiable Algorithms for Secure Outsourcing of Cryptographic Computations Mehmet Sabır Kiraz, Osmanbey Uzunkol
2014/747 (PDF ) Towards Finding the Best Characteristics of Some Bit-oriented Block Ciphers and Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties Siwei Sun, Lei Hu, Meiqin Wang, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Danping Shi, Ling Song, Kai Fu
2014/746 (PDF ) Decoy-based information security Vladimir Shpilrain
2014/745 (PDF ) Universal Signature Aggregators Susan Hohenberger, Venkata Koppula, Brent Waters
2014/744 (PDF ) Sieving for shortest vectors in lattices using angular locality-sensitive hashing Thijs Laarhoven
2014/743 (PDF ) Concise Multi-Challenge CCA-Secure Encryption and Signatures with Almost Tight Security Benoit Libert, Marc Joye, Moti Yung, Thomas Peters
2014/742 (PDF ) A survey of Fault Attacks in Pairing Based Cryptography Nadia El Mrabet, Jacques J. A. Fournier, Louis Goubin, Ronan Lashermes
2014/741 (PDF ) Eliminating Leakage in Reverse Fuzzy Extractors André Schaller, Taras Stanko, Boris Škorić, Stefan Katzenbeisser
2014/739 (PDF ) SBIM(Q) - a Multivariate Polynomial Trapdoor Function over the Field of Rational Numbers Smile Markovski, Aleksandra Mileva, Vesna Dimitrova
2014/738 (PDF ) A Very Compact FPGA Implementation of LED and PHOTON N. Nalla Anandakumar, Thomas Peyrin, Axel Poschmann
2014/736 (PDF ) Cube Attacks and Cube-attack-like Cryptanalysis on the Round-reduced Keccak Sponge Function Itai Dinur, Pawel Morawiecki, Josef Pieprzyk, Marian Srebrny, Michal Straus
2014/735 (PDF ) Dealer-Leakage Resilient Verifiable Secret Sharing Ruxandra F. Olimid
2014/734 (PDF ) S-box pipelining using genetic algorithms for high-throughput AES implementations: How fast can we go? Lejla Batina, Domagoj Jakobovic, Nele Mentens, Stjepan Picek, Antonio de la Piedra, Dominik Sisejkovic
2014/733 (PDF ) Augmented Learning with Errors: The Untapped Potential of the Error Term Rachid El~Bansarkhani, Özgür Dagdelen, Johannes Buchmann
2014/732 (PDF ) Resizable Tree-Based Oblivious RAM Tarik Moataz, Travis Mayberry, Erik-Oliver Blass, Agnes Hui Chan
2014/731 (PDF ) Secure modular password authentication for the web using channel bindings Mark Manulis, Douglas Stebila, Franziskus Kiefer, Nick Denham
2014/730 (PDF ) Differentially Private Linear Algebra in the Streaming Model Jalaj Upadhyay
2014/729 (PDF ) Faster Binary-Field Multiplication and Faster Binary-Field MACs Daniel J. Bernstein, Tung Chou
2014/728 (PDF ) Unpicking PLAID - A Cryptographic Analysis of an ISO-standards-track Authentication Protocol Jean Paul Degabriele, Victoria Fehr, Marc Fischlin, Tommaso Gagliardoni, Felix Günther, Giorgia Azzurra Marson, Arno Mittelbach, Kenneth G. Paterson
2014/727 (PDF ) The Q-curve Construction for Endomorphism-Accelerated Elliptic Curves Benjamin Smith
2014/725 (PDF ) Efficient Software Implementation of Ring-LWE Encryption Ruan de Clercq, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede
2014/724 (PDF ) Protecting Encrypted Cookies from Compression Side-Channel Attacks Janaka Alawatugoda, Douglas Stebila, Colin Boyd
2014/723 (PDF ) Crypto-analyses on “secure and efficient privacy-preserving public auditing scheme for cloud storage” Yalin Chen, Jue-Sam Chou
2014/722 (PDF ) Differential Cryptanalysis of SipHash Christoph Dobraunig, Florian Mendel, Martin Schläffer
2014/721 (PDF ) On Shor's Factoring Algorithm with More Registers and the Problem to Certify Quantum Computers Zhengjun Cao, Zhenfu Cao
2014/720 (PDF ) Adaptively Secure Constrained Pseudorandom Functions Dennis Hofheinz, Akshay Kamath, Venkata Koppula, Brent Waters
2014/719 (PDF ) Bivariate Polynomials Modulo Composites and their Applications Dan Boneh, Henry Corrigan-Gibbs
2014/718 (PDF ) Square Span Programs with Applications to Succinct NIZK Arguments George Danezis, Cedric Fournet, Jens Groth, Markulf Kohlweiss
2014/717 (PDF ) How to Split a Secret into Unknown Shares Ruxandra F. Olimid
2014/716 (PDF ) Wire-Tap Codes as Side-Channel Countermeasure - an FPGA-based experiment Amir Moradi
2014/715 (PDF ) Cryptanalysis on `Robust Biometrics-Based Authentication Scheme for Multi-server Environment' Vanga Odelu, Ashok Kumar Das, Adrijit Goswami
2014/714 (PDF ) A comprehensive empirical comparison of parallel ListSieve and GaussSieve Artur Mariano, Ozgur Dagdelen, Christian Bischof
2014/713 (PDF ) Co-Location-Resistant Clouds Yossi Azar, Seny Kamara, Ishai Menache, Mariana Raykova, Bruce Shepherd
2014/712 (PDF ) Hybrid Anomaly Detection using K-Means Clustering in Wireless Sensor Networks Mohammad Wazid
2014/711 (PDF ) New Class of Multivariate Public Key Cryptosystem, K(XI)RSE(2)PKC, Constructed based on Reed-Solomon Code Along with K(X)RSE(2)PKC over $\mathbb{F}_2$ Masao KASAHARA
2014/710 (PDF ) An Efficient Transform from Sigma Protocols to NIZK with a CRS and Non-Programmable Random Oracle Yehuda Lindell
2014/709 (PDF ) A Note on Quantum Security for Post-Quantum Cryptography Fang Song
2014/708 (PDF ) Formal Treatment of Privacy-Enhancing Credential Systems Jan Camenisch, Stephan Krenn, Anja Lehmann, Gert Læssøe Mikkelsen, Gregory Neven, Michael Østergaard Pedersen
2014/707 (PDF ) Analysis Of Variance and CPA in SCA Sebastien Tiran, Guillaume Reymond, Jean-Baptiste Rigaud, Driss Aboulkassimi, Benedikt Gierlichs, Mathieu Carbone, Gilles Ducharme, Philippe Maurine
2014/706 (PDF ) The Feasibility of Outsourced Database Search in the Plain Model Carmit Hazay, Hila Zarosim
2014/704 (PDF ) A 128-bit Block Cipher Based on Three Group Arithmetics Shenghui Su, Shuwang Lü, Daqiang Dong
2014/703 (PDF ) Linearity Measures for MQ Cryptography Simona Samardjiska, Danilo Gligoroski
2014/702 (PDF ) Defeating ISO9797-1 MAC Algo 3 by Combining Side-Channel and Brute Force Techniques Benoit Feix, Hugues Thiebeauld
2014/700 (PDF ) Bounded Pre-Image Awareness and the Security of Hash-Tree Keyless Signatures Ahto Buldas, Risto Laanoja, Peeter Laud, Ahto Truu
2014/699 (PDF ) Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon (Full Version) Christina Boura, María Naya-Plasencia, Valentin Suder
2014/698 (PDF ) HIMMO - A lightweight collusion-resistant key predistribution scheme Oscar Garcia-Morchon, Domingo Gomez-Perez, Jaime Gutierrez, Ronald Rietman, Berry Schoenmakers, Ludo Tolhuizen
2014/697 (PDF ) A Fully Homomorphic Encryption Scheme with Better Key Size Zhigang Chen, Jian Wang, ZengNian Zhang, Xinxia Song
2014/696 (PDF ) Security Proofs for the BLT Signature Scheme Ahto Buldas, Risto Laanoja, Ahto Truu
2014/695 (PDF ) Proof of Proximity of Knowledge Serge Vaudenay
2014/694 (PDF ) Malicious Hashing: Eve's Variant of SHA-1 Ange Albertini, Jean-Philippe Aumasson, Maria Eichlseder, Florian Mendel, Martin Schläffer
2014/693 (PDF ) Optimal Proximity Proofs Ioana Boureanu, Serge Vaudenay
2014/692 (PDF ) Extending Oblivious Transfer Efficiently, or - How to get active security with constant cryptographic overhead Enrique Larraia
2014/691 (PDF ) Integration of hardware tokens in the Idemix library Antonio de la Piedra
2014/690 (PDF ) Efficient Interval Check in the Presence of Malicious Adversaries Genqiang Wu, Yeping He, Yi Lu, Liping Ding
2014/689 (PDF ) Efficient Implementation of Keyless Signatures with Hash Sequence Authentication Ahto Buldas, Risto Laanoja, Ahto Truu
2014/688 (PDF ) White-Box AES Implementation Revisited Chung Hun Baek, Jung Hee Cheon, Hyunsook Hong
2014/687 (PDF ) Reducing the Complexity of Normal Basis Multiplication Omer Egecioglu, Cetin Kaya Koc
2014/685 (PDF ) Bit Security of the CDH Problems over Finite Field Mingqiang Wang, Tao Zhan, Haibin Zhang
2014/684 (PDF ) Towards a Full-Featured Implementation of Attribute Based Credentials on Smart Cards Antonio de la Piedra, Jaap-Henk Hoepman, Pim Vullers
2014/683 (PDF ) Error-Tolerant Algebraic Side-Channel Attacks Using BEE Ling Song, Lei Hu, Siwei Sun, Zhang Zhang, Danping Shi, Ronglin Hao
2014/682 (PDF ) A Unified Formalism for Physical Attacks Hélène Le Bouder, Ronan Lashermes, Yanis Linge, Bruno Robisson, Assia Tria
2014/681 (PDF ) Improved Linear Cryptanalysis of Reduced-round SIMON Mohamed Ahmed Abdelraheem, Javad Alizadeh, Hoda A. Alkhzaimi, Mohammad Reza Aref, Nasour Bagheri, Praveen Gauravaram, Martin M. Lauridsen
2014/680 (PDF ) Remarks on the Cryptographic Primitive of Attribute-based Encryption Zhengjun Cao, Lihua Liu
2014/679 (PDF ) A Note on the Bellare-Rivest Protocol for Translucent Cryptography Zhengjun Cao, Lihua Liu
2014/678 (PDF ) A Counterexample to the Chain Rule for Conditional HILL Entropy Stephan Krenn, Krzysztof Pietrzak, Akshay Wadia, Daniel Wichs
2014/677 (PDF ) Attacks in Stream Ciphers: A Survey Gustavo Banegas
2014/676 (PDF ) Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts Zhen Liu, Zhenfu Cao, Duncan S. Wong
2014/675 (PDF ) The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function Jian Guo, Jérémy Jean, Gaëtan Leurent, Thomas Peyrin, Lei Wang
2014/674 (PDF ) Efficient RAM and control flow in verifiable outsourced computation Riad S. Wahby, Srinath Setty, Max Howald, Zuocheng Ren, Andrew J. Blumberg, Michael Walfish
2014/673 (PDF ) How to Estimate the Success Rate of Higher-Order Side-Channel Attacks Victor Lomné, Emmanuel Prouff, Matthieu Rivain, Thomas Roche, Adrian Thillard
2014/672 (PDF ) Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound Xiao Wang, Hubert Chan, Elaine Shi
2014/671 (PDF ) SCORAM: Oblivious RAM for Secure Computation Xiao Shaun Wang, Yan Huang, T-H. Hubert Chan, abhi shelat, Elaine Shi
2014/670 (PDF ) DoubleMod and SingleMod: Simple Randomized Secret-Key Encryption with Bounded Homomorphicity Dhananjay S. Phatak, Qiang Tang, Alan T. Sherman, Warren D. Smith, Peter Ryan, Kostas Kalpakis
2014/669 (PDF ) On the Communication Complexity of Secure Function Evaluation with Long Output Pavel Hubacek, Daniel Wichs
2014/668 (PDF ) Fairness versus Guaranteed Output Delivery in Secure Multiparty Computation Ran Cohen, Yehuda Lindell
2014/667 (PDF ) Cut-and-Choose Based Two-Party Computation in the Online/Offline and Batch Settings Yehuda Lindell, Ben Riva
2014/666 (PDF ) Functional Encryption Without Obfuscation Sanjam Garg, Craig Gentry, Shai Halevi, Mark Zhandry
2014/665 (PDF ) Orthogonal Direct Sum Masking: A Smartcard Friendly Computation Paradigm in a Code, with Builtin Protection against Side-Channel and Fault Attacks Julien Bringer, Claude Carlet, Hervé Chabanne, Sylvain Guilley, Houssem Maghrebi
2014/664 (PDF ) On the Optimal Pre-Computation of Window $\tau$NAF for Koblitz Curves William R. Trost, Guangwu Xu
2014/663 (PDF ) Locally Decodable and Updatable Non-Malleable Codes and Their Applications Dana Dachman-Soled, Feng-Hao Liu, Elaine Shi, Hong-Sheng Zhou
2014/662 (PDF ) Outsourced Pattern Matching Sebastian Faust, Carmit Hazay, Daniele Venturi
2014/661 (PDF ) One-Round Deniable Key Exchange with Perfect Forward Security Weiqiang Wen, Libin Wang, Min Xie
2014/660 (PDF ) Interactive Proofs under Continual Memory Leakage Prabhanjan Ananth, Vipul Goyal, Omkant Pandey
2014/659 (PDF ) On the Primitivity of Trinomials over Small Finite Fields YUjuan Li, Jinhua Zhao, Huaifu Wang
2014/658 (PDF ) The Adjacency Graphs of Some Feedback Shift Registers Ming Li, Yupeng Jiang, Dongdai Lin
2014/657 (PDF ) On the cycle decomposition of the WG-NLFSR YUjuan Li, Wnehua Shen, Huaifu Wang, Peipei Zhou
2014/656 (PDF ) Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions with Applications to PRINCE and PRIDE Itai Dinur
2014/655 (PDF ) Pleco and Plectron -- Two Provably Secure Password Hashing Algorithms Bo Zhu, Xinxin Fan, Guang Gong
2014/654 (PDF ) Multi-Bit Differential Fault Analysis of Grain-128 with Very Weak Assumptions Prakash Dey, Abhishek Chakraborty, Avishek Adhikari, Debdeep Mukhopadhyay
2014/653 (PDF ) Mersenne factorization factory Thorsten Kleinjung, Joppe W. Bos, Arjen K. Lenstra
2014/652 (PDF ) A Dynamic Cube Attack on $105$ round Grain v1 Subhadeep Banik
2014/651 (PDF ) A note on CCA2-protected McEliece Cryptosystem with a systematic public key Pavol Zajac
2014/650 (PDF ) Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk
2014/649 (PDF ) FPGA Trojans through Detecting and Weakening of Cryptographic Primitives Pawel Swierczynski, Marc Fyrbiak, Philipp Koppe, Christof Paar
2014/648 (PDF ) An Equivalent Condition on the Switching Construction of Differentially $4$-uniform Permutations on $\gf_{2^{2k}}$ from the Inverse Function Xi Chen, Yazhi Deng, Min Zhu, Longjiang Qu
2014/647 (PDF ) Universally Composable Secure Group Communication Youliang Tian, Changgen Peng
2014/646 (PDF ) High-speed Polynomial Multiplication Architecture for Ring-LWE and SHE Cryptosystems Donald Donglong Chen, Nele Mentens, Frederik Vercauteren, Sujoy Sinha Roy, Ray C. C. Cheung, Derek Pao, Ingrid Verbauwhede
2014/645 (PDF ) Graph-Induced Multilinear Maps from Lattices Craig Gentry, Sergey Gorbunov, Shai Halevi
2014/644 (PDF ) Side Channel Attacks: Vulnerability Analysis of PRINCE and RECTANGLE using DPA Ravikumar Selvam, Dillibabu Shanmugam, Suganya Annadurai
2014/643 (PDF ) On the Security of `An Efficient Biometric Authentication Protocol for Wireless Sensor Networks' Ashok Kumar Das
2014/642 (PDF ) Balanced permutations Even-Mansour ciphers Shoni Gilboa, Shay Gueron
2014/641 (PDF ) The Multiple Number Field Sieve with Conjugation Method Cécile Pierrot
2014/640 (PDF ) Revocation in Publicly Verifiable Outsourced Computation James Alderman, Christian Janson, Carlos Cid, Jason Crampton
2014/639 (PDF ) Automated Design, Implementation, and Evaluation of Arbiter-based PUF on FPGA using Programmable Delay Lines Mehrdad Majzoobi, Akshat Kharaya, Farinaz Koushanfar, Srinivas Devadas
2014/638 (PDF ) Substring-Searchable Symmetric Encryption Melissa Chase, Emily Shen
2014/637 (PDF ) Generic Hardness of the Multiple Discrete Logarithm Problem Aaram Yun
2014/636 (PDF ) Improved Timing Attacks on ECDSA Vikram Singh
2014/635 (PDF ) Type 2 Structure-Preserving Signature Schemes Revisited Sanjit Chatterjee, Alfred Menezes
2014/634 (PDF ) Constant-Round Leakage-Resilient Zero-Knowledge Arguments of Knowledge for NP Hongda Li, Qihua Niu, Guifang Huang
2014/633 (PDF ) Client-Server Concurrent Zero Knowledge with Constant Rounds and Guaranteed Complexity Ran Canetti, Abhishek Jain, Omer Paneth
2014/632 (PDF ) Verifiable Order Queries and Order Statistics on a List in Zero-Knowledge Esha Ghosh, Olga Ohrimenko, Roberto Tamassia
2014/631 (PDF ) Zipf’s Law in Passwords Ding Wang, Gaopeng Jian, Xinyi Huang, Ping Wang
2014/630 (PDF ) Privacy-Preserving Minimum Spanning Trees through Oblivious Parallel RAM for Secure Multiparty Computation Peeter Laud
2014/629 (PDF ) Two-factor authentication for the Bitcoin protocol Christopher Mann, Daniel Loebenberger
2014/628 (PDF ) An Efficient $t$-Cheater Identifiable Secret Sharing Scheme with Optimal Cheater Resiliency Partha Sarathi Roy, Avishek Adhikari, Rui Xu, Kirill Morozov, Kouichi Sakurai
2014/627 (PDF ) On Modes of Operations of a Block Cipher for Authentication and Authenticated Encryption Debrup Chakraborty, Palash Sarkar
2014/626 (PDF ) Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs Daniel Genkin, Itamar Pipman, Eran Tromer
2014/625 (PDF ) Pretty Understandable Democracy 2.0 Stephan Neumann, Christian Feier, Perihan Sahin, Sebastian Fach
2014/624 (PDF ) KT-ORAM: A Bandwidth-efficient ORAM Built on K-ary Tree of PIR Nodes Jinsheng Zhang, Qiumao Ma, Wensheng Zhang, Daji Qiao
2014/623 (PDF ) Privacy with Imperfect Randomness Yevgeniy Dodis, Yanqing Yao
2014/622 (PDF ) Fully Secure Attribute Based Encryption from Multilinear Maps Sanjam Garg, Craig Gentry, Shai Halevi, Mark Zhandry
2014/621 (PDF ) (Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection Michael Backes, Aniket Kate, Sebastian Meiser, Esfandiar Mohammadi
2014/620 (PDF ) The M3dcrypt Password Hashing Function Isaiah Makwakwa
2014/619 (PDF ) THE NEW HEURISTIC GUESS AND DETERMINE ATTACK ON SNOW 2.0 STREAM CIPHER Mohammad Sadegh Nemati Nia, Ali Payandeh
2014/618 (PDF ) Proving Correctness and Security of Two-Party Computation Implemented in Java in Presence of a Semi-Honest Sender Florian Böhl, Simon Greiner, Patrik Scheidecker
2014/617 (PDF ) ADSNARK: Nearly Practical and Privacy-Preserving Proofs on Authenticated Data Michael Backes, Manuel Barbosa, Dario Fiore, Raphael M. Reischuk
2014/616 (PDF ) Practical Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe Zhen Liu, Duncan S. Wong
2014/615 (PDF ) The Hidden Graph Model: Communication Locality and Optimal Resiliency with Adaptive Faults Nishanth Chandran, Wutichai Chongchitmate, Juan A. Garay, Shafi Goldwasser, Rafail Ostrovsky, Vassilis Zikas
2014/614 (PDF ) Expressive and Secure Searchable Encryption in the Public Key Setting (Full Version) Zhiquan Lv, Cheng Hong, Min Zhang, Dengguo Feng
2014/613 (PDF ) A Security Analysis of the Composition of ChaCha20 and Poly1305 Gordon Procter
2014/612 (PDF ) Attribute-Based Encryption Optimized for Cloud Computing Máté Horváth
2014/611 (PDF ) Accumulating Automata and Cascaded Equations Automata for Communicationless Information Theoretically Secure Multi-Party Computation Shlomi Dolev, Niv Gilboa, Ximing Li
2014/610 (PDF ) Computing on the Edge of Chaos: Structure and Randomness in Encrypted Computation Craig Gentry
2014/609 (PDF ) Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks Michel Abdalla, Fabrice Benhamouda, David Pointcheval
2014/608 (PDF ) Key-policy Attribute-based Encryption for Boolean Circuits from Bilinear Maps Ferucio Laurentiu Tiplea, Constantin Catalin Dragan
2014/607 (PDF ) Adding Controllable Linkability to Pairing-Based Group Signatures For Free Daniel Slamanig, Raphael Spreitzer, Thomas Unterluggauer
2014/606 (PDF ) A Multi-Function Provable Data Possession Scheme in Cloud Computing Xiaojun Yu, Qiaoyan Wen
2014/605 (PDF ) On the Limitations of Computational Fuzzy Extractors Kenji Yasunaga, Kosuke Yuzawa
2014/604 (PDF ) Private Web Search with Constant Round Efficiency Bolam Kang, Sung Cheol Goh, Myungsun Kim
2014/603 (PDF ) Recursive Trees for Practical ORAM Tarik Moataz, Erik-Oliver Blass, Guevara Noubir
2014/602 (PDF ) A Cryptographic Study of Tokenization Systems Sandra Diaz-Santiago, Lil Maria Rodriguez-Henriquez, Debrup Chakraborty
2014/601 (PDF ) Adaptive versus Static Security in the UC Model Ivan Damgård, Jesper Buus Nielsen
2014/599 (PDF ) Post-quantum key exchange for the TLS protocol from the ring learning with errors problem Joppe W. Bos, Craig Costello, Michael Naehrig, Douglas Stebila
2014/598 (PDF ) Privacy-Free Garbled Circuits with Applications To Efficient Zero-Knowledge Tore Kasper Frederiksen, Jesper Buus Nielsen, Claudio Orlandi
2014/597 (PDF ) Invisible Adaptive Attacks Jesper Buus Nielsen, Mario Strefler
2014/596 (PDF ) Secure and Oblivious Maximum Bipartite Matching Size Algorithm with Applications to Secure Fingerprint Identification Marina Blanton, Siddharth Saraph
2014/595 (PDF ) Scalable Zero Knowledge via Cycles of Elliptic Curves Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza
2014/594 (PDF ) Oblivious Parallel RAM and Applications Elette Boyle, Kai-Min Chung, Rafael Pass
2014/593 (PDF ) Improved Exponential-time Algorithms for Inhomogeneous-SIS Shi Bai, Steven D. Galbraith, Liangze Li, Daniel Sheffield
2014/592 (PDF ) Multiprecision multiplication on AVR revisited Michael Hutter, Peter Schwabe
2014/591 (PDF ) Compact and Side Channel Secure Discrete Gaussian Sampling Sujoy Sinha Roy, Oscar Reparaz, Frederik Vercauteren, Ingrid Verbauwhede
2014/590 (PDF ) Automated algebraic analysis of structure-preserving signature schemes Joeri de Ruiter
2014/589 (PDF ) Authenticated Key Exchange from Ideal Lattices Jiang Zhang, Zhenfeng Zhang, Jintai Ding, Michael Snook, Özgür Dagdelen
2014/588 (PDF ) A Punctured Programming Approach to Adaptively Secure Functional Encryption Brent Waters
2014/587 (PDF ) Non-interactive zero-knowledge proofs in the quantum random oracle model Dominique Unruh
2014/586 (PDF ) An Algebraic Approach to Non-Malleability Vipul Goyal, Silas Richelson, Alon Rosen, Margarita Vald
2014/585 (PDF ) The SPEKE Protocol Revisited Feng Hao, Siamak F. Shahandashti
2014/584 (PDF ) Universally Composable Efficient Priced Oblivious Transfer from a Flexible Membership Encryption Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
2014/583 (PDF ) Template Attacks Based On Priori Knowledge Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng
2014/582 (PDF ) NSEC5: Provably Preventing DNSSEC Zone Enumeration Sharon Goldberg, Moni Naor, Dimitrios Papadopoulos, Leonid Reyzin, Sachin Vasant, Asaf Ziv
2014/581 (PDF ) (Hierarchical) Identity-Based Encryption from Affine Message Authentication Olivier Blazy, Eike Kiltz, Jiaxin Pan
2014/580 (PDF ) The Hunting of the SNARK Nir Bitansky, Ran Canetti, Alessandro Chiesa, Shafi Goldwasser, Huijia Lin, Aviad Rubinstein, Eran Tromer
2014/578 (PDF ) The Exact PRF-Security of NMAC and HMAC Peter Gaži, Krzysztof Pietrzak, Michal Rybár
2014/577 (PDF ) Reducing Communication Overhead of the Subset Difference Scheme Sanjay Bhattacherjee, Palash Sarkar
2014/576 (PDF ) Vernam Two Dan P. Milleville
2014/575 (PDF ) Simple AEAD Hardware Interface (SÆHI) in a SoC: Implementing an On-Chip Keyak/WhirlBob Coprocessor Markku-Juhani O. Saarinen
2014/574 (PDF ) Security Analysis of Multilinear Maps over the Integers Hyung Tae Lee, Jae Hong Seo
2014/573 (PDF ) A new public key system based on Polynomials over finite fields GF(2) Gurgen Khachatrian
2014/572 (PDF ) On the Optimality of Differential Fault Analyses on CLEFIA Juliane Krämer, Anke Stüber, Ágnes Kiss
2014/571 (PDF ) How to manipulate curve standards: a white paper for the black hat Daniel J. Bernstein, Tung Chou, Chitchanok Chuengsatiansup, Andreas Hülsing, Tanja Lange, Ruben Niederhagen, Christine van Vredendaal
2014/570 (PDF ) Deja Q: Using Dual Systems to Revisit q-Type Assumptions Melissa Chase, Sarah Meiklejohn
2014/569 (PDF ) Fast Lattice Point Enumeration with Minimal Overhead Daniele Micciancio, Michael Walter
2014/568 (PDF ) New Classes of Public Key Cryptosystems over $F_2^8$ Constructed Based on Reed-Solomon Codes, K(XVII)SE(1)PKC and K(XVII)$\Sigma \Pi$PKC Masao KASAHARA
2014/566 (PDF ) Direct Construction of Recursive MDS Diffusion Layers using Shortened BCH Codes Daniel Augot, Matthieu Finiasz
2014/565 (PDF ) Kangaroos in Side-Channel Attacks Tanja Lange, Christine van Vredendaal, Marnix Wakker
2014/563 (PDF ) Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA Aleksandar Kircanski
2014/562 (PDF ) hHB: a Harder HB+ Protocol Ka Ahmad Khoureich
2014/561 (PDF ) Performance Increasing Approaches For Binary Field Inversion Vladislav Kovtun, Maria Bulakh
2014/560 (PDF ) Towards Forward Security Properties for PEKS and IBE Qiang Tang
2014/559 (PDF ) Countermeasures Against High-Order Fault-Injection Attacks on CRT-RSA Pablo Rauzy, Sylvain Guilley
2014/558 (PDF ) Double shielded Public Key Cryptosystems Xiaofeng Wang, Chen Xu, Guo Li, Hanling Lin, Weijian Wang
2014/557 (PDF ) Round-Efficient Black-Box Construction of Composable Multi-Party Computation Susumu Kiyoshima
2014/556 (PDF ) Securing Cloud Data in the New Attacker Model Ghassan O. Karame, Claudio Soriente, Krzysztof Lichota, Srdjan Capkun
2014/555 (PDF ) General Statistically Secure Computation with Bounded-Resettable Hardware Tokens Nico Döttling, Daniel Kraschewski, Jörn Müller-Quade, Tobias Nilges
2014/554 (PDF ) On Virtual Grey Box Obfuscation for General Circuits Nir Bitansky, Ran Canetti, Yael Tauman-Kalai, Omer Paneth
2014/553 (PDF ) A Simpler Variant of Universally Composable Security for Standard Multiparty Computation Ran Canetti, Asaf Cohen, Yehuda Lindell
2014/552 (PDF ) Efficient Record-Level Keyless Signatures for Audit Logs Ahto Buldas, Ahto Truu, Risto Laanoja, Rainer Gerhards
2014/551 (PDF ) Diffusion Matrices from Algebraic-Geometry Codes with Efficient SIMD Implementation Daniel Augot, Pierre-Alain Fouque, Pierre Karpman
2014/550 (PDF ) Function-Private Functional Encryption in the Private-Key Setting Zvika Brakerski, Gil Segev
2014/549 (PDF ) New Attacks on the RSA Cryptosystem Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin, Dieaa I. Nassr, Hatem M. Bahig
2014/548 (PDF ) Implicit factorization of unbalanced RSA moduli Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin
2014/547 (PDF ) Authentication Codes Based on Resilient Boolean Maps Juan Carlos Ku-Cauich, Guillermo Morales-Luna
2014/546 (PDF ) Anonymous and Publicly Linkable Reputation Systems Johannes Blömer, Jakob Juhnke, Christina Kolb
2014/545 (PDF ) Solving closest vector instances using an approximate shortest independent vectors oracle Chengliang Tian, Wei Wei, Dongdai Lin
2014/544 (PDF ) Secure Mutual Testing Strategy for Cryptographic SoCs Amitabh Das, Dusko Karaklajic, Ingrid Verbauwhede
2014/543 (PDF ) A Practical Second-Order Fault Attack against a Real-World Pairing Implementation Johannes Blömer, Ricardo Gomes da Silva, Peter Günther, Juliane Krämer, Jean-Pierre Seifert
2014/542 (PDF ) On the Multi-output Filtering Model and Its Applications Guang Gong, Kalikinkar Mandal, Yin Tan, Teng Wu
2014/541 (PDF ) EM Attack Is Non-Invasive? - Design Methodology and Validity Verification of EM Attack Sensor Naofumi Homma, Yu-ichi Hayashi, Noriyuki Miura, Daisuke Fujimoto, Daichi Tanaka, Makoto Nagata, Takafumi Aoki
2014/540 (PDF ) Optimized Architecture for AES Abhijith P. S, Dr. Manish Goswami, S. Tadi, Kamal Pandey
2014/539 (PDF ) Faster Secure Arithmetic Computation Using Switchable Homomorphic Encryption Hoon Wei Lim, Shruti Tople, Prateek Saxena, Ee-Chien Chang
2014/537 (PDF ) Constrained Verifiable Random Functions Georg Fuchsbauer
2014/536 (PDF ) A Survey and New Results on the Decomposition of an NFSR into a Cascade Connection of Two Smaller NFSRs Tian Tian, Jia-Min Zhang, Chen-Dong Ye, Wen-Feng Qi
2014/535 (PDF ) On Key Recovery Attacks against Existing Somewhat Homomorphic Encryption Schemes Massimo Chenal, Qiang Tang
2014/534 (PDF ) Differential Power Analysis of a McEliece Cryptosystem Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt
2014/533 (PDF ) Indifferentiability Results and Proofs for Some Popular Cryptographic Constructions Jaiganesh Balasundaram
2014/531 (PDF ) Spatial Bloom Filters: Enabling Privacy in Location-aware Applications Paolo Palmieri, Luca Calderoni, Dario Maio
2014/530 (PDF ) FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison Khoongming Khoo, Thomas Peyrin, Axel Y. Poschmann, Huihui Yap
2014/529 (PDF ) Leakage-Resilient Signatures with Graceful Degradation Jesper Buus Nielsen, Daniele Venturi, Angela Zottarel
2014/528 (PDF ) Groups With Two Generators Having Unsolvable Word Problem And Presentations of Mihailova Subgroups Xiaofeng Wang, Chen Xu, Guo Li, Hanling Lin
2014/527 (PDF ) Good is Not Good Enough: Deriving Optimal Distinguishers from Communication Theory Annelie Heuser, Olivier Rioul, Sylvain Guilley
2014/526 (PDF ) Curve41417: Karatsuba revisited Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange
2014/525 (PDF ) Differential Analysis on Block Cipher PRIDE Jingyuan Zhao, Xiaoyun Wang, Meiqin Wang, Xiaoyang Dong
2014/524 (PDF ) Constructing hyper-bent functions from Boolean functions with the Walsh spectrum taking the same value twice Chunming Tang, Yanfeng Qi
2014/523 (PDF ) Fully Secure and Fast Signing from Obfuscation Kim Ramchen, Brent Waters
2014/522 (PDF ) Constrained Pseudorandom Functions: Verifiable and Delegatable Nishanth Chandran, Srinivasan Raghuraman, Dhinakaran Vinayagamurthy
2014/521 (PDF ) Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model Susan Hohenberger, Venkata Koppula, Brent Waters
2014/520 (PDF ) Squares of Random Linear Codes Ignacio Cascudo, Ronald Cramer, Diego Mirandola, Gilles Zémor
2014/519 (PDF ) Realizing Pico: Finally No More Passwords! Jens Hermans, Roel Peeters
2014/518 (PDF ) Cryptography from Compression Functions: The UCE Bridge to the ROM Mihir Bellare, Viet Tung Hoang, Sriram Keelveedhi
2014/517 (PDF ) On the Connection between Leakage Tolerance and Adaptive Security Jesper Buus Nielsen, Daniele Venturi, Angela Zottarel
2014/516 (PDF ) On the Classification of Finite Boolean Functions up to Fairness Nikolaos Makriyannis
2014/514 (PDF ) On Constrained Implementation of Lattice-based Cryptographic Primitives and Schemes on Smart Cards Ahmad Boorghany, Siavash Bayat Sarmadi, Rasool Jalili
2014/513 (PDF ) RSA meets DPA: Recovering RSA Secret Keys from Noisy Analog Data Noboru Kunihiro, Junya Honda
2014/512 (PDF ) Rmind: a tool for cryptographically secure statistical analysis Dan Bogdanov, Liina Kamm, Sven Laur, Ville Sokk
2014/511 (PDF ) Constructing CCA-secure predicate encapsulation schemes from CPA-secure schemes and universal one-way hash functions Johannes Blömer, Gennadij Liske
2014/510 (PDF ) A Probabilistic Algebraic Attack on the Grain Family of Stream Cipher Pratish Datta, Dibyendu Roy, Sourav Mukhopadhyay
2014/509 (PDF ) Privacy preserving delegated word search in the cloud Kaoutar Elkhiyaoui, Melek Onen, Refik Molva
2014/508 (PDF ) Reversing Stealthy Dopant-Level Circuits Takeshi Sugawara, Daisuke Suzuki, Ryoichi Fujii, Shigeaki Tawa, Ryohei Hori, Mitsuru Shiozaki, Takeshi Fujino
2014/507 (PDF ) How to Generate and use Universal Samplers Dennis Hofheinz, Tibor Jager, Dakshita Khurana, Amit Sahai, Brent Waters, Mark Zhandry
2014/506 (PDF ) Finding Roots in GF(p^n) with the Successive Resultant Algorithm Christophe Petit
2014/505 (PDF ) On the quaternion $\ell$-isogeny path problem David Kohel, Kristin Lauter, Christophe Petit, Jean-Pierre Tignol
2014/504 (PDF ) A Provable Security Analysis of Intel's Secure Key RNG Thomas Shrimpton, R. Seth Terashima
2014/503 (PDF ) Efficient Hidden Vector Encryption with Constant-Size Ciphertext Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo
2014/502 (PDF ) What's the Gist? Privacy-Preserving Aggregation of User Profiles Igor Bilogrevic, Julien Freudiger, Emiliano De Cristofaro, Ersin Uzun
2014/501 (PDF ) WHIRLBOB, the Whirlpool based Variant of STRIBOB: Lighter, Faster, and Constant Time Markku--Juhani O. Saarinen, Billy Bob Brumley
2014/499 (PDF ) Security and Efficiency Analysis of The Hamming Distance Computation Protocol Based On Oblivious Transfer Mehmet Sabır Kiraz, Ziya Alper Genç, Süleyman Kardaş
2014/498 (PDF ) Lightweight Diffusion Layer from the $k^{th}$ root of the MDS Matrix Souvik Kolay, Debdeep Mukhopadhyay
2014/497 (PDF ) NREPO:Normal Basis Recomputing with Permuted Operands Xiaofei Guo, Debdeep Mukhopadhyay, Chenglu Jin, Ramesh Karri
2014/496 (PDF ) Security Pitfalls of a Provably Secure Identity-based Multi-Proxy Signature Scheme Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Willy Susilo
2014/495 (PDF ) Improved Short Lattice Signatures in the Standard Model Léo Ducas, Daniele Micciancio
2014/494 (PDF ) Hardness of k-LWE and Applications in Traitor Tracing San Ling, Duong Hieu Phan, Damien Stehle, Ron Steinfeld
2014/493 (PDF ) Arithmetic on Abelian and Kummer Varieties David Lubicz, Damien Robert
2014/492 (PDF ) Fault attacks on pairing-based protocols revisited Sanjit Chatterjee, Koray Karabina, Alfred Menezes
2014/491 (PDF ) Bootstrappable Identity-Based Fully Homomorphic Encryption Michael Clear, Ciarán McGoldrick
2014/490 (PDF ) Universally Composable secure TNC protocol based on IF-T binding to TLS Shijun Zhao, Qianying Zhang, Yu Qin, Dengguo Feng
2014/489 (PDF ) A Genetic Algorithm for Searching Shortest Lattice Vector of SVP Challenge Dan Ding, Guizhen Zhu, Xiaoyun Wang
2014/488 (PDF ) Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier Michel Abdalla, Fabrice Benhamouda, Alain Passelègue, Kenneth G. Paterson
2014/487 (PDF ) GGHLite: More Efficient Multilinear Maps from Ideal Lattices Adeline Langlois, Damien Stehle, Ron Steinfeld
2014/486 (PDF ) Binary Elligator Squared Diego F. Aranha, Pierre-Alain Fouque, Chen Qian, Mehdi Tibouchi, Jean-Christophe Zapalowicz
2014/485 (PDF ) An Improved Truncated Differential Cryptanalysis of KLEIN Shahram Rasoolzadeh, Zahra Ahmadian, Mahmood Salmasizadeh, Mohammad Reza Aref
2014/484 (PDF ) Sealing the Leak on Classical NTRU Signatures Carlos Aguilar Melchor, Xavier Boyen, Jean-Christophe Deneuville, Philippe Gaborit
2014/483 (PDF ) Disjunctions for Hash Proof Systems: New Constructions and Applications Michel Abdalla, Fabrice Benhamouda, David Pointcheval
2014/482 (PDF ) Differentially Private Data Aggregation with Optimal Utility Fabienne Eigner, Aniket Kate, Matteo Maffei, Francesca Pampaloni, Ivan Pryvalov
2014/481 (PDF ) Universally Composable Non-Interactive Key Exchange Eduarda S. V. Freire, Julia Hesse, Dennis Hofheinz
2014/480 (PDF ) Cryptographic Agents: Towards a Unified Theory of Computing on Encrypted Data Shashank Agrawal, Shweta Agrawal, Manoj Prabhakaran
2014/479 (PDF ) Even more practical secure logging: Tree-based Seekable Sequential Key Generators Giorgia Azzurra Marson, Bertram Poettering
2014/478 (PDF ) Related-Key Secure Pseudorandom Functions: The Case of Additive Attacks Benny Applebaum, Eyal Widder
2014/477 (PDF ) Relaxed Two-to-one Recoding Schemes Omkant Pandey, Kim Ramchen, Brent Waters
2014/476 (PDF ) Simon's Circuit Paul Baecher
2014/475 (PDF ) A Key Recovery Attack on Error Correcting Code Based a Lightweight Security Protocol Imran Erguler
2014/474 (PDF ) Cryptographic Schemes Based on the ASASA Structure: Black-box, White-box, and Public-key Alex Biryukov, Charles Bouillaguet, Dmitry Khovratovich
2014/472 (PDF ) How to Watermark Cryptographic Functions Ryo Nishimaki
2014/470 (PDF ) PPDCP-ABE: Privacy-Preserving Decentralized Cipher-Policy Attribute-Based Encryption Jinguang Han, Willy Susilo, Yi Mu, Jianying Zhou, Man Ho Au
2014/469 (PDF ) Homomorphic Signatures with Efficient Verification for Polynomial Functions Dario Catalano, Dario Fiore, Bogdan Warinschi
2014/468 (PDF ) Privacy-Preserving Auditing for Attribute-Based Credentials Jan Camenisch, Anja Lehmann, Gregory Neven, Alfredo Rial
2014/467 (PDF ) Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens Daniel Demmler, Thomas Schneider, Michael Zohner
2014/466 (PDF ) On a new properties of number sequences ,a randomness test and a new RC4's key scheduling algorithm. Samir Bouftass, Abdelhak Azhari
2014/465 (PDF ) Semi-Adaptive Attribute-Based Encryption and Improved Delegation for Boolean Formula Jie Chen, Hoeteck Wee
2014/464 (PDF ) Providing Root of Trust for ARM TrustZone using On-Chip SRAM Shijun Zhao, Qianying Zhang, Guangyao Hu, Yu Qin, Dengguo Feng
2014/463 (PDF ) (Leveled) Fully Homomorphic Signatures from Lattices Sergey Gorbunov, Vinod Vaikuntanathan
2014/462 (PDF ) Efficient Key-policy Attribute-based Encryption for General Boolean Circuits from Multilinear Maps Constantin Catalin Dragan, Ferucio Laurentiu Tiplea
2014/460 (PDF ) FleXOR: Flexible garbling for XOR gates that beats free-XOR Vladimir Kolesnikov, Payman Mohassel, Mike Rosulek
2014/459 (PDF ) Template Attacks on Different Devices Omar Choudary, Markus G. Kuhn
2014/458 (PDF ) Automated Analysis of Cryptographic Assumptions in Generic Group Models Gilles Barthe, Edvard Fagerholm, Dario Fiore, John Mitchell, Andre Scedrov, Benedikt Schmidt
2014/457 (PDF ) Transcript secure signatures based on modular lattices Jeff Hoffstein, Jill Pipher, John M. Schanck, Joseph H. Silverman, William Whyte
2014/456 (PDF ) Verified Implementations for Secure and Verifiable Computation José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Guillaume Davy, François Dupressoir, Benjamin Grégoire, Pierre-Yves Strub
2014/455 (PDF ) Single-shot security for one-time memories in the isolated qubits model Yi-Kai Liu
2014/454 (PDF ) Early Propagation and Imbalanced Routing, How to Diminish in FPGAs Amir Moradi, Vincent Immler
2014/453 (PDF ) Block Ciphers - Focus On The Linear Layer (feat. PRIDE): Full Version Martin R. Albrecht, Benedikt Driessen, Elif Bilge Kavun, Gregor Leander, Christof Paar, Tolga Yalçın
2014/452 (PDF ) Proof of Activity: Extending Bitcoin’s Proof of Work via Proof of Stake Iddo Bentov, Charles Lee, Alex Mizrahi, Meni Rosenfeld
2014/451 (PDF ) Leveled Fully Homomorphic Signatures from Standard Lattices Daniel Wichs
2014/448 (PDF ) Differential Attacks on Reduced SIMON Versions with Dynamic Key-guessing Techniques Ning Wang, Xiaoyun Wang, Keting Jia, Jingyuan Zhao
2014/447 (PDF ) Faster Private Set Intersection based on OT Extension Benny Pinkas, Thomas Schneider, Michael Zohner
2014/446 (PDF ) 4-point Attacks with Standard Deviation Analysis on A-Feistel Schemes Valerie Nachef, Jacques Patarin, Emmanuel Volte
2014/445 (PDF ) Polynomial Spaces: A New Framework for Composite-to-Prime-Order Transformations Gottfried Herold, Julia Hesse, Dennis Hofheinz, Carla Ràfols, Andy Rupp
2014/444 (PDF ) RPKI vs ROVER: Comparing the Risks of BGP Security Solutions Aanchal Malhotra, Sharon Goldberg
2014/443 (PDF ) Minimizing the Two-Round Even-Mansour Cipher Shan Chen, Rodolphe Lampe, Jooyoung Lee, Yannick Seurin, John P. Steinberger
2014/442 (PDF ) Secure Outsourced Computation of the Characteristic Polynomial and Eigenvalues of Matrix Xing Hu, Chunming Tang
2014/441 (PDF ) Improved Generic Attacks Against Hash-based MACs and HAIFA Itai Dinur, Gaëtan Leurent
2014/440 (PDF ) Double Level Montgomery Cox-Rower Architecture, New Bounds Jean-Claude Bajard, Nabil Merkiche
2014/439 (PDF ) Efficient Non-Interactive Verifiable Outsourced Computation for Arbitrary Functions Chunming Tang, Yuenai Chen
2014/438 (PDF ) Security of Symmetric Encryption against Mass Surveillance Mihir Bellare, Kenneth Paterson, Phillip Rogaway
2014/437 (PDF ) Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences Jingguo Bi, Jean-Sébastien Coron, Jean-Charles Faugère, Phong Q. Nguyen, Guénaël Renault, Rina Zeitoun
2014/436 (PDF ) Synthesis of Fault Attacks on Cryptographic Implementations Gilles Barthe, Francois Dupressoir, Pierre-Alain Fouque, Benjamin Gregoire, Jean-Christophe Zapalowicz
2014/435 (PDF ) Wait a minute! A fast, Cross-VM attack on AES Gorka Irazoqui, Mehmet Sinan Inci, Thomas Eisenbarth, Berk Sunar
2014/434 (PDF ) Just a Little Bit More Joop van de Pol, Nigel P. Smart, Yuval Yarom
2014/433 (PDF ) A Statistical Model for Higher Order DPA on Masked Devices A. Adam Ding, Liwei Zhang, Yunsi Fei, Pei Luo
2014/432 (PDF ) Universally Composable Authentication and Key-exchange with Global PKI Ran Canetti, Daniel Shahaf, Margarita Vald
2014/431 (PDF ) A Low-Latency, Low-Area Hardware Oblivious RAM Controller Christopher W. Fletcher, Ling Ren, Albert Kwon, Marten van Dijk, Emil Stefanov, Dimitrios Serpanos, Srinivas Devadas
2014/430 (PDF ) Revisiting the Gentry-Szydlo Algorithm H. W. Lenstra, A. Silverberg
2014/429 (PDF ) Memento: How to Reconstruct your Secrets from a Single Password in a Hostile Environment Jan Camenisch, Anja Lehmann, Anna Lysyanskaya, Gregory Neven
2014/428 (PDF ) Dual System Encryption via Doubly Selective Security: Framework, Fully-secure Functional Encryption for Regular Languages, and More Nuttapong Attrapadung
2014/427 (PDF ) Fast point multiplication algorithms for binary elliptic curves with and without precomputation Thomaz Oliveira, Diego F. Aranha, Julio López, Francisco Rodríguez-Henríquez
2014/426 (PDF ) Towards Optimally Efficient Secret-Key Authentication from PRG Ivan Damgård, Sunoo Park
2014/425 (PDF ) Note of Multidimensional MITM Attack on 25-Round TWINE-128 Long Wen, Meiqin Wang, Andrey Bogdanov, Huaifeng Chen
2014/424 (PDF ) Constructing Abelian Surfaces for Cryptography via Rosenhain Invariants Craig Costello, Alyson Deines-Schartz, Kristin Lauter, Tonghai Yang
2014/423 (PDF ) The Hash Function "Fugue" Shai Halevi, William E. Hall, Charanjit S. Jutla
2014/422 (PDF ) System-level non-interference for constant-time cryptography Gilles Barthe, Gustavo Betarte, Juan Diego Campo, Carlos Luna, David Pichardie
2014/421 (PDF ) FNR : Arbitrary length small domain block cipher proposal Sashank Dara, Scott Fluhrer
2014/420 (PDF ) Bounded Fully Homomorphic Signature Schemes Xiang Xie, Rui Xue
2014/419 (PDF ) FFS Factory: Adapting Coppersmith's "Factorization Factory" to the Function Field Sieve Jérémie Detrey
2014/418 (PDF ) A Simple Recursive Tree Oblivious RAM Benny Pinkas, Tzachy Reinman
2014/417 (PDF ) Using Random Error Correcting Codes in Near-Collision Attacks on Generic Hash-Functions Inna Polak, Adi Shamir
2014/416 (PDF ) Adaptive Security of Constrained PRFs Georg Fuchsbauer, Momchil Konstantinov, Krzysztof Pietrzak, Vanishree Rao
2014/415 (PDF ) Virtual Proofs of Reality Ulrich Rührmair
2014/414 (PDF ) A Security Proof of KCDSA using an extended Random Oracle Model Vikram Singh
2014/413 (PDF ) On the Cost of Lazy Engineering for Masked Software Implementations Josep Balasch, Benedikt Gierlichs, Vincent Grosso, Oscar Reparaz, François-Xavier Standaert
2014/412 (PDF ) Efficient Selection of Time Samples for Higher-Order DPA with Projection Pursuits François Durvaux, François-Xavier Standaert, Nicolas Veyrat-Charvillon, Jean-Baptiste Mairy, Yves Deville
2014/411 (PDF ) Combining Leakage-Resilient PRFs and Shuffling (Towards Bounded Security for Small Embedded Devices) Vincent Grosso, Romain Poussier, François-Xavier Standaert, Lubos Gaspar
2014/410 (PDF ) Soft Analytical Side-Channel Attacks Nicolas Veyrat-Charvillon, Benoît Gérard, François-Xavier Standaert
2014/409 (PDF ) Moments-Correlating DPA Amir Moradi, François-Xavier Standaert
2014/408 (PDF ) Bootstrapping BGV Ciphertexts with a Wider Choice of p and q Emmanuela Orsini, Joop van de Pol, Nigel P. Smart
2014/407 (PDF ) Towards Symmetric Functional Encryption for Regular Languages with Predicate Privacy Fu-Kuo Tseng, Rong-Jaye Chen, Bao-Shuh Paul Lin
2014/406 (PDF ) New Generic Attacks Against Hash-based MACs Gaëtan Leurent, Thomas Peyrin, Lei Wang
2014/405 (PDF ) Indistinguishability Obfuscation versus Multi-Bit Point Obfuscation with Auxiliary Input Chris Brzuska, Arno Mittelbach
2014/404 (PDF ) Large-Scale Secure Computation Elette Boyle, Kai-Min Chung, Rafael Pass
2014/403 (PDF ) Generic Universal Forgery Attack on Iterative Hash-based MACs Thomas Peyrin, Lei Wang
2014/402 (PDF ) On the Existence of Extractable One-Way Functions Nir Bitansky, Ran Canetti, Omer Paneth, Alon Rosen
2014/401 (PDF ) Software implementation of an Attribute-Based Encryption scheme Eric Zavattoni, Luis J. Dominguez Perez, Shigeo Mitsunari, Ana H. Sánchez-Ramírez, Tadanori Teruya, Francisco Rodríguez-Henríquez
2014/400 (PDF ) Composable Oblivious Extended Permutations Peeter Laud, Jan Willemson
2014/399 (PDF ) An Asymptotically Optimal Structural Attack on the ABC Multivariate Encryption Scheme Dustin Moody, Ray Perlner, Daniel Smith-Tone
2014/398 (PDF ) Differential Properties of the HFE Cryptosystem Taylor Daniels, Daniel Smith-Tone
2014/397 (PDF ) Cofactorization on Graphics Processing Units Andrea Miele, Joppe W. Bos, Thorsten Kleinjung, Arjen K. Lenstra
2014/396 (PDF ) Prover-Efficient Commit-And-Prove Zero-Knowledge SNARKs Helger Lipmaa
2014/395 (PDF ) Lightweight and Privacy-Preserving Delegatable Proofs of Storage Jia Xu, Anjia Yang, Jianying Zhou, Duncan S. Wong
2014/394 (PDF ) Relational Hash Avradip Mandal, Arnab Roy
2014/393 (PDF ) (Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-way Functions and Beyond Yu Yu, Dawu Gu, Xiangxue Li, Jian Weng
2014/392 (PDF ) The Randomized Iterate Revisited - Almost Linear Seed Length PRGs from A Broader Class of One-way Functions Yu Yu, Dawu Gu, Xiangxue Li, Jian Weng
2014/391 (PDF ) MuR-DPA: Top-down Levelled Multi-replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud Chang Liu, Rajiv Ranjan, Chi Yang, Xuyun Zhang, Lizhe Wang, Jinjun Chen
2014/390 (PDF ) Black-Box Non-Black-Box Zero Knowledge Vipul Goyal, Rafail Ostrovsky, Alessandra Scafuro, Ivan Visconti
2014/389 (PDF ) Accelerating NTRU based Homomorphic Encryption using GPUs Wei Dai, Yarkın Doröz, Berk Sunar
2014/388 (PDF ) Finding collisions for MD4 hash algorithm using hybrid algorithm Marko Carić
2014/387 (PDF ) New candidates for multivariate trapdoor functions Jaiberth Porras, John B. Baena, Jintai Ding
2014/386 (PDF ) Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers Nicky Mouha, Bart Mennink, Anthony Van Herrewege, Dai Watanabe, Bart Preneel, Ingrid Verbauwhede
2014/385 (PDF ) Jacobian Coordinates on Genus 2 Curves Huseyin Hisil, Craig Costello
2014/384 (PDF ) Yao's millionaires' problem and decoy-based public key encryption by classical physics Dima Grigoriev, Vladimir Shpilrain
2014/383 (PDF ) Cryptanalysis of and Improvement on Biometric-based User Authentication Scheme for C/S System Younsung Choi, Dongho Won
2014/382 (PDF ) Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation Felix Günther, Mark Manulis, Andreas Peter
2014/381 (PDF ) Using Indistinguishability Obfuscation via UCEs Chris Brzuska, Arno Mittelbach
2014/380 (PDF ) Efficient Adaptively Secure IBBE from Standard Assumptions Somindu C. Ramanna, Palash Sarkar
2014/379 (PDF ) Hyper-and-elliptic-curve cryptography Daniel J. Bernstein, Tanja Lange
2014/376 (PDF ) How Secure is Deterministic Encryption? Mihir Bellare, Rafael Dowsley, Sriram Keelveedhi
2014/375 (PDF ) Improved Cryptanalysis on Reduced-Round GOST and Whirlpool Hash Function (Full Version) Bingke Ma, Bao Li, Ronglin Hao, Xiaoqian Li
2014/374 (PDF ) Optimal Contracts for Outsourced Computation Viet Pham, MHR. Khouzani, Carlos Cid
2014/373 (PDF ) Beyond 2^{c/2} Security in Sponge-Based Authenticated Encryption Modes Philipp Jovanovic, Atul Luykx, Bart Mennink
2014/372 (PDF ) Fully secure constrained pseudorandom functions using random oracles Dennis Hofheinz
2014/371 (PDF ) On the Enumeration of Double-Base Chains with Applications to Elliptic Curve Cryptography Christophe Doche
2014/370 (PDF ) Compact VSS and Efficient Homomorphic UC Commitments Ivan Damgård, Bernardo David, Irene Giacomelli, Jesper Buus Nielsen
2014/369 (PDF ) On the Limits of Authenticated Key Exchange Security with an Application to Bad Randomness Michèle Feltz, Cas Cremers
2014/368 (PDF ) Solving the Discrete Logarithm of a 113-bit Koblitz Curve with an FPGA Cluster Erich Wenger, Paul Wolfger
2014/367 (PDF ) Redefining the Transparency Order Kaushik Chakraborty, Sumanta Sarkar, Subhamoy Maitra, Bodhisatwa Mazumdar, Debdeep Mukhopadhyay, Emmanuel Prouff
2014/366 (PDF ) Cryptanalysis and Improvement on Robust Three-Factor Remote User Authentication Scheme with Key Agreement for Multimedia System Younsung Choi, Dongho Won
2014/365 (PDF ) Multi-target DPA attacks: Pushing DPA beyond the limits of a desktop computer Luke Mather, Elisabeth Oswald, Carolyn Whitnall
2014/364 (PDF ) Deleting Secret Data with Public Verifiability Feng Hao, Dylan Clarke, Avelino Francisco Zorzo
2014/363 (PDF ) Forging Attacks on two Authenticated Encryptions COBRA and POET Mridul Nandi
2014/362 (PDF ) Nothing is for Free: Security in Searching Shared & Encrypted Data Qiang Tang
2014/361 (PDF ) New Results in the Linear Cryptanalysis of DES Igor Semaev
2014/360 (PDF ) McEliece in the world of Escher Danilo Gligoroski, Simona Samardjiska, Håkon Jacobsen, Sergey Bezzateev
2014/359 (PDF ) Explicit endomorphism of the Jacobian of a hyperelliptic function field of genus 2 using base field operations Eduardo Ruiz Duarte, Octavio Páez Osuna
2014/358 (PDF ) A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols Kim-Kwang Raymond Choo, Junghyun Nam, Dongho Won
2014/357 (PDF ) Simulatable Leakage: Analysis, Pitfalls, and new Constructions J. Longo Galea, D. Martin, E. Oswald, D. Page, M. Stam, M. Tunstall
2014/356 (PDF ) Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE, and Compact Garbled Circuits Dan Boneh, Craig Gentry, Sergey Gorbunov, Shai Halevi, Valeria Nikolaenko, Gil Segev, Vinod Vaikuntanathan, Dhinakaran Vinayagamurthy
2014/355 (PDF ) Graph-theoretic design and analysis of key predistribution schemes Michelle Kendall, Keith M. Martin
2014/354 (PDF ) Optimizing Information Set Decoding Algorithms to Attack Cyclosymmetric MDPC Codes Ray Perlner
2014/353 (PDF ) Folding Alternant and Goppa Codes with Non-Trivial Automorphism Groups Jean-Charles Faugère, Ayoub Otmani, Ludovic Perret, Frédéric de Portzamparc, Jean-Pierre Tillich
2014/352 (PDF ) Multi-Vendor PayWord with Payment Approval Andrea Huszti
2014/351 (PDF ) Secret and Verifiable Delegated Voting for Wide Representation Yefim Leifman
2014/350 (PDF ) Distributed Smooth Projective Hashing and its Application to Two-Server PAKE Franziskus Kiefer, Mark Manulis
2014/349 (PDF ) Zerocash: Decentralized Anonymous Payments from Bitcoin Eli Ben-Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, Madars Virza
2014/348 (PDF ) A Simple Cast-as-Intended E-Voting Protocol by Using Secure Smart Cards Helger Lipmaa
2014/347 (PDF ) One-Way Functions and (Im)perfect Obfuscation Ilan Komargodski, Tal Moran, Moni Naor, Rafael Pass, Alon Rosen, Eylon Yogev
2014/346 (PDF ) Time-Memory Trade-offs for Index Calculus in Genus 3 Kim Laine, Kristin Lauter
2014/345 (PDF ) Private Database Access With HE-over-ORAM Architecture Craig Gentry, Shai Halevi, Charanjit Jutla, Mariana Raykova
2014/344 (PDF ) Toward Robust Hidden Volumes using Write-Only Oblivious RAM Erik-Oliver Blass, Travis Mayberry, Guevara Noubir, Kaan Onarlioglu
2014/343 (PDF ) Solving Linear Equations Modulo Unknown Divisors: Revisited Yao Lu, Rui Zhang, Liqiang Peng, Dongdai Lin
2014/342 (PDF ) Proposing Individualization of the design of cryptographic hardware accelerators as countermeasure against structure and side channel analysis Zoya Dyka, Thomas Basmer, Christian Wittke, Peter Langendoerfer
2014/341 (PDF ) Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking Ralf Kuesters, Tomasz Truderung, Andreas Vogt
2014/340 (PDF ) A Strong and Efficient Certificateless Digital Signature Scheme Mohammed Alfateh Hassouna, Mohsin Hashim
2014/338 (PDF ) A Tamper and Leakage Resilient von Neumann Architecture Sebastian Faust, Pratyay Mukherjee, Jesper Buus Nielsen, Daniele Venturi
2014/337 (PDF ) Related Randomness Attacks for Public Key Encryption Kenneth G. Paterson, Jacob C. N. Schuldt, Dale L. Sibborn
2014/336 (PDF ) Private Predictive Analysis on Encrypted Medical Data Joppe W. Bos, Kristin Lauter, Michael Naehrig
2014/335 (PDF ) SHADOW NUMBERS PUBLIC KEY ENCRYPTION John Almeida
2014/334 (PDF ) LCPR: High Performance Compression Algorithm for Lattice-Based Signatures Rachid El Bansarkhani, Johannes Buchmann
2014/333 (PDF ) An optimal representation for the trace zero subgroup Elisa Gorla, Maike Massierer
2014/332 (PDF ) How to Choose Interesting Points for Template Attacks? Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng
2014/331 (PDF ) Machine Learning Classification over Encrypted Data Raphael Bost, Raluca Ada Popa, Stephen Tu, Shafi Goldwasser
2014/330 (PDF ) Noncentralized Cryptocurrency wtih No Blockchain qianxiaochao
2014/329 (PDF ) Explicit Optimal Binary Pebbling for One-Way Hash Chain Reversal Berry Schoenmakers
2014/328 (PDF ) Affine-evasive Sets Modulo a Prime Divesh Aggarwal
2014/327 (PDF ) An Optimal Strong Password Authentication Protocol with USB Sticks Vikram D
2014/325 (PDF ) A practical forgery and state recovery attack on the authenticated cipher PANDA-s Xiutao FENG, Fan ZHANG, Hui WANG
2014/324 (PDF ) From Single-Bit to Multi-Bit Public-Key Encryption via Non-Malleable Codes Sandro Coretti, Ueli Maurer, Björn Tackmann, Daniele Venturi
2014/323 (PDF ) Some Remarks on Honeyword Based Password-Cracking Detection Imran Erguler
2014/322 (PDF ) Coding Theoretic Construction of Quantum Ramp Secret Sharing Ryutaroh Matsumoto
2014/321 (PDF ) Efficient Quantum-Immune Keyless Signatures with Identity Ahto Buldas, Risto Laanoja, Ahto Truu
2014/320 (PDF ) Improved Differential Cryptanalysis of Round-Reduced Speck Itai Dinur
2014/319 (PDF ) Preimage attacks on Reduced-round Stribog Riham AlTawy, Amr M. Youssef
2014/318 (PDF ) Index calculus in the trace zero variety Elisa Gorla, Maike Massierer
2014/317 (PDF ) Analysis of NORX: Investigating Differential and Rotational Properties Jean-Philippe Aumasson, Philipp Jovanovic, Samuel Neves
2014/316 (PDF ) Explicit Non-Malleable Codes Resistant to Permutations Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran
2014/315 (PDF ) Statistical weaknesses in 20 RC4-like algorithms and (probably) the simplest algorithm free from these weaknesses - VMPC-R Bartosz Zoltak
2014/314 (PDF ) Improved Leakage Model Based on Genetic Algorithm Zhenbin Zhang, Liji Wu, An Wang, Zhaoli Mu
2014/313 (PDF ) On the Complexity of Finding Low-Level Solutions Bjoern Grohmann
2014/312 (PDF ) Structure-Preserving Signatures from Type II Pairings Masayuki Abe, Jens Groth, Miyako Ohkubo, Mehdi Tibouchi
2014/311 (PDF ) Exponent-inversion Signatures and IBE under Static Assumptions Tsz Hon Yuen, Sherman S. M. Chow, Cong Zhang, Siu Ming Yiu
2014/310 (PDF ) Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Revisited and More Yu Chen, Qiong Huang, Zongyang Zhang
2014/309 (PDF ) Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption Craig Gentry, Allison Lewko, Amit Sahai, Brent Waters
2014/308 (PDF ) The Locality of Searchable Symmetric Encryption David Cash, Stefano Tessaro
2014/307 (PDF ) Simulation-Time Security Margin Assessment against Power-Based Side Channel Attacks Alessandro Barenghi, Gerardo Pelosi, Francesco Regazzoni
2014/306 (PDF ) Publicly Evaluable Pseudorandom Functions and Their Applications Yu Chen, Zongyang Zhang
2014/305 (PDF ) Collision Attack on 5 Rounds of Grøstl Florian Mendel, Vincent Rijmen, Martin Schläffer
2014/304 (PDF ) Actively Private and Correct MPC Scheme in $t < n/2$ from Passively Secure Schemes with Small Overhead Dai Ikarashi, Ryo Kikuchi, Koki Hamada, Koji Chida
2014/302 (PDF ) Branching Heuristics in Differential Collision Search with Applications to SHA-512 Maria Eichlseder, Florian Mendel, Martin Schläffer
2014/301 (PDF ) How to Avoid Obfuscation Using Witness PRFs Mark Zhandry
2014/300 (PDF ) On the Powers of 2 Robert Granger, Thorsten Kleinjung, Jens Zumbrägel
2014/299 (PDF ) Optimality of Non-Adaptive Strategies: The Case of Parallel Games Grégory Demay, Peter Gaži, Ueli Maurer, Björn Tackmann
2014/298 (PDF ) Torsion Limits and Riemann-Roch Systems for Function Fields and Applications Ignacio Cascudo, Ronald Cramer, Chaoping Xing
2014/297 (PDF ) Pipelineable On-Line Encryption Farzaneh Abed, Scott Fluhrer, Christian Forler, Eik List, Stefan Lucks, David McGrew, Jakob Wenzel
2014/296 (PDF ) Quantum Attacks on Classical Proof Systems - The Hardness of Quantum Rewinding Andris Ambainis, Ansis Rosmanis, Dominique Unruh
2014/295 (PDF ) ZAPs and Non-Interactive Witness Indistinguishability from Indistinguishability Obfuscation Nir Bitansky, Omer Paneth
2014/294 (PDF ) The M3lcrypt Password Based Key Derivation Function Isaiah Makwakwa
2014/292 (PDF ) Improved Meet-in-the-Middle Attacks on Reduced-Round Camellia-192/256 Leibo Li, Keting Jia
2014/291 (PDF ) Trial multiplication is not optimal but... On the symmetry of finite cyclic groups (Z/pZ)∗ Antonio Sanso
2014/290 (PDF ) Reliable Broadcast with Respect to Topology Knowledge Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas
2014/289 (PDF ) An Empirical Study and some Improvements of the MiniMac Protocol for Secure Computation Ivan Damgaard, Rasmus Lauritsen, Tomas Toft
2014/288 (PDF ) Resilient Aggregation in Simple Linear Sensor Networks Kevin J. Henry, Douglas R. Stinson
2014/287 (PDF ) Active and Passive Side-Channel Attacks on Delay Based PUF Designs Georg T. Becker, Raghavan Kumar
2014/286 (PDF ) Weaknesses of Password Authentication Scheme Based on Geometric Hashing Martin Stanek
2014/285 (PDF ) Privacy-Enhancing Proxy Signatures from Non-Interactive Anonymous Credentials David Derler, Christian Hanser, Daniel Slamanig
2014/284 (PDF ) Resettably Sound Zero-Knoweldge Arguments from OWFs - the (semi) Black-Box way Rafail Ostrovsky, Alessandra Scafuro, Muthuramakrishnan Venkitasubramaniam
2014/283 (PDF ) Structural Lattice Reduction: Generalized Worst-Case to Average-Case Reductions and Homomorphic Cryptosystems Nicolas Gama, Malika Izabachene, Phong Q. Nguyen, Xiang Xie
2014/282 (PDF ) On The Orthogonal Vector Problem and The Feasibility of Unconditionally Secure Leakage Resilient Computation Ivan Damgård, Frédéric Dupuis, Jesper Buus Nielsen
2014/281 (PDF ) WCFB: a tweakable wide block cipher Andrey Jivsov
2014/280 (PDF ) MSEA: Modified Symmetric Encryption Algorithm Rajul Kumar, K. K. Mishra, Ashish Tripathi, Abhinav Tomar, Surendra Singh
2014/279 (PDF ) Improved Impossible Differential Attacks against Round-Reduced LBlock Christina Boura, Marine Minier, María Naya-Plasencia, Valentin Suder
2014/278 (PDF ) Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions Essam Ghadafi
2014/277 (PDF ) New Treatment of the BSW Sampling and Its Applications to Stream Ciphers Lin Ding, Chenhui Jin, Jie Guan, Chuanda Qi
2014/276 (PDF ) Design of identity-based digital signature schemes using extended chaotic maps SK Hafizul Islam
2014/275 (PDF ) Identity-based encryption and digital signature schemes using extended chaotic maps SK Hafizul Islam
2014/274 (PDF ) A note on the construction of pairing-friendly elliptic curves for composite order protocols Sorina Ionica, Malika Izabachène
2014/273 (PDF ) Witness Encryption from Instance Independent Assumptions Craig Gentry, Allison Bishop Lewko, Brent Waters
2014/272 (PDF ) Impossible differential cryptanalysis of LBlock with concrete investigation of key scheduling algorithm Jiageng Chen, Yuichi Futa, Atsuko Miyaji, Chunhua Su
2014/271 (PDF ) STRIBOB: Authenticated Encryption from GOST R 34.11-2012 LPS Permutation Markku-Juhani O. Saarinen
2014/270 (PDF ) Faster Maliciously Secure Two-Party Computation Using the GPU Tore Kasper Frederiksen, Thomas Pelle Jakobsen, Jesper Buus Nielsen
2014/269 (PDF ) Chosen Ciphertext Security via Point Obfuscation Takahiro Matsuda, Goichiro Hanaoka
2014/268 (PDF ) New bit-parallel Montgomery multiplier for trinomials using squaring operation Yin Li, Yiyang Chen
2014/267 (PDF ) Differential Fault Analysis on the families of SIMON and SPECK ciphers Harshal Tupsamudre, Shikha Bisht, Debdeep Mukhopadhyay
2014/266 (PDF ) ICEPOLE: High-speed, Hardware-oriented Authenticated Encryption Pawel Morawiecki, Kris Gaj, Ekawat Homsirikamol, Krystian Matusiewicz, Josef Pieprzyk, Marcin Rogawski, Marian Srebrny, Marcin Wojcik
2014/265 (PDF ) Dual System Groups and its Applications --- Compact HIBE and More Jie Chen, Hoeteck Wee
2014/264 (PDF ) Continuous After-the-fact Leakage-Resilient Key Exchange (full version) Janaka Alawatugoda, Colin Boyd, Douglas Stebila
2014/263 (PDF ) A Generic Scan Attack on Hardware based eStream Winners Sandip Karmakar, Dipanwita Roy Chowdhury
2014/262 (PDF ) Differential Fault Analysis of MICKEY Family of Stream Ciphers Sandip Karmakar, Dipanwita Roy Chowdhury
2014/261 (PDF ) Fault Analysis of Grain Family of Stream Ciphers Sandip Karmakar, Dipanwita Roy Chowdhury
2014/260 (PDF ) Locally Decodable Codes for edit distance Rafail Ostrovsky, Anat Paskin-Cherniavsky
2014/259 (PDF ) Practical Complexity Cube Attacks on Round-Reduced Keccak Sponge Function Itai Dinur, Pawel Morawiecki, Josef Pieprzyk, Marian Srebrny, Michal Straus
2014/258 (PDF ) A realtime key recovery attack on the authenticated cipher FASER128 Xiutao FENG, Fan ZHANG
2014/257 (PDF ) Handycipher: a Low-tech, Randomized, Symmetric-key Cryptosystem Bruce Kallick
2014/256 (PDF ) Private and Dynamic Time-Series Data Aggregation with Trust Relaxation Iraklis Leontiadis, Kaoutar Elkhiyaoui, Refik Molva
2014/255 (PDF ) Certification and Efficient Proofs of Committed Topology Graphs Thomas Gross
2014/254 (PDF ) Enhanced Lattice-Based Signatures on Reconfigurable Hardware Thomas Pöppelmann, Lëo Ducas, Tim Güneysu
2014/252 (PDF ) Making RSA-PSS Provably Secure Against Non-Random Faults Gilles Barthe, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Mehdi Tibouchi, Jean-Christophe Zapalowicz
2014/251 (PDF ) Forgery on Stateless CMCC Guy Barwell
2014/250 (PDF ) Cryptanalysis of the MORE symmetric key fully homomorphic encryption scheme Boaz Tsaban, Noam Lifshitz
2014/249 (PDF ) Linear Extension Cube Attack on Stream Ciphers Liren Ding, Yongjuan Wang, Zhufeng Li
2014/248 (PDF ) Fine grain Cross-VM Attacks on Xen and VMware are possible! Gorka Irazoqui Apecechea, Mehmet Sinan Inci, Thomas Eisenbarth, Berk Sunar
2014/247 (PDF ) Introducing Fault Tolerance into Threshold Password-Authenticated Key Exchange Ivan Pryvalov, Aniket Kate
2014/246 (PDF ) Security Analysis of an Identity-Based Strongly Unforgeable Signature Scheme Kwangsu Lee, Dong Hoon Lee
2014/245 (PDF ) A practical state recovery attack on the stream cipher Sablier v1 Xiutao FENG, Fan ZHANG
2014/244 (PDF ) bitcoin.BitMint: Reconciling Bitcoin with Central Banks Gideon Samid
2014/243 (PDF ) Reusable Fuzzy Extractors for Low-Entropy Distributions Ran Canetti, Benjamin Fuller, Omer Paneth, Leonid Reyzin, Adam Smith
2014/242 (PDF ) Zero-Knowledge Password Policy Checks and Verifier-Based PAKE Franziskus Kiefer, Mark Manulis
2014/240 (PDF ) Automatic Proofs of Privacy of Secure Multi-Party Computation Protocols Against Active Adversaries Martin Pettai, Peeter Laud
2014/239 (PDF ) Logical Reasoning to Detect Weaknesses About SHA-1 and MD4/5 Florian Legendre, Gilles Dequen, Michaël Krajecki
2014/238 (PDF ) High Parallel Complexity Graphs and Memory-Hard Functions Joël Alwen, Vladimir Serbinenko
2014/237 (PDF ) SIMON Says, Break the Area Records for Symmetric Key Block Ciphers on FPGAs Aydin Aysu, Ege Gulcan, Patrick Schaumont
2014/236 (PDF ) Linear Sequential Circuit Approximation of Acterbahn Stream Cipher Shazia Afreen
2014/235 (PDF ) Efficient Fuzzy Search on Encrypted Data Alexandra Boldyreva, Nathan Chenette
2014/234 (PDF ) Enhancing Oblivious RAM Performance Using Dynamic Prefetching Xiangyao Yu, Ling Ren, Christopher Fletcher, Albert Kwon, Marten van Dijk, Srinivas Devadas
2014/233 (PDF ) Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince Yarkın Doröz, Aria Shahverdi, Thomas Eisenbarth, Berk Sunar
2014/232 (PDF ) Bandwidth Efficient PIR from NTRU Yarkın Doröz, Berk Sunar, Ghaith Hammouri
2014/231 (PDF ) Self-Updatable Encryption with Short Public Parameters and Its Extensions Kwangsu Lee
2014/230 (PDF ) Isogeny graphs with maximal real multiplication Sorina Ionica, Emmanuel Thomé
2014/228 (PDF ) Cryptanalysis of SP Networks with Partial Non-Linear Layers Achiya Bar-On, Itai Dinur, Orr Dunkelman, Virginie Lallemand, Nathan Keller, Boaz Tsaban
2014/226 (PDF ) Weak-Key Analysis of POET Mohamed Ahmed Abdelraheem, Andrey Bogdanov, Elmar Tischhauser
2014/225 (PDF ) Adaptively Secure Functional Encryption for Finite Languages from DLIN Assumption Tapas Pandit, Rana Barua
2014/224 (PDF ) Whitewash: Outsourcing Garbled Circuit Generation for Mobile Devices Henry Carter, Charles Lever, Patrick Traynor
2014/223 (PDF ) Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of GLUON-64 Léo Perrin, Dmitry Khovratovich
2014/222 (PDF ) Optimizing Obfuscation: Avoiding Barrington's Theorem Prabhanjan Ananth, Divya Gupta, Yuval Ishai, Amit Sahai
2014/221 (PDF ) Hybrid Model of Fixed and Floating Point Numbers in Secure Multiparty Computations Toomas Krips, Jan Willemson
2014/220 (PDF ) Total Break of Zorro using Linear and Differential Attacks Shahram Rasoolzadeh, Zahra Ahmadian, Mahmoud Salmasizadeh, Mohammad Reza Aref
2014/219 (PDF ) Dynamic Searchable Encryption via Blind Storage Muhammad Naveed, Manoj Prabhakaran, Carl A. Gunter
2014/218 (PDF ) A Practical Universal Forgery Attack against PAES-8 Yu Sasaki, Lei Wang
2014/217 (PDF ) A Forgery Attack against PANDA-s Yu Sasaki, Lei Wang
2014/216 (PDF ) Implementation and Improvement of the Partial Sum Attack on 6-round AES Francesco Aldà, Riccardo Aragona, Lorenzo Nicolodi, Massimiliano Sala
2014/215 (PDF ) Attack On the Markov Problem James L. Adams
2014/214 (PDF ) Squaring Algorithms with Delayed Carry Method and Efficient Parallelization Vladislav Kovtun, Andrew Okhrimenko
2014/213 (PDF ) Secret-Sharing for NP Ilan Komargodski, Moni Naor, Eylon Yogev
2014/212 (PDF ) Remarks on the Pocklington and Padró-Sáez Cube Root Algorithm in $\mathbb F_q$ Geon Heo, Seokhwan Choi, Kwang Ho Lee, Namhun Koo, Soonhak Kwon
2014/211 (PDF ) Some Randomness Experiments on TRIVIUM Subhabrata Samajder, Palash Sarkar
2014/210 (PDF ) Structural Cryptanalysis of McEliece Schemes with Compact Keys Jean-Charles Faugère, Ayoub Otmani, Ludovic Perret, Frédéric de Portzamparc, Jean-Pierre Tillich
2014/209 (PDF ) A Little Honesty Goes a Long Way: The Two-Tier Model for Secure Multiparty Computation Juan A. Garay, Ran Gelles, David S. Johnson, Aggelos Kiayias, Moti Yung
2014/208 (PDF ) Offline Dictionary Attack on Password Authentication Schemes using Smart Cards Ding Wang, Ping Wang
2014/207 (PDF ) Expressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear Assumption Katsuyuki Takashima
2014/206 (PDF ) Reconsidering Generic Composition Chanathip Namprempre, Phillip Rogaway, Thomas Shrimpton
2014/205 (PDF ) Unified Oblivious-RAM: Improving Recursive ORAM with Locality and Pseudorandomness Ling Ren, Christopher Fletcher, Xiangyao Yu, Albert Kwon, Marten van Dijk, Srinivas Devadas
2014/204 (PDF ) ChipWhisperer: An Open-Source Platform for Hardware Embedded Security Research Colin O'Flynn, Zhizhang (David) Chen
2014/203 (PDF ) Privacy-Preserving Implicit Authentication Nashad Ahmed Safa, Reihaneh Safavi-Naini, Siamak F. Shahandashti
2014/202 (PDF ) Efficiently Verifiable Computation on Encrypted Data Dario Fiore, Rosario Gennaro, Valerio Pastro
2014/201 (PDF ) From Input Private to Universally Composable Secure Multiparty Computation Primitives Dan Bogdanov, Peeter Laud, Sven Laur, Pille Pullonen
2014/200 (PDF ) Automatic Protocol Selection in Secure Two-Party Computations Florian Kerschbaum, Thomas Schneider, Axel Schröpfer
2014/199 (PDF ) Doubly Spatial Encryption from DBDH Jie Chen, Hoeteck Wee
2014/198 (PDF ) Fast GPGPU-Based Elliptic Curve Scalar Multiplication Eric M. Mahé, Jean-Marie Chauvet
2014/197 (PDF ) Breaking POET Authentication with a Single Query Jian Guo, Jérémy Jean, Thomas Peyrin, Wang Lei
2014/195 (PDF ) Low Overhead Broadcast Encryption from Multilinear Maps Dan Boneh, Brent Waters, Mark Zhandry
2014/194 (PDF ) Cryptanalysis and Security Enhancement of Two Advanced Authentication Protocols Sai Raghu Talluri, Swapnoneel Roy
2014/193 (PDF ) JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH Javad Alizadeh, Mohammad Reza Aref, Nasour Bagheri
2014/192 (PDF ) Two-sources Randomness Extractors for Elliptic Curves Abdoul Aziz Ciss
2014/191 (PDF ) Side-Channel Analysis on Blinded Regular Scalar Multiplications Benoit Feix, Mylène Roussellet, Alexandre Venelli
2014/190 (PDF ) The Temperature Side Channel and Heating Fault Attacks Michael Hutter, Jörn-Marc Schmidt
2014/189 (PDF ) Practical Receipt-Free Sealed-Bid Auction in the Coercive Environment Jaydeep Howlader, Sanjit Kumar Roy, Ashis Kumar Mal
2014/188 (PDF ) A Second Look at Fischlin's Transformation Özgür Dagdelen, Daniele Venturi
2014/187 (PDF ) FFT-Based Key Recovery for the Integral Attack Yosuke Todo
2014/186 (PDF ) AES-Based Authenticated Encryption Modes in Parallel High-Performance Software Andrey Bogdanov, Martin M. Lauridsen, Elmar Tischhauser
2014/185 (PDF ) Oblivious Data Structures Xiao Shaun Wang, Kartik Nayak, Chang Liu, T-H. Hubert Chan, Elaine Shi, Emil Stefanov, Yan Huang
2014/184 (PDF ) SETUP in Secret Sharing Schemes using Random Values Ruxandra F. Olimid
2014/183 (PDF ) Impact of ANSI X9.24-1:2009 Key Check Value on ISO/IEC 9797-1:2011 MACs Tetsu Iwata, Lei Wang
2014/182 (PDF ) Proving the TLS Handshake Secure (as it is) Karthikeyan Bhargavan, Cédric Fournet, Markulf Kohlweiss, Alfredo Pironti, Pierre-Yves Strub, Santiago Zanella-Béguelin
2014/181 (PDF ) A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, Noboru Kunihiro
2014/179 (PDF ) Optimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs Maura B. Paterson, Douglas R. Stinson
2014/178 (PDF ) Verifiable Delegated Set Intersection Operations on Outsourced Encrypted Data Qingji Zheng, Shouhuai Xu
2014/177 (PDF ) Pragmatism vs. Elegance: comparing two approaches to Simple Power Attacks on AES Valentina Banciu, Elisabeth Oswald
2014/175 (PDF ) Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms T. D. B Weerasinghe
2014/174 (PDF ) Analysis of a Modified RC4 Algorithm T. D. B Weerasinghe
2014/173 (PDF ) Continuous Non-malleable Codes Sebastian Faust, Pratyay Mukherjee, Jesper Buus Nielsen, Daniele Venturi
2014/171 (PDF ) An Effective RC4 Stream Cipher T. D. B Weerasinghe
2014/170 (PDF ) Parallelized hashing via j-lanes and j-pointers tree modes, with applications to SHA-256 Shay Gueron
2014/169 (PDF ) Encryption Quality Analysis of the RCBC Block Cipher Compared with RC6 and RC5 Algorithms Abdul Hamid M. Ragab, Osama S. Farag Alla, Amin Y. Noaman
2014/168 (PDF ) Privacy Failures in Encrypted Messaging Services: Apple iMessage and Beyond Scott Coull, Kevin Dyer
2014/167 (PDF ) How to Eat Your Entropy and Have it Too -- Optimal Recovery Strategies for Compromised RNGs Yevgeniy Dodis, Adi Shamir, Noah Stephens-Davidowitz, Daniel Wichs
2014/166 (PDF ) Tuple decoders for traitor tracing schemes Jan-Jaap Oosterwijk, Jeroen Doumen, Thijs Laarhoven
2014/164 (PDF ) Generalized proper matrices and constructing of $m$-resilient Boolean functions with maximal nonlinearity for expanded range of parameters Yuriy Tarannikov
2014/163 (PDF ) Improved Secure Implementation of Code-Based Signature Schemes on Embedded Devices Arnaud Dambra, Philippe Gaborit, Mylène Roussellet, Julien Schrek, Nicolas Tafforeau
2014/162 (PDF ) TOWARD CERTIFICATELESS SIGNCRYPTION SCHEME WITHOUT RANDOM ORACLES Hu Xiong
2014/161 (PDF ) ``Ooh Aah... Just a Little Bit'' : A small amount of side channel can go a long way Naomi Benger, Joop van de Pol, Nigel P. Smart, Yuval Yarom
2014/160 (PDF ) TrueSet: Faster Verifiable Set Computations Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Mahmoud F. Sayed, Elaine Shi, Nikos Triandopoulos
2014/159 (PDF ) Weak-Key Leakage Resilient Cryptography Zuoxia Yu, Qiuliang Xu, Yongbin Zhou, Chengyu Hu, Rupeng Yang, Guangjun Fan
2014/158 (PDF ) Point compression for the trace zero subgroup over a small degree extension field Elisa Gorla, Maike Massierer
2014/157 (PDF ) CLOC: Authenticated Encryption for Short Input Tetsu Iwata, Kazuhiko Minematsu, Jian Guo, Sumio Morioka
2014/156 (PDF ) Non-Malleable Extractors with Shorter Seeds and Their Applications Yanqing Yao, Zhoujun Li
2014/155 (PDF ) Honey Encryption: Security Beyond the Brute-Force Bound Ari Juels, Thomas Ristenpart
2014/153 (PDF ) Verifiable Oblivious Storage Daniel Apon, Jonathan Katz, Elaine Shi, Aishwarya Thiruvengadam
2014/152 (PDF ) A Statistics-based Fundamental Model for Side-channel Attack Analysis Yunsi Fei, A. Adam Ding, Jian Lao, Liwei Zhang
2014/151 (PDF ) Security Analysis of Key-Alternating Feistel Ciphers Rodolphe Lampe, Yannick Seurin
2014/149 (PDF ) Millions of Millionaires: Multiparty Computation in Large Networks Mahdi Zamani, Mahnush Movahedi, Jared Saia
2014/148 (PDF ) Outsourcing Private RAM Computation Craig Gentry, Shai Halevi, Mariana Raykova, Daniel Wichs
2014/147 (PDF ) The Multiple Number Field Sieve for Medium and High Characteristic > Finite Fields Razvan Barbulescu, Cécile Pierrot
2014/146 (PDF ) Untappable communication channels over optical fibers from quantum-optical noise Geraldo A. Barbosa, Jeroen van de Graaf
2014/144 (PDF ) How to Securely Release Unverified Plaintext in Authenticated Encryption Elena Andreeva, Andrey Bogdanov, Atul Luykx, Bart Mennink, Nicky Mouha, Kan Yasuda
2014/143 (PDF ) Statistical Concurrent Non-Malleable Zero Knowledge Claudio Orlandi, Rafail Ostrovsky, Vanishree Rao, Amit Sahai, Ivan Visconti
2014/140 (PDF ) Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack Yuval Yarom, Naomi Benger
2014/139 (PDF ) On the Phase Space of Block-Hiding Strategies Assaf Shomer
2014/138 (PDF ) Short Signatures from Diffie-Hellman, Revisited: Sublinear Public Key, CMA Security, and Tighter Reduction Jae Hong Seo
2014/137 (PDF ) Efficient, Oblivious Data Structures for MPC Marcel Keller, Peter Scholl
2014/136 (PDF ) Isolated Execution on Many-core Architectures Ramya Jayaram Masti, Devendra Rai, Claudio Marforio, Srdjan Capkun
2014/135 (PDF ) Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment Ding Wang, Debiao He, Ping Wang, Chao-Hsien Chu
2014/134 (PDF ) Kummer strikes back: new DH speed records Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, Peter Schwabe
2014/133 (PDF ) Efficient Secure and Verifiable Outsourcing of Matrix Multiplications Yihua Zhang, Marina Blanton
2014/132 (PDF ) Efficient Revocable Identity-Based Encryption via Subset Difference Methods Kwangsu Lee, Dong Hoon Lee, Jong Hwan Park
2014/131 (PDF ) Modelling After-the-fact Leakage for Key Exchange Janaka Alawatugoda, Douglas Stebila, Colin Boyd
2014/130 (PDF ) Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis Joppe W. Bos, Craig Costello, Patrick Longa, Michael Naehrig
2014/129 (PDF ) How to Use Bitcoin to Design Fair Protocols Iddo Bentov, Ranjit Kumaresan
2014/128 (PDF ) Efficient Three-Party Computation from Cut-and-Choose Seung Geol Choi, Jonathan Katz, Alex J. Malozemoff, Vassilis Zikas
2014/127 (PDF ) Algebraic Properties of Modular Addition Modulo a Power of Two S. M. Dehnavi, Alireza Rahimipour
2014/125 (PDF ) Removing Erasures with Explainable Hash Proof Systems Michel Abdalla, Fabrice Benhamouda, David Pointcheval
2014/124 (PDF ) On the Information Ratio of Non-Perfect Secret Sharing Schemes Oriol Farràs, Torben Brandt Hansen, Tarik Kaced, Carles Padró
2014/123 (PDF ) FORSAKES: A Forward-Secure Authenticated Key Exchange Protocol Based on Symmetric Key-Evolving Schemes Mohammad Sadeq Dousti, Rasool Jalili
2014/122 (PDF ) New Way to Construct Cryptographic Hash Function WANG Yong
2014/121 (PDF ) Oblivious Radix Sort: An Efficient Sorting Algorithm for Practical Secure Multi-party Computation Koki Hamada, Dai Ikarashi, Koji Chida, Katsumi Takahashi
2014/120 (PDF ) Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model (full version) Weijin Wang, Yu Qin, Dengguo Feng, Xiaobo Chu
2014/119 (PDF ) Breaking `128-bit Secure' Supersingular Binary Curves (or how to solve discrete logarithms in ${\mathbb F}_{2^{4 \cdot 1223}}$ and ${\mathbb F}_{2^{12 \cdot 367}}$) Robert Granger, Thorsten Kleinjung, Jens Zumbrägel
2014/118 (PDF ) Quantum position verification in the random oracle model Dominique Unruh
2014/117 (PDF ) An Applicable Public-Key-Cryptosystem Based on NP-Complete Problems Bjoern Grohmann
2014/116 (PDF ) Optimal Algebraic Manipulation Detection Codes in the Constant-Error Model Ronald Cramer, Carles Padrö, Chaoping Xing
2014/115 (PDF ) Comments on a novel user authentication and key agreement scheme Jia-Lun Tsai
2014/114 (PDF ) Prover Anonymous and Deniable Distance-Bounding Authentication Sebastien Gambs, Cristina Onete, Jean-Marc Robert
2014/113 (PDF ) Secure Compression: Theory \& Practice James Kelley, Roberto Tamassia
2014/112 (PDF ) Polynomial Time Attack on Wild McEliece Over Quadratic Extensions Alain Couvreur, Ayoub Otmani, Jean-Pierre Tillich
2014/111 (PDF ) A Note on the CLRW2 Tweakable Block Cipher Construction Gordon Procter
2014/110 (PDF ) Halka: A Lightweight, Software Friendly Block Cipher Using Ultra-lightweight 8-bit S-box Sourav Das
2014/109 (PDF ) Diffusion Programmable Device : The device to prevent reverse engineering Mitsuru Shiozaki, Ryohei Hori, Takeshi Fujino
2014/108 (PDF ) MJH: A Faster Alternative to MDC-2 Jooyoung Lee, Martijn Stam
2014/107 (PDF ) Key-Indistinguishable Message Authentication Codes Joel Alwen, Martin Hirt, Ueli Maurer, Arpita Patra, Pavel Raykov
2014/106 (PDF ) Algorithms in HElib Shai Halevi, Victor Shoup
2014/105 (PDF ) Reducing the Overhead of MPC over a Large Population Ashish Choudhury, Arpita Patra, Nigel P. Smart
2014/104 (PDF ) Space-efficient, byte-wise incremental and perfectly private encryption schemes Kévin Atighehchi
2014/103 (PDF ) SHipher: Families of Block Ciphers based on SubSet-Sum Problem Xiali Hei, Binheng Song
2014/102 (PDF ) Actively Secure Private Function Evaluation Payman Mohassel, Saeed Sadeghian, Nigel P. Smart
2014/101 (PDF ) Dishonest Majority Multi-Party Computation for Binary Circuits Enrique Larraia, Emmanuela Orsini, Nigel P. Smart
2014/100 (PDF ) Improved Slender-set Linear Cryptanalysis Guo-Qiang Liu, Chen-Hui Jin, Chuan-Da Qi
2014/099 (PDF ) Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources Chris Brzuska, Pooya Farshim, Arno Mittelbach
2014/098 (PDF ) Towards Characterizing Complete Fairness in Secure Two-Party Computation Gilad Asharov
2014/097 (PDF ) Towards Constructing Fully Homomorphic Encryption without Ciphertext Noise from Group Theory Koji Nuida
2014/096 (PDF ) Tight security bounds for multiple encryption Yuanxi Dai, John Steinberger
2014/095 (PDF ) Unified, Minimal and Selectively Randomizable Structure-Preserving Signatures Masayuki Abe, Jens Groth, Miyako Ohkubo, Mehdi Tibouchi
2014/094 (PDF ) Faster Bootstrapping with Polynomial Error Jacob Alperin-Sheriff, Chris Peikert
2014/093 (PDF ) The Related-Key Analysis of Feistel Constructions Manuel Barbosa, Pooya Farshim
2014/092 (PDF ) A new class of system oriented PKC, K(I)SOPKC. Masao KASAHARA
2014/091 (PDF ) On Cryptographic Applications of Matrices Acting on Finite Commutative Groups and Rings S. M. Dehnavi, A. Mahmoodi Rishakani, M. R. Mirzaee Shamsabad
2014/090 (PDF ) Cryptanalysis of KLEIN (Full version) Virginie Lallemand, María Naya-Plasencia
2014/089 (PDF ) Multiple Differential Cryptanalysis of Round-Reduced PRINCE (Full version) Anne Canteaut, Thomas Fuhr, Henri Gilbert, María Naya-Plasencia, Jean-René Reinhard
2014/088 (PDF ) A Bound For Multiparty Secret Key Agreement And Implications For A Problem Of Secure Computing Himanshu Tyagi, Shun Watanabe
2014/087 (PDF ) AnoA: A Framework For Analyzing Anonymous Communication Protocols Michael Backes, Aniket Kate, Praveen Manoharan, Sebastian Meiser, Esfandiar Mohammadi
2014/086 (PDF ) Randomized and Efficient Authentication in Mobile Environments Wei Jiang, Dan Lin, Feng Li, Elisa Bertino
2014/085 (PDF ) Multipermutations in Crypto World: Different Faces of the Perfect Diffusion Layer Aleksandra Mileva
2014/084 (PDF ) RECTANGLE: A Bit-slice Lightweight Block Cipher Suitable for Multiple Platforms Wentao Zhang, Zhenzhen Bao, Dongdai Lin, Vincent Rijmen, Bohan Yang, Ingrid Verbauwhede
2014/083 (PDF ) Garbled RAM Revisited, Part II Steve Lu, Rafail Ostrovsky
2014/082 (PDF ) Garbled RAM Revisited, Part I Craig Gentry, Shai Halevi, Mariana Raykova, Daniel Wichs
2014/081 (PDF ) Efficient Round Optimal Blind Signatures Sanjam Garg, Divya Gupta
2014/080 (PDF ) A Full Characterization of Completeness for Two-party Randomized Function Evaluation Daniel Kraschewski, Hemanta K. Maji, Manoj Prabhakaran, Amit Sahai
2014/079 (PDF ) Unifying Leakage Models: from Probing Attacks to Noisy Leakage Alexandre Duc, Stefan Dziembowski, Sebastian Faust
2014/078 (PDF ) Implementation and Comparison of Lattice-based Identification Protocols on Smart Cards and Microcontrollers Ahmad Boorghany, Rasool Jalili
2014/077 (PDF ) Mixcoin: Anonymity for Bitcoin with accountable mixes Joseph Bonneau, Arvind Narayanan, Andrew Miller, Jeremy Clark, Joshua A. Kroll, Edward W. Felten
2014/076 (PDF ) Certified Bitcoins Giuseppe Ateniese, Antonio Faonio, Bernardo Magri, Breno de Medeiros
2014/075 (PDF ) Publicly Auditable Secure Multi-Party Computation Carsten Baum, Ivan Damgård, Claudio Orlandi
2014/074 (PDF ) New and Improved Key-Homomorphic Pseudorandom Functions Abhishek Banerjee, Chris Peikert
2014/073 (PDF ) Anonymous Authentication with Shared Secrets Joel Alwen, Martin Hirt, Ueli Maurer, Arpita Patra, Pavel Raykov
2014/072 (PDF ) Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM Nikolaos P. Karvelas, Andreas Peter, Stefan Katzenbeisser, Sebastian Biedermann
2014/071 (PDF ) Implementing Pairing-Based Cryptosystems in USB Tokens Zhaohui Cheng
2014/070 (PDF ) Lattice Cryptography for the Internet Chris Peikert
2014/069 (PDF ) One-Pass Authenticated Key Establishment Protocol on Bilinear Pairings for Wireless Sensor Networks Manoj Ranjan Mishra, Jayaprakash Kar, Banshidhar Majhi
2014/068 (PDF ) Some security bounds for the DGHV scheme Franca Marinelli, Riccardo Aragona, Chiara Marcolla, Massimiliano Sala
2014/067 (PDF ) Efficient and Strongly Secure Dynamic Domain-Specific Pseudonymous Signatures for ID Documents Julien Bringer, Hervé Chabanne, Roch Lescuyer, Alain Patey
2014/066 (PDF ) A Subexponential Construction of Graph Coloring for Multiparty Computation Hassan Jameel Asghar, Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld
2014/065 (PDF ) Fine Tuning the Function Field Sieve Algorithm for the Medium Prime Case Palash Sarkar, Shashank Singh
2014/064 (PDF ) A Polynomial Time Attack against Algebraic Geometry Code Based Public Key Cryptosystems Alain Couvreur, Irene Márquez-Corbella, Ruud Pellikaan
2014/063 (PDF ) Cryptanalysis on “Secure untraceable off-line electronic cash system” Yalin Chen, Jue-Sam Chou
2014/062 (PDF ) A Comparison of the Homomorphic Encryption Schemes FV and YASHE Tancrède Lepoint, Michael Naehrig
2014/061 (PDF ) Bounded-Collusion Identity-Based Encryption from Semantically-Secure Public-Key Encryption: Generic Constructions with Short Ciphertexts Stefano Tessaro, David A. Wilson
2014/060 (PDF ) Verifiable Computation in Multiparty Protocols with Honest Majority Peeter Laud, Alisa Pankova
2014/059 (PDF ) Cuckoo Cycle: a memory bound graph-theoretic proof-of-work John Tromp
2014/058 (PDF ) Cryptanalysis of FIDES Itai Dinur, Jérémy Jean
2014/057 (PDF ) Computing Discrete Logarithms in F_{3^{6*137}} and F_{3^{6*163}} using Magma Gora Adj, Alfred Menezes, Thomaz Oliveira, Francisco Rodríguez-Henríquez
2014/056 (PDF ) Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128 Sareh Emami, San Ling, Ivica Nikolic, Josef Pieprzyk, Huaxiong Wang
2014/055 (PDF ) Security Enhanced Anonymous Multi-Server Authenticated Key Agreement Scheme using Smart Card and Biometrics Younsung Choi
2014/054 (PDF ) The Fourier Entropy-Influence conjecture holds for a log-density 1 class of cryptographic Boolean functions Sugata Gangopadhyay, Pantelimon Stanica
2014/053 (PDF ) Masking and Leakage-Resilient Primitives: One, the Other(s) or Both? Sonia Belaïd, Vincent Grosso, François-Xavier Standaert
2014/052 (PDF ) DAA-related APIs in TPM2.0 Revisited Li Xi
2014/051 (PDF ) An Equivalence-Preserving Transformation of Shift Registers Elena Dubrova
2014/050 (PDF ) Some Theoretical Conditions for Menezes--Qu--Vanstone Key Agreement to Provide Implicit Key Authentication Daniel R. L. Brown
2014/049 (PDF ) Data Security in Cloud Architecture Based on Diffie Hellman and Elliptical Curve Cryptography Neha tirthani, Ganesan R
2014/048 (PDF ) When a Boolean Function can be Expressed as the Sum of two Bent Functions Longjiang Qu, Shaojing Fu, Qingping Dai, Chao Li
2014/047 (PDF ) Down the Rabbit Hole: Revisiting the Shrinking Method Vivien Dubois
2014/046 (PDF ) Crypto-analyses on “user efficient recoverable off-line e-cashs scheme with fast anonymity revoking” Yalin Chen, Jue-Sam Chou
2014/045 (PDF ) Human Assisted Randomness Generation Using Video Games Mohsen Alimomeni, Reihaneh Safavi-Naini
2014/044 (PDF ) rPIR: Ramp Secret Sharing based Communication Efficient Private Information Retrieval Lichun Li, Michael Militzer, Anwitaman Datta
2014/043 (PDF ) Elligator Squared: Uniform Points on Elliptic Curves of Prime Order as Uniform Random Strings Mehdi Tibouchi
2014/042 (PDF ) A New Algorithm for Solving the General Approximate Common Divisors Problem and Cryptanalysis of the FHE Based on the GACD problem Jintai Ding, Chengdong Tao
2014/041 (PDF ) Cryptanalysis via algebraic spans Adi Ben-Zvi, Arkadius Kalka, Boaz Tsaban
2014/040 (PDF ) A Fast Modular Reduction Method Zhengjun Cao, Ruizhong Wei, Xiaodong Lin
2014/039 (PDF ) Homomorphic AES Evaluation using NTRU Yarkin Doroz, Yin Hu, Berk Sunar
2014/038 (PDF ) Extending and Applying a Framework for the Cryptographic Verification of Java Programs. Ralf Kuesters, Enrico Scapin, Tomasz Truderung, Juergen Graf
2014/037 (PDF ) On the Security of the Pre-Shared Key Ciphersuites of TLS Yong Li, Sven Schäge, Zheng Yang, Florian Kohlar, Jörg Schwenk
2014/036 (PDF ) A Secure Text Messaging Protocol Gary Belvin
2014/035 (PDF ) A new attack on RSA with a composed decryption exponent Abderrahmane Nitaj, Mohamed Ould Douh
2014/034 (PDF ) Authenticated Encryption with SPECK Chase Manny
2014/033 (PDF ) Lattice-based Group Signature Scheme with Verier-local Revocation Adeline Langlois, San Ling, Khoa Nguyen, Huaxiong Wang
2014/032 (PDF ) Scale-Invariant Fully Homomorphic Encryption over the Integers Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi
2014/031 (PDF ) On the Design of LIL Tests for (Pseudo) Random Generators and Some Experimental Results Yongge Wang
2014/030 (PDF ) Lyra: Password-Based Key Derivation with Tunable Memory and Processing Costs Leonardo C. Almeida, Ewerton R. Andrade, Paulo S. L. M. Barreto, Marcos A. Simplicio Jr.
2014/029 (PDF ) General Impossibility of Group Homomorphic Encryption in the Quantum World Frederik Armknecht, Tommaso Gagliardoni, Stefan Katzenbeisser, Andreas Peter
2014/028 (PDF ) Channel Equalization for Side Channel Attacks Colin O'Flynn, Zhizhang (David) Chen
2014/027 (PDF ) Twisting Edwards curves with isogenies Mike Hamburg
2014/026 (PDF ) Studying Potential Side Channel Leakages on an Embedded Biometric Comparison System Maël Berthier, Yves Bocktaels, Julien Bringer, Hervé Chabanne, Taoufik Chouta, Jean-Luc Danger, Mélanie Favre, Tarik Graba
2014/025 (PDF ) Side-Channel Leakage through Static Power – Should We Care about in Practice? – Amir Moradi
2014/024 (PDF ) An Efficient Pseudo-Random Generator with Applications to Public-Key Encryption and Constant-Round Multiparty Computation Ivan Damgård, Jesper Buus Nielsen
2014/023 (PDF ) Solving Random Subset Sum Problem by $l_{p}$-norm SVP Oracle Gengran Hu, Yanbin Pan, Feng Zhang
2014/022 (PDF ) Ultra-lightweight 8-bit Multiplicative Inverse Based S-box Using LFSR Sourav Das
2014/021 (PDF ) Online/Offline Attribute-Based Encryption Susan Hohenberger, Brent Waters
2014/020 (PDF ) (De-)Constructing TLS Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Bjoern Tackmann, Daniele Venturi
2014/019 (PDF ) Lazy Modulus Switching for the BKW Algorithm on LWE Martin R. Albrecht, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret
2014/018 (PDF ) Completeness for Symmetric Two-Party Functionalities - Revisited Yehuda Lindell, Eran Omri, Hila Zarosim
2014/016 (PDF ) Triple and Quadruple Encryption: Bridging the Gaps Bart Mennink, Bart Preneel
2014/015 (PDF ) Tight Security Bounds for Triple Encryption Jooyoung Lee
2014/014 (PDF ) Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes Felix Günther, Bertram Poettering
2014/012 (PDF ) Maximal Information Coefficient Analysis Yanis Linge, Cecile Dumas, Sophie Lambert-Lacroix
2014/011 (PDF ) Construction of New Families of MDS Diffusion Layers S. M. Dehnavi, A. Mahmoodi Rishakani, M. R. Mirzaee Shamsabad, Hamidreza Maimani, Einollah Pasha
2014/010 (PDF ) A Certificate-Based Proxy Signature with Message Recovery without Bilinear Pairing Ali Mahmoodi, Javad Mohajeri, Mahmoud Salmasizadeh
2014/009 (PDF ) Characterization of EME with Linear Mixing Nilanjan Datta, Mridul Nandi
2014/008 (PDF ) A Theoretical Study of Kolmogorov-Smirnov Distinguishers, Side-Channel Analysis vs. Differential Cryptanalysis Annelie Heuser, Olivier Rioul, Sylvain Guilley
2014/007 (PDF ) One Weird Trick to Stop Selfish Miners: Fresh Bitcoins, A Solution for the Honest Miner. Ethan Heilman
2014/006 (PDF ) Efficient Non-Interactive Zero Knowledge Arguments for Set Operations Prastudy Fauzi, Helger Lipmaa, Bingsheng Zhang
2014/004 (PDF ) MaxMinMax problem and sparse equations over finite fields Igor Semaev
2014/003 (PDF ) $GF(2^n)$ Bit-Parallel Squarer Using Generalized Polynomial Basis For a New Class of Irreducible Pentanomials Xi Xiong, Haining Fan
2014/002 (PDF ) Pseudorandom Generator Based on Hard Lattice Problem Kuan Cheng
2014/001 (PDF ) Comments on: EIBAS - an efficient identity broadcast authentication scheme in wireless sensor networks Yalin Chen, Jue-Sam Chou
2013/882 (PDF ) New Speed Records for Montgomery Modular Multiplication on 8-bit AVR Microcontrollers Zhe Liu, Johann Großschädl
2013/881 (PDF ) Accelerating Bitcoin's Transaction Processing. Fast Money Grows on Trees, Not Chains Yonatan Sompolinsky, Aviv Zohar
2013/880 (PDF ) New Constructions of Revocable Identity-Based Encryption from Multilinear Maps Seunghwan Park, Kwangsu Lee, Dong Hoon Lee
2013/879 (PDF ) Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza
2013/878 (PDF ) Efficient Hardware Implementation of MQ Asymmetric Cipher PMI+ on FPGAs Shaohua Tang, Bo Lv, Guomin Chen, Zhiniang Peng
2013/877 (PDF ) MQ Signature and Proxy Signature Schemes with Exact Security Based on UOV Signature Shaohua Tang, Jiahui Chen, Lingling Xu, Xiaoyu Li
2013/876 (PDF ) Public-Key Encryption with Lazy Parties Kenji Yasunaga
2013/875 (PDF ) Policy-Based Non-interactive Outsourcing of Computation using multikey FHE and CP-ABE Michael Clear, Ciaran McGoldrick
2013/874 (PDF ) General Constructions of Rational Secret Sharing with Expected Constant-Round Reconstruction Akinori Kawachi, Yoshio Okamoto, Keisuke Tanaka, Kenji Yasunaga
2013/873 (PDF ) Poly-Many Hardcore Bits for Any One-Way Function and a Framework for Differing-Inputs Obfuscation Mihir Bellare, Igors Stepanovs, Stefano Tessaro
2013/871 (PDF ) A Unified Security Model of Authenticated Key Exchange with Specific Adversarial Capabilities Weiqiang Wen, Libin Wang, Jiaxin Pan
2013/870 (PDF ) A new class of hyper-bent functions and Kloosterman sums Chunming Tang, Yanfeng Qi
2013/869 (PDF ) How to Fake Auxiliary Input Dimitar Jetchev, Krzysztof Pietrzak
2013/868 (PDF ) Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft) Lear Bahack
2013/867 (PDF ) LHash: A Lightweight Hash Function (Full Version) Wenling Wu, Shuang Wu, Lei Zhang, Jian Zou, Le Dong
2013/866 (PDF ) Compact Ring-LWE based Cryptoprocessor Sujoy Sinha Roy, Frederik Vercauteren, Nele Mentens, Donald Donglong Chen, Ingrid Verbauwhede
2013/865 (PDF ) SNR to Success Rate: Reaching the Limit of Non-Profiling DPA Suvadeep Hajra, Debdeep Mukhopadhyay
2013/864 (PDF ) Near-linear time, Leakage-resilient Key Evolution Schemes from Expander Graphs Adam Smith, Ye Zhang
2013/863 (PDF ) Formal Treatment of Distributed Trust in Electronic Voting Stephan Neumann, Melanie Volkamer
2013/862 (PDF ) How to Delegate Computations: The Power of No-Signaling Proofs Yael Tauman Kalai, Ran Raz, Ron D. Rothblum
2013/861 (PDF ) Privacy Preserving Enforcement of Sensitive Policies in Outsourced and Distributed Environments Muhammad Rizwan Asghar
2013/860 (PDF ) On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input Sanjam Garg, Craig Gentry, Shai Halevi, Daniel Wichs
2013/859 (PDF ) Using the Joint Distributions of a Cryptographic Function in Side Channel Analysis Yanis Linge, Cecile Dumas, Sophie Lambert-Lacroix
2013/858 (PDF ) Practical Dual-Receiver Encryption---Soundness, Complete Non-Malleability, and Applications Sherman S. M. Chow, Matthew Franklin, Haibin Zhang
2013/857 (PDF ) RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis Daniel Genkin, Adi Shamir, Eran Tromer
2013/856 (PDF ) Tightly-Secure Signatures From Lossy Identification Schemes Michel Abdalla, Pierre-Alain Fouque, Vadim Lyubashevsky, Mehdi Tibouchi
2013/855 (PDF ) Weaknesses in a Recently Proposed RFID Authentication Protocol Mete Akgün, M. Ufuk Çaǧlayan
2013/854 (PDF ) Multiple-Use Transferable E-Cash Pratik Sarkar
2013/853 (PDF ) Automatic Search for Differential Trails in ARX Ciphers (Extended Version) Alex Biryukov, Vesselin Velichkov
2013/852 (PDF ) Improved Boomerang Attacks on Round-Reduced SM3 and BLAKE-256 Dongxia Bai, Hongbo Yu, Gaoli Wang, Xiaoyun Wang
2013/851 (PDF ) Power and Timing Side Channels for PUFs and their Efficient Exploitation Ulrich Rührmair, Xiaolin Xu, Jan Sölter, Ahmed Mahmoud, Farinaz Koushanfar, Wayne Burleson
2013/850 (PDF ) Secure Floating-Point Arithmetic and Private Satellite Collision Analysis Liina Kamm, Jan Willemson
2013/849 (PDF ) Pushing the Limit of Non-Profiling DPA using Multivariate Leakage Model Suvadeep Hajra, Debdeep Mukhopadhyay
2013/848 (PDF ) Weakness of Several Identity-based Tripartite Authenticated Key Agreement Protocols Xi-Jun Lin, Lin Sun
2013/845 (PDF ) How to Keep a Secret: Leakage Deterring Public-key Cryptography Aggelos Kiayias, Qiang Tang
2013/844 (PDF ) A generic view on trace-and-revoke broadcast encryption schemes Dennis Hofheinz, Christoph Striecks
2013/843 (PDF ) A Study of Goldbach's conjecture and Polignac's conjecture equivalence issues Jian Ye, Chenglian Liu
2013/842 (PDF ) Detecting Hidden Leakages Amir Moradi, Sylvain Guilley, Annelie Heuser
2013/841 (PDF ) Trust Views for the Web PKI Johannes Braun, Florian Volk, Johannes Buchmann, Max Mühlhäuser
2013/840 (PDF ) (Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens Seung Geol Choi, Jonathan Katz, Dominique Schröder, Arkady Yerukhimovich, Hong Sheng Zhou
2013/839 (PDF ) Lattice Decoding Attacks on Binary LWE Shi Bai, Steven D. Galbraith
2013/838 (PDF ) An improved compression technique for signatures based on learning with errors Shi Bai, Steven D. Galbraith
2013/837 (PDF ) Fair Two-Party Computations via Bitcoin Deposits Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Łukasz Mazurek
2013/836 (PDF ) Identity-Based Key-Encapsulation Mechanism from Multilinear Maps Hao Wang, Lei Wu, Zhihua Zheng, Yilei Wang
2013/835 (PDF ) A Modular Framework for Building Variable-Input Length Tweakable Ciphers Thomas Shrimpton, R. Seth Terashima
2013/834 (PDF ) Keyless Signatures' Infrastructure: How to Build Global Distributed Hash-Trees Ahto Buldas, Andres Kroonmaa, Risto Laanoja
2013/833 (PDF ) Verifier-Based Password-Authenticated Key Exchange: New Models and Constructions Fabrice Benhamouda, David Pointcheval
2013/832 (PDF ) Practical Dynamic Searchable Encryption with Small Leakage Emil Stefanov, Charalampos Papamanthou, Elaine Shi
2013/831 (PDF ) Provable Security Proofs and their Interpretation in the Real World Vikram Singh
2013/830 (PDF ) Property Preserving Symmetric Encryption Revisited Sanjit Chatterjee, M. Prem Laxman Das
2013/829 (PDF ) Is Bitcoin a Decentralized Currency? Arthur Gervais, Ghassan Karame, Srdjan Capkun, Vedran Capkun
2013/828 (PDF ) Decentralized Traceable Attribute-Based Signatures Ali El Kaafarani, Essam Ghadafi, Dalia Khader
2013/827 (PDF ) Lower Bounds in the Hardware Token Model Shashank Agrawal, Prabhanjan Ananth, Vipul Goyal, Manoj Prabhakaran, Alon Rosen
2013/826 (PDF ) Secure multi-party data analysis: end user validation and practical experiments Dan Bogdanov, Liina Kamm, Sven Laur, Pille Pruulmann-Vengerfeldt
2013/824 (PDF ) Fair and Efficient Secure Multiparty Computation with Reputation Systems Gilad Asharov, Yehuda Lindell, Hila Zarosim
2013/823 (PDF ) Another Look at XCB Debrup Chakraborty, Vicente Hernandez-Jimenez, Palash Sarkar
2013/822 (PDF ) Leakage Resilient Fully Homomorphic Encryption Alexandra Berkoff, Feng-Hao Liu
2013/819 (PDF ) Safe enclosures: towards cryptographic techniques for server protection Sergiu Bursuc, Julian P. Murphy
2013/818 (PDF ) On the Relation of Random Grid, Probabilistic and Deterministic Visual Cryptography Roberto De Prisco, Alfredo De Santis
2013/817 (PDF ) Interactive Encryption and Message Authentication Yevgeniy Dodis, Dario Fiore
2013/816 (PDF ) Fast Prime Field Elliptic Curve Cryptography with 256 Bit Primes Shay Gueron, Vlad Krasnov
2013/815 (PDF ) Iterated group products and leakage resilience against NC^1 Eric Miles
2013/814 (PDF ) RDAS: A Symmetric Key Scheme for Authenticated Query Processing in Outsourced Databases Lil Maria Rodriguez-Henriquez, Debrup Chakraborty
2013/813 (PDF ) Multi-ciphersuite security of the Secure Shell (SSH) protocol Florian Bergsma, Benjamin Dowling, Florian Kohlar, Jörg Schwenk, Douglas Stebila
2013/812 (PDF ) A Note on Bilinear Groups of a Large Composite Order Zhengjun Cao, Lihua Liu
2013/811 (PDF ) Constant-Round Black-Box Construction of Composable Multi-Party Computation Protocol Susumu Kiyoshima, Yoshifumi Manabe, Tatsuaki Okamoto
2013/810 (PDF ) Formal Analysis of CRT-RSA Vigilant's Countermeasure Against the BellCoRe Attack Pablo Rauzy, Sylvain Guilley
2013/809 (PDF ) Riding the Saddle Point: asymptotics of the capacity-achieving simple decoder for bias-based traitor tracing Sarah Ibrahimi, Boris Skoric, Jan-Jaap Oosterwijk
2013/808 (PDF ) Secrecy without Perfect Randomness: Cryptography with (Bounded) Weak Sources Michael Backes, Aniket Kate, Sebastian Meiser, Tim Ruffing
2013/807 (PDF ) Distributed Key Generation for Secure Encrypted Deduplication Yitao Duan
2013/806 (PDF ) Efficient (Anonymous) Compact HIBE From Standard Assumptions Somindu C. Ramanna, Palash Sarkar
2013/805 (PDF ) Proofs of Space: When Space is of the Essence Giuseppe Ateniese, Ilario Bonacina, Antonio Faonio, Nicola Galesi
2013/804 (PDF ) Group Signature with relaxed-privacy and revocability for VANET Mohammad Saiful Islam Mamun, Atsuko Miyaji
2013/803 (PDF ) Fully, (Almost) Tightly Secure IBE from Standard Assumptions Jie Chen, Hoeteck Wee
2013/802 (PDF ) Cryptosystems Resilient to Both Continual Key Leakages and Leakages from Hash Functions Guangjun Fan, Yongbin Zhou, Chengyu Hu, Dengguo Feng
2013/801 (PDF ) Authenticating Computation on Groups: New Homomorphic Primitives and Applications Dario Catalano, Antonio Marcedone, Orazio Puglisi
2013/800 (PDF ) Algebraic Properties of the Cube Attack Frank-M. Quedenfeld, Christopher Wolf
2013/799 (PDF ) New Insight into the Isomorphism of Polynomials problem IP1S and its Use in Cryptography Gilles Macario-Rat, Jérôme Plût, Henri Gilbert
2013/797 (PDF ) Tamper Resilient Circuits: The Adversary at the Gates Aggelos Kiayias, Yiannis Tselekounis
2013/796 (PDF ) Proofs of Space Stefan Dziembowski, Sebastian Faust, Vladimir Kolmogorov, Krzysztof Pietrzak
2013/795 (PDF ) Insecurity of An Anonymous Authentication For Privacy-preserving IoT Target-driven Applications Xi-Jun Lin, Lin Sun
2013/794 (PDF ) Behind the Scene of Side Channel Attacks Victor Lomné, Emmanuel Prouff, Thomas Roche
2013/793 (PDF ) A fast integer-based batch full-homomorphic encryption scheme over finite field Long Zhang, Qiuling Yue
2013/792 (PDF ) Improved Authenticity Bound of EAX, and Refinements Kazuhiko Minematsu, Stefan Lucks, Tetsu Iwata
2013/791 (PDF ) APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography Elena Andreeva, Begül Bilgin, Andrey Bogdanov, Atul Luykx, Bart Mennink, Nicky Mouha, Kan Yasuda
2013/790 (PDF ) Parallelizable and Authenticated Online Ciphers Elena Andreeva, Andrey Bogdanov, Atul Luykx, Bart Mennink, Elmar Tischhauser, Kan Yasuda
2013/789 (PDF ) Proofs of Data Possession and Retrievability Based on MRD Codes Shuai Han, Shengli Liu, Kefei Chen, Dawu Gu
2013/788 (PDF ) Improvement of Lin-Tzeng Solution to Yao's Millionaires Problem and Its Cheating Advantage Analysis Zhengjun Cao, Lihua Liu
2013/787 (PDF ) Wide-weak Privacy Preserving RFID Mutual Authentication Protocol Raghuvir Songhela, Manik Lal Das
2013/786 (PDF ) Tree Based Symmetric Key Broadcast Encryption Sanjay Bhattacherjee, Palash Sarkar
2013/785 (PDF ) Efficient Leakage-Resilient Signature Schemes in the Generic Bilinear Group Model Fei Tang, Hongda Li, Qihua Niu, Bei Liang
2013/784 (PDF ) Secure Multiparty Computations on Bitcoin Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Łukasz Mazurek
2013/783 (PDF ) ECC-Based Non-Interactive Deniable Authentication with Designated Verifier Yalin Chen, Jue-Sam Chou
2013/782 (PDF ) How Did Dread Pirate Roberts Acquire and Protect His Bitcoin Wealth? Dorit Ron, Adi Shamir
2013/781 (PDF ) Indistinguishability Obfuscation from Semantically-Secure Multilinear Encodings Rafael Pass, Karn Seth, Sidharth Telang
2013/780 (PDF ) A Distinguish attack on Rabbit Stream Cipher Based on Multiple Cube Tester Nasser Ramazani Darmian
2013/779 (PDF ) Distributed Group Authentication for RFID Supply Management Mike Burmester, Jorge Munilla
2013/778 (PDF ) Multi-Stage Fault Attacks on Block Ciphers Philipp Jovanovic, Martin Kreuzer, Ilia Polian
2013/777 (PDF ) Construction of Multiplicative Monotone Span Program Yuenai Chen, Chunming Tang
2013/776 (PDF ) Location Leakage in Distance Bounding: Why Location Privacy does not Work Aikaterini Mitrokotsa, Cristina Onete, Serge Vaudenay
2013/775 (PDF ) Differential Cryptanalysis and Linear Distinguisher of Full-Round Zorro Yanfeng Wang, Wenling Wu, Zhiyuan Guo, Xiaoli Yu
2013/774 (PDF ) Multi-Input Functional Encryption S. Dov Gordon, Jonathan Katz, Feng-Hao Liu, Elaine Shi, Hong-Sheng Zhou
2013/773 (PDF ) CBEAM: Efficient Authenticated Encryption from Feebly One-Way $\phi$ Functions Markku-Juhani O. Saarinen
2013/772 (PDF ) Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation Markku-Juhani O. Saarinen
2013/771 (PDF ) TOT, a Fast Multivariate Public Key Cryptosystem with Basic Secure Trapdoor Wuqiang Shen, Shaohua Tang
2013/770 (PDF ) Efficient Template Attacks Omar Choudary, Markus G. Kuhn
2013/769 (PDF ) Broadcast Amplification Martin Hirt, Ueli Maurer, Pavel Raykov
2013/768 (PDF ) VMPC-R Cryptographically Secure Pseudo-Random Number Generator Alternative to RC4 Bartosz Zoltak
2013/767 (PDF ) Misuse Resistant Parallel Authenticated Encryptions Nilanjan Datta, Mridul Nandi
2013/766 (PDF ) RankSign : an efficient signature algorithm based on the rank metric P. Gaborit, O. Ruatta, J. Schrek, G. Zémor
2013/765 (PDF ) Kurosawa-Desmedt Key Encapsulation Mechanism, Revisited and More Kaoru Kurosawa, Le Trieu Phong
2013/764 (PDF ) Dynamic Countermeasure Against the Zero Power Analysis Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, Cédric Murdica, David Naccache
2013/763 (PDF ) Predicate- and Attribute-Hiding Inner Product Encryption in a Public Key Setting Yutaka Kawai, Katsuyuki Takashima
2013/762 (PDF ) Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency Kwangsu Lee, Seung Geol Choi, Dong Hoon Lee, Jong Hwan Park, Moti Yung
2013/761 (PDF ) Multi-user collisions: Applications to Discrete Logarithm, Even-Mansour and PRINCE Pierre-Alain Fouque, Antoine Joux, Chrysanthi Mavromati
2013/760 (PDF ) On cross joining de Bruijn sequences Johannes Mykkeltveit, Janusz Szmidt
2013/759 (PDF ) Vectorization of ChaCha Stream Cipher Martin Goll, Shay Gueron
2013/758 (PDF ) A Revocable Online-Offline Certificateless Signature Scheme without Pairing Karthik Abinav, Saikrishna Badrinarayanan, C. Pandu Rangan, S. Sharmila Deva Selvi, S. Sree Vivek, Vivek Krishna Pradhan
2013/757 (PDF ) Practical Signatures from the Partial Fourier Recovery Problem Jeff Hoffstein, Jill Pipher, John Schanck, Joseph H. Silverman, William Whyte
2013/756 (PDF ) A Meet-in-the-Middle Attack on Round-Reduced mCrypton Using the Differential Enumeration Technique Yonglin Hao, Dongxia Bai, Leibo Li
2013/754 (PDF ) Obfuscation-based Non-black-box Simulation and Four Message Concurrent Zero Knowledge for NP Omkant Pandey, Manoj Prabhakaran, Amit Sahai
2013/753 (PDF ) Dietary Recommendations for Lightweight Block Ciphers: Power, Energy and Area Analysis of Recently Developed Architectures Lejla Batina, Amitabh Das, Baris Ege, Elif Bilge Kavun, Nele Mentens, Christof Paar, Ingrid Verbauwhede, Tolga Yalcin
2013/752 (PDF ) On the Power of Rewinding Simulators in Functional Encryption Angelo De Caro, Vincenzo Iovino
2013/751 (PDF ) Using Hamiltonian Totems as Passwords Hervé Chabanne, Jean-Michel Cioranesco, Vincent Despiegel, Jean-Christophe Fondeur, David Naccache
2013/750 (PDF ) Fully Deniable Mutual Authentication Protocol Based on RSA Signature Xi-Jun Lin, Lin Sun
2013/749 (PDF ) Efficient CCA-secure Threshold Public-Key Encryption Scheme Xi-Jun Lin, Lin Sun
2013/748 (PDF ) Plaintext Recovery Attacks Against WPA/TKIP Kenneth G. Paterson, Bertram Poettering, Jacob C. N. Schuldt
2013/747 (PDF ) Authenticated Multiple Key Establishment Protocol for Wireless Sensor Networks Jayaprakash Kar
2013/746 (PDF ) Asymptotically Efficient Lattice-Based Digital Signatures Vadim Lyubashevsky, Daniele Micciancio
2013/745 (PDF ) Asynchronous MPC with a Strict Honest Majority Using Non-equivocation Michael Backes, Fabian Bendun, Ashish Choudhury, Aniket Kate
2013/744 (PDF ) Functional Encryption and Property Preserving Encryption: New Definitions and Positive Results Shashank Agrawal, Shweta Agrawal, Saikrishna Badrinarayanan, Abishek Kumarasubramanian, Manoj Prabhakaran, Amit Sahai
2013/742 (PDF ) CODING - Stream Cipher Methods by Varying Components during Ciphering Data Jürgen Müller
2013/741 (PDF ) Fast Software Implementation of Binary Elliptic Curve Cryptography Manuel Bluhm, Shay Gueron
2013/740 (PDF ) An efficient FHE proposal based on the hardness of solving systems of nonlinear multivariate equations (II) Gérald Gavin
2013/738 (PDF ) On the Resilience and Uniqueness of CPA for Secure Broadcast Chris Litsas, Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas
2013/737 (PDF ) Weakness of F_{3^{6*1429}} and F_{2^{4*3041}} for Discrete Logarithm Cryptography Gora Adj, Alfred Menezes, Thomaz Oliveira, Francisco Rodriguez-Henriquez
2013/736 (PDF ) TRS-80 With A Keccak Sponge Cake Jean-Marie Chauvet
2013/735 (PDF ) Masking Tables---An Underestimated Security Risk Michael Tunstall, Carolyn Whitnall, Elisabeth Oswald
2013/734 (PDF ) Elliptic Curve Cryptography in Practice Joppe W. Bos, J. Alex Halderman, Nadia Heninger, Jonathan Moore, Michael Naehrig, Eric Wustrow
2013/732 (PDF ) SSS-V2: Secure Similarity Search Hyun-A Park
2013/731 (PDF ) Constructing Differentially 4-uniform Permutations over GF(2^{2k}) from the Inverse Function Revisited Yongqiang Li, Mingsheng Wang, Yuyin Yu
2013/730 (PDF ) Stamp \& Extend -- Instant but Undeniable Timestamping based on Lazy Trees Łukasz Krzywiecki, Przemys{\l}aw Kubiak, Miros{\l}aw Kuty{\l}owski
2013/729 (PDF ) Functional Encryption for Randomized Functionalities Vipul Goyal, Abhishek Jain, Venkata Koppula, Amit Sahai
2013/728 (PDF ) Modified Alternating Step Generators Robert Wicik, Tomasz Rachwalik
2013/727 (PDF ) Multi-Input Functional Encryption Shafi Goldwasser, Vipul Goyal, Abhishek Jain, Amit Sahai
2013/726 (PDF ) Homomorphic Authenticated Encryption Secure Against Chosen-Ciphertext Attack Chihong Joo, Aaram Yun
2013/724 (PDF ) Verifiable Set Operations over Outsourced Databases Ran Canetti, Omer Paneth, Dimitrios Papadopoulos, Nikos Triandopoulos
2013/723 (PDF ) Amplifying Privacy in Privacy Amplification Divesh Aggarwal, Yevgeniy Dodis, Zahra Jafargholi, Eric Miles, Leonid Reyzin
2013/722 (PDF ) The Realm of the Pairings Diego F. Aranha, Paulo S. L. M. Barreto, Patrick Longa, Jefferson E. Ricardini
2013/721 (PDF ) Deep Attacks of a Certificateless Signature Scheme Bo Yang, Zhao Yang, Zibi Xiao, Shougui Li
2013/720 (PDF ) Outsourced Symmetric Private Information Retrieval Stanislaw Jarecki, Charanjit Jutla, Hugo Krawczyk, Marcel Rosu, Michael Steiner
2013/719 (PDF ) Constructing Confidential Channels from Authenticated Channels---Public-Key Encryption Revisited Sandro Coretti, Ueli Maurer, Björn Tackmann
2013/718 (PDF ) NTRU-KE: A Lattice-based Public Key Exchange Protocol Xinyu Lei, Xiaofeng Liao
2013/717 (PDF ) NICV: Normalized Inter-Class Variance for Detection of Side-Channel Leakage Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm
2013/716 (PDF ) A Secure Obfuscator for Encrypted Blind Signature Functionality Xiao Feng, Zheng Yuan
2013/715 (PDF ) Practical Forward-Secure Range and Sort Queries with Update-Oblivious Linked Lists Erik-Oliver Blass, Travis Mayberry, Guevara Noubir
2013/714 (PDF ) Method to secure data in the cloud while preserving summary statistics Sanchita Barman, Bimal Roy
2013/713 (PDF ) Cryptanalysis of Zorro Jian Guo, Ivica Nikolic, Thomas Peyrin, Lei Wang
2013/712 (PDF ) PUF-Based RFID Authentication Secure and Private under Memory Leakage Daisuke Moriyama, Shin'ichiro Matsuo, Moti Yung
2013/711 (PDF ) Ambiguous One-Move Nominative Signature Without Random Oracles Dennis Y. W. Liu, Duncan S. Wong, Qiong Huang
2013/710 (PDF ) An Approach to Reduce Storage for Homomorphic Computations Jung Hee Cheon, Jinsu Kim
2013/709 (PDF ) Efficient Statistical Zero-Knowledge Authentication Protocols for Smart Cards Secure Against Active & Concurrent Attacks Mohammad Sadeq Dousti, Rasool Jalili
2013/708 (PDF ) Key Derivation Without Entropy Waste Yevgeniy Dodis, Krzysztof Pietrzak, Daniel Wichs
2013/707 (PDF ) A reduction of Semigroup DLP to classic DLP Matan Banin, Boaz Tsaban
2013/706 (PDF ) How to Certify the Leakage of a Chip? François Durvaux, François-Xavier Standaert, Nicolas Veyrat-Charvillon
2013/705 (PDF ) Symmetric Digit Sets for Elliptic Curve Scalar Multiplication without Precomputation Clemens Heuberger, Michela Mazzoli
2013/704 (PDF ) Adaptive Witness Encryption and Asymmetric Password-based Cryptography Mihir Bellare, Viet Tung Hoang
2013/703 (PDF ) Limits of Extractability Assumptions with Distributional Auxiliary Input Elette Boyle, Rafael Pass
2013/702 (PDF ) Efficient Non-Malleable Codes and Key-Derivation for Poly-Size Tampering Circuits Sebastian Faust, Pratyay Mukherjee, Daniele Venturi, Daniel Wichs
2013/701 (PDF ) More on the Impossibility of Virtual-Black-Box Obfuscation with Auxiliary Input Nir Bitansky, Ran Canetti, Omer Paneth, Alon Rosen
2013/700 (PDF ) Higher Order Masking of Look-up Tables Jean-Sebastien Coron
2013/699 (PDF ) Bootstrapping Obfuscators via Fast Pseudorandom Functions Benny Applebaum
2013/698 (PDF ) Cryptanalysis and improvement of a dynamic and secure key management model for hierarchical heterogeneous sensor networks Xi-Jun Lin, Lin Sun
2013/697 (PDF ) A More Efficient AES Threshold Implementation Begul Bilgin, Benedikt Gierlichs, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen
2013/696 (PDF ) Examination of a New Defense Mechanism: Honeywords Ziya Alper Genc, Suleyman Kardas, Mehmet Sabir Kiraz
2013/695 (PDF ) AEGIS: A Fast Authenticated Encryption Algorithm Hongjun Wu, Bart Preneel
2013/694 (PDF ) Write-Only Oblivious RAM based Privacy-Preserved Access of Outsourced Data Lichun Li, Anwitaman Datta
2013/693 (PDF ) Secure Key Exchange and Sessions Without Credentials Ran Canetti, Vladimir Kolesnikov, Charles Rackoff, Yevgeniy Vahlis
2013/692 (PDF ) Faster Compact Diffie-Hellman: Endomorphisms on the x-line Craig Costello, Huseyin Hisil, Benjamin Smith
2013/691 (PDF ) Non-Malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures Benoit Libert, Thomas Peters, Marc Joye, Moti Yung
2013/690 (PDF ) Obfuscation ==> (IND-CPA Security =/=> Circular Security) Antonio Marcedone, Claudio Orlandi
2013/689 (PDF ) Differing-Inputs Obfuscation and Applications Prabhanjan Ananth, Dan Boneh, Sanjam Garg, Amit Sahai, Mark Zhandry
2013/688 (PDF ) Unbalancing Pairing-Based Key Exchange Protocols Michael Scott
2013/687 (PDF ) How to Compress (Reusable) Garbled Circuits Craig Gentry, Sergey Gorbunov, Shai Halevi, Vinod Vaikuntanathan, Dhinakaran Vinayagamurthy
2013/686 (PDF ) New abstractions in applied pi-calculus and automated verification of protected executions Shiwei Xu, Sergiu Bursuc, Julian P. Murphy
2013/685 (PDF ) Solving shortest and closest vector problems: The decomposition approach Anja Becker, Nicolas Gama, Antoine Joux
2013/684 (PDF ) Fully Bideniable Public-Key Encryption Marcel Šebek
2013/683 (PDF ) Separations in Circular Security for Arbitrary Length Key Cycles Venkata Koppula, Kim Ramchen, Brent Waters
2013/682 (PDF ) Secret Key Cryptosystem based on Non-Systematic Polar Codes Reza Hooshmand, Mohammad Reza Aref, Taraneh Eghlidos
2013/681 (PDF ) Public-Key Encryption with Weak Randomness: Security against Strong Chosen Distribution Attacks Damien Vergnaud, David Xiao
2013/680 (PDF ) A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware Encryption Scheme Dana Dachman-Soled
2013/679 (PDF ) Formal verification of a software countermeasure against instruction skip attacks Nicolas Moro, Karine Heydemann, Emmanuelle Encrenaz, Bruno Robisson
2013/678 (PDF ) Universally composable privacy preserving finite automata execution with low online and offline complexity Peeter Laud, Jan Willemson
2013/677 (PDF ) Bounded Tamper Resilience: How to go beyond the Algebraic Barrier Ivan Damgaard, Sebastian Faust, Pratyay Mukherjee, Daniele Venturi
2013/676 (PDF ) Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-oriented Block Ciphers Siwei Sun, Lei Hu, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Ling Song
2013/675 (PDF ) A Practical Related-Key Boomerang Attack for the Full MMB Block Cipher Tomer Ashur, Orr Dunkelman
2013/674 (PDF ) Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir
2013/673 (PDF ) Traps to the BGJT-Algorithm for Discrete Logarithms Qi Cheng, Daqing Wan, Jincheng Zhuang
2013/672 (PDF ) Easy scalar decompositions for efficient scalar multiplication on elliptic curves and genus 2 Jacobians Benjamin Smith
2013/671 (PDF ) Robust Pseudorandom Generators Yuval Ishai, Eyal Kushilevitz, Xin Li, Rafail Ostrovsky, Manoj Prabhakaran, Amit Sahai, David Zuckerman
2013/670 (PDF ) Switching Lemma for Bilinear Tests and Constant-size NIZK Proofs for Linear Subspaces Charanjit Jutla, Arnab Roy
2013/669 (PDF ) Attribute-Based Encryption for Arithmetic Circuits Dan Boneh, Valeria Nikolaenko, Gil Segev
2013/668 (PDF ) Obfuscation for Evasive Functions Boaz Barak, Nir Bitansky, Ran Canetti, Yael Tauman Kalai, Omer Paneth, Amit Sahai
2013/667 (PDF ) A TPM Diffie-Hellman Oracle Tolga Acar, Lan Nguyen, Greg Zaverucha
2013/666 (PDF ) An Offline Dictionary Attack against a Three-Party Key Exchange Protocol Junghyun Nam, Kim-Kwang Raymond Choo, Juryon Paik, Dongho Won
2013/665 (PDF ) The Impossibility of Obfuscation with a Universal Simulator Henry Cohn, Shafi Goldwasser, Yael Tauman Kalai
2013/664 (PDF ) TUC: Time-sensitive and Modular Analysis of Anonymous Communication Michael Backes, Praveen Manoharan, Esfandiar Mohammadi
2013/663 (PDF ) Linear Cryptanalysis of Round Reduced SIMON Javad Alizadeh, Nasour Bagheri, Praveen Gauravaram, Abhishek Kumar, Somitra Kumar Sanadhya
2013/662 (PDF ) Fine-Tuning Groth-Sahai Proofs Alex Escala, Jens Groth
2013/661 (PDF ) Private aggregation on untrusted servers with customizable thresholds Constantinos Patsakis, Michael Clear, Paul Laird
2013/660 (PDF ) Discrete Logarithms and Mordell-Weil Groups Mohammad Sadek
2013/658 (PDF ) Parallel authenticated encryption with the duplex construction Pawel Morawiecki, Josef Pieprzyk
2013/657 (PDF ) New Trapdoor Projection Maps for Composite-Order Bilinear Groups Sarah Meiklejohn, Hovav Shacham
2013/656 (PDF ) Bias-based modeling and entropy analysis of PUFs Robbert van den Berg, Boris Skoric, Vincent van der Leest
2013/655 (PDF ) Privacy-Preserving Multi-Party Reconciliation Secure in the Malicious Model (Extended version) Georg Neugebauer, Lucas Brutschy, Ulrike Meyer, Susanne Wetzel
2013/654 (PDF ) Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter Baodong Qin, Shengli Liu
2013/653 (PDF ) RKA-KDM secure encryption from public-key encryption Florian Böhl, Gareth T. Davies, Dennis Hofheinz
2013/652 (PDF ) Efficient Modular Arithmetic for SIMD Devices Wilke Trei
2013/651 (PDF ) A Closer Look at Multiple Forking: Leveraging (In)dependence for a Tighter Bound Sanjit Chatterjee, Chethan Kamath
2013/650 (PDF ) On Extractability (a.k.a. Differing-Inputs) Obfuscation Elette Boyle, Kai-Min Chung, Rafael Pass
2013/649 (PDF ) Security Analysis of Password-Authenticated Key Retrieval SeongHan Shin, Kazukuni Kobara
2013/648 (PDF ) Integral Distinguishers for Reduced-round Stribog Riham AlTawy, Amr M. Youssef
2013/647 (PDF ) A note on high-security general-purpose elliptic curves Diego F. Aranha, Paulo S. L. M. Barreto, Geovandro C. C. F. Pereira, Jefferson E. Ricardini
2013/646 (PDF ) Direct Chosen-Ciphertext Secure Attribute-Based Key Encapsulations without Random Oracles Johannes Blömer, Gennadij Liske
2013/645 (PDF ) FlexDPDP: FlexList-based Optimized Dynamic Provable Data Possession Ertem Esiner, Adilet Kachkeev, Samuel Braunfeld, Alptekin Küpçü, Öznur Özkasap
2013/644 (PDF ) Elliptic and Hyperelliptic Curves: a Practical Security Analysis Joppe W. Bos, Craig Costello, Andrea Miele
2013/643 (PDF ) There is no Indistinguishability Obfuscation in Pessiland Tal Moran, Alon Rosen
2013/642 (PDF ) Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation Dan Boneh, Mark Zhandry
2013/641 (PDF ) Indistinguishability Obfuscation vs. Auxiliary-Input Extractable Functions: One Must Fall Nir Bitansky, Ran Canetti, Omer Paneth, Alon Rosen
2013/640 (PDF ) Communication-Efficient MPC for General Adversary Structures Joshua Lampkins, Rafail Ostrovsky
2013/639 (PDF ) Differentially 4-Uniform Bijections by Permuting the Inverse Function Deng Tang, Claude Carlet, Xiaohu Tang
2013/638 (PDF ) DFA-Based Functional Encryption: Adaptive Security from Dual System Encryption Somindu C. Ramanna
2013/637 (PDF ) Detection of Algebraic Manipulation in the Presence of Leakage Hadi Ahmadi, Reihaneh Safavi-Naini
2013/636 (PDF ) SCARE of Secret Ciphers with SPN Structures Matthieu Rivain, Thomas Roche
2013/635 (PDF ) Universal security; from bits and mips to pools, lakes -- and beyond Arjen K. Lenstra, Thorsten Kleinjung, Emmanuel Thomé
2013/634 (PDF ) Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64 Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir
2013/633 (PDF ) Four Measures of Nonlinearity J. Boyar, M. G. Find, R. Peralta
2013/632 (PDF ) Combined Modeling and Side Channel Attacks on Strong PUFs Ahmed Mahmoud, Ulrich Rührmair, Mehrdad Majzoobi, Farinaz Koushanfar
2013/631 (PDF ) Protecting Obfuscation Against Algebraic Attacks Boaz Barak, Sanjam Garg, Yael Tauman Kalai, Omer Paneth, Amit Sahai
2013/630 (PDF ) Estimating Key Sizes For High Dimensional Lattice-Based Systems Joop van de Pol, Nigel P. Smart
2013/629 (PDF ) Secure Key Management in the Cloud Ivan Damgård, Thomas P. Jakobsen, Jesper Buus Nielsen, Jakob I. Pagter
2013/628 (PDF ) Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions Kazuhiko Minematsu
2013/627 (PDF ) Flexible and Publicly Verifiable Aggregation Query for Outsourced Databases in Cloud Jiawei Yuan, Shucheng Yu
2013/626 (PDF ) Improved Linear Attacks on the Chinese Block Cipher Standard Mingjie Liu, Jiazhe Chen
2013/625 (PDF ) PillarBox: Combating next-generation malware with fast forward-secure logging Kevin D. Bowers, Catherine Hart, Ari Juels, Nikos Triandopoulos
2013/623 (PDF ) Off-Path Hacking: The Illusion of Challenge-Response Authentication Yossi Gilad, Amir Herzberg, Haya Shulman
2013/622 (PDF ) Decentralized Anonymous Credentials Christina Garman, Matthew Green, Ian Miers
2013/621 (PDF ) Multi-LHL protocol Marika Mitrengová
2013/620 (PDF ) Do I know you? -- Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications Marcin Nagy, Emiliano De Cristofaro, Alexandra Dmitrienko, N. Asokan, Ahmad-Reza Sadeghi
2013/619 (PDF ) Fault Injection Modeling Attacks on 65nm Arbiter and RO Sum PUFs via Environmental Changes Jeroen Delvaux, Ingrid Verbauwhede
2013/618 (PDF ) Security Amplification against Meet-in-the-Middle Attacks Using Whitening Pierre-Alain Fouque, Pierre Karpman
2013/617 (PDF ) Some results concerning global avalanche characteristics of two $q$-ary functions Brajesh Kumar Singh
2013/616 (PDF ) Accelerating Fully Homomorphic Encryption over the Integers with Super-size Hardware Multiplier and Modular Reduction Xiaolin Cao, Ciara Moore, Maire O’Neill, Elizabeth O’Sullivan, Neil Hanley
2013/615 (PDF ) Privacy and Verifiability in Voting Systems: Methods, Developments and Trends Hugo Jonker, Sjouke Mauw, Jun Pang
2013/614 (PDF ) Is extracting data the same as possessing data? Douglas R. Stinson, Jalaj Upadhyay
2013/613 (PDF ) Recomputing with Permuted Operands: A Concurrent Error Detection Approach Xiaofei Guo, Ramesh Karri
2013/612 (PDF ) Sub-linear Blind Ring Signatures without Random Oracles Essam Ghadafi
2013/611 (PDF ) Limited-birthday Distinguishers for Hash Functions - Collisions Beyond the Birthday Bound can be Meaningful Mitsugu Iwamoto, Thomas Peyrin, Yu Sasaki
2013/610 (PDF ) Key-recovery Attacks on Various RO PUF Constructions via Helper Data Manipulation Jeroen Delvaux, Ingrid Verbauwhede
2013/609 (PDF ) Ultra Low-Power implementation of ECC on the ARM Cortex-M0+ Ruan de Clercq, Leif Uhsadel, Anthony Van Herrewege, Ingrid Verbauwhede
2013/608 (PDF ) Towards Optimal Leakage Exploitation Rate in Template Attacks Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng
2013/607 (PDF ) Cryptanalysis of Full RIPEMD-128 Franck Landelle, Thomas Peyrin
2013/606 (PDF ) Revocable quantum timed-release encryption Dominique Unruh
2013/605 (PDF ) Presentation of a new class of public key cryptosystems K(XIII)SE(1)PKC along with Kp(XIII)SE(1)PKC that realizes the coding rate of exactly 1.0, constructed by modifying K(XII)SE(1)PKC. Masao KASAHARA
2013/604 (PDF ) Modelling Time, or A Step Towards Reduction-based Security Proofs for OTP and Kerberos Jörg Schwenk
2013/603 (PDF ) Invariance-Based Concurrent Error Detection for Advanced Encryption Standard Xiaofei Guo, Ramesh Karri
2013/602 (PDF ) On the Efficacy of Solving LWE by Reduction to Unique-SVP Martin R. Albrecht, Robert Fitzpatrick, Florian G ̈opfert
2013/601 (PDF ) Two-round secure MPC from Indistinguishability Obfuscation Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova
2013/600 (PDF ) Improved Cryptanalysis of Reduced RIPEMD-160 Florian Mendel, Thomas Peyrin, Martin Schläffer, Lei Wang, Shuang Wu
2013/599 (PDF ) Factoring RSA keys from certified smart cards: Coppersmith in the wild Daniel J. Bernstein, Yun-An Chang, Chen-Mou Cheng, Li-Ping Chou, Nadia Heninger, Tanja Lange, Nicko van Someren
2013/598 (PDF ) Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System - Full Version Daehyun Strobel, Benedikt Driessen, Timo Kasper, Gregor Leander, David Oswald, Falk Schellenberg, Christof Paar
2013/597 (PDF ) Efficient Pairings Computation on Jacobi Quartic Elliptic Curves Sylvain Duquesne, Nadia El Mrabet, Emmanuel Fouotsa
2013/596 (PDF ) Solving the Elliptic Curve Discrete Logarithm Problem Using Semaev Polynomials, Weil Descent and Gröbner Basis Methods -- an Experimental Study Michael Shantz, Edlyn Teske
2013/595 (PDF ) Enhanced certificate transparency and end-to-end encrypted mail Mark D. Ryan
2013/594 (PDF ) A Local-Global Approach to Solving Ideal Lattice Problems Yuan Tian, Rongxin Sun, Xueyong Zhu
2013/593 (PDF ) Efficient One-Sided Adaptively Secure Computation Carmit Hazay, Arpita Patra
2013/592 (PDF ) Cryptanalysis of the Toorani-Falahati Hill Ciphers Liam Keliher, Anthony Z. Delaney
2013/591 (PDF ) Analysis of the Rainbow Tradeoff Algorithm Used in Practice Jung Woo Kim, Jin Hong, Kunsoo Park
2013/590 (PDF ) EyeDecrypt -- Private Interactions in Plain Sight Andrea Forte, Juan Garay, Trevor Jim, Yevgeniy Vahlis
2013/589 (PDF ) Smashing MASH-1 Vladimir Antipkin
2013/588 (PDF ) SPHF-Friendly Non-Interactive Commitments Michel Abdalla, Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval
2013/587 (PDF ) ESPOON ERBAC: Enforcing Security Policies in Outsourced Environments Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo
2013/586 (PDF ) Generic related-key and induced chosen IV attacks using the method of key differentiation Enes Pasalic, Yongzhuang Wei
2013/585 (PDF ) On Algebraic Immunity of Trace Inverse Functions over Finite Fields with Characteristic Two Xiutao Feng, Guang Gong
2013/584 (PDF ) Cryptanalysis of GOST R Hash Function Zongyue Wang, Hongbo Yu, Xiaoyun Wang
2013/583 (PDF ) Polynomial Selection for the Number Field Sieve in an Elementary Geometric View Min Yang, Qingshu Meng, Zhangyi Wang, Lina Wang, Huanguo Zhang
2013/582 (PDF ) The Special Number Field Sieve in $\F _{p^{n}}$, Application to Pairing-Friendly Constructions Antoine Joux, Cécile Pierrot
2013/581 (PDF ) PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones Bingsheng Zhang, Qin Zhan, Junfei Wang, Kui Ren, Cong Wang, Di Ma
2013/580 (PDF ) Random Projections, Graph Sparsification, and Differential Privacy Jalaj Upadhyay
2013/579 (PDF ) On Measurable Side-Channel Leaks inside ASIC Design Primitives Takeshi Sugawara, Daisuke Suzuki, Minoru Saeki, Mitsuru Shiozaki, Takeshi Fujino
2013/578 (PDF ) A Method For Generation Of High-Nonlinear S-Boxes Based On Gradient Descent Oleksandr Kazymyrov, Valentyna Kazymyrova, Roman Oliynykov
2013/577 (PDF ) Secure Two-Party Computation with Reusable Bit-Commitments, via a Cut-and-Choose with Forge-and-Lose Technique Luís T. A. N. Brandão
2013/576 (PDF ) Extended Criterion for Absence of Fixed Points Oleksandr Kazymyrov, Valentyna Kazymyrova
2013/575 (PDF ) Equivalence between MAC and PRF for Blockcipher based Constructions Nilanjan Datta, Mridul Nandi
2013/574 (PDF ) On the Minimum Number of Multiplications Necessary for Universal Hash Constructions Mridul Nandi
2013/573 (PDF ) Improved Meet-in-the-Middle Attacks on AES-192 and PRINCE Leibo Li, Keting Jia, Xiaoyun Wang
2013/572 (PDF ) Quad-RC4: Merging Four RC4 States towards a 32-bit Stream Cipher Goutam Paul, Subhamoy Maitra, Anupam Chattopadhyay
2013/571 (PDF ) Efficient General-Adversary Multi-Party Computation Martin Hirt, Daniel Tschudi
2013/570 (PDF ) New Efficient Identity-Based Encryption From Factorization Jun Shao, Licheng Wang, Xiaolei Dong, Zhenfu Cao
2013/569 (PDF ) More Efficient Cryptosystems From $k^{th}$-Power Residues Zhenfu Cao, Xiaolei Dong, Licheng Wang, Jun Shao
2013/568 (PDF ) Cryptanalysis of the Speck Family of Block Ciphers Farzaneh Abed, Eik List, Stefan Lucks, Jakob Wenzel
2013/567 (PDF ) KDM Security in the Hybrid Framework Gareth T. Davies, Martijn Stam
2013/566 (PDF ) Attacking PUF-Based Pattern Matching Key Generators via Helper Data Manipulation Jeroen Delvaux, Ingrid Verbauwhede
2013/565 (PDF ) Non-Malleable Coding Against Bit-wise and Split-State Tampering Mahdi Cheraghchi, Venkatesan Guruswami
2013/564 (PDF ) Capacity of Non-Malleable Codes Mahdi Cheraghchi, Venkatesan Guruswami
2013/563 (PDF ) Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding Zvika Brakerski, Guy N. Rothblum
2013/562 (PDF ) Self-pairings on supersingular elliptic curves with embedding degree $three$ Binglong Chen, Chang-An Zhao
2013/561 (PDF ) Preimage attacks on the round-reduced Keccak with the aid of differential cryptanalysis Pawel Morawiecki, Josef Pieprzyk, Marian Srebrny, Michal Straus
2013/560 (PDF ) Sometimes-Recurse Shuffle: Almost-Random Permutations in Logarithmic Expected Time Ben Morris, Phillip Rogaway
2013/559 (PDF ) A Definitional Framework for Functional Encryption Christian Matt, Ueli Maurer
2013/558 (PDF ) Practical approaches to varying network size in combinatorial key predistribution schemes Kevin Henry, Maura B. Paterson, Douglas R. Stinson
2013/557 (PDF ) Black-Box Obfuscation for d-CNFs Zvika Brakerski, Guy N. Rothblum
2013/556 (PDF ) Algebraic Aspects of the Russian Hash Standard GOST R 34.11-2012 Oleksandr Kazymyrov, Valentyna Kazymyrova
2013/555 (PDF ) Key Exchange with Unilateral Authentication: Composable Security Definition and Modular Protocol Design Ueli Maurer, Björn Tackmann, Sandro Coretti
2013/554 (PDF ) Formally Proved Security of Assembly Code Against Power Analysis: A Case Study on Balanced Logic Pablo Rauzy, Sylvain Guilley, Zakaria Najm
2013/553 (PDF ) Multi-Valued Byzantine Broadcast: the $t < n$ Case Martin Hirt, Pavel Raykov
2013/552 (PDF ) More Efficient Oblivious Transfer and Extensions for Faster Secure Computation Gilad Asharov, Yehuda Lindell, Thomas Schneider, Michael Zohner
2013/551 (PDF ) Puzzle Encryption Algorithm Gregory Alvarez, Charles Berenguer
2013/549 (PDF ) Equations System coming from Weil descent and subexponential attack for algebraic curve cryptosystem Koh-ichi Nagao
2013/548 (PDF ) Decomposition formula of the Jacobian group of plane curve Koh-ichi Nagao
2013/547 (PDF ) Automatic Security Evaluation of Block Ciphers with S-bP Structures against Related-key Differential Attacks Siwei Sun, Lei Hu, Ling Song, Yonghong Xie, Peng Wang
2013/546 (PDF ) TRS-80 with a grain of salt Jean-Marie Chauvet
2013/545 (PDF ) Private Over-threshold Aggregation Protocols over Distributed Databases Myungsun Kim, Abedelaziz Mohaisen, Jung Hee Cheon, Yongdae Kim
2013/544 (PDF ) Warrant-Hiding Delegation-by-Certificate Proxy Signature Schemes Christian Hanser, Daniel Slamanig
2013/543 (PDF ) Cryptanalysis of the SIMON Family of Block Ciphers Hoda A. Alkhzaimi, Martin M. Lauridsen
2013/542 (PDF ) Searching for Nonlinear Feedback Shift Registers with Parallel Computing Przemysław Dąbrowski, Grzegorz Łabuzek, Tomasz Rachwalik, Janusz Szmidt
2013/541 (PDF ) Lattice-Based FHE as Secure as PKE Zvika Brakerski, Vinod Vaikuntanathan
2013/540 (PDF ) On the security of a password-only authenticated three-party key exchange protocol Junghyun Nam, Kim-Kwang Raymond Choo, Juryon Paik, Dongho Won
2013/539 (PDF ) Rebound attacks on Stribog Riham AlTawy, Aleksandar Kircanski, Amr M. Youssef
2013/538 (PDF ) Practical Issues with TLS Client Certificate Authentication Arnis Parsovs
2013/537 (PDF ) Inter-FSP Funds Transfer Protocol Amir Herzberg, Shay Nachmani
2013/536 (PDF ) A Three-Level Sieve Algorithm for the Shortest Vector Problem Feng Zhang, Yanbin Pan, Gengran Hu
2013/535 (PDF ) Accelerating Scalar Conversion for Koblitz Curve Cryptoprocessors on Hardware Platforms Sujoy Sinha Roy, Junfeng Fan, Ingrid Verbauwhede
2013/534 (PDF ) Efficient Unobservable Anonymous Reporting against Strong Adversaries Nethanel Gelernter, Amir Herzberg
2013/533 (PDF ) Gossip Latin Square and The Meet-All Gossipers Problem Nethanel Gelernter, Amir Herzberg
2013/532 (PDF ) On a Relation between the Ate Pairing and the Weil Pairing for Supersingular Elliptic Curves Takakazu Satoh
2013/531 (PDF ) On the Limits of Provable Anonymity Nethanel Gelernter, Amir Herzberg
2013/530 (PDF ) The Parallel-Cut Meet-In-The-Middle Attack Ivica Nikolic, Lei Wang, Shuang Wu
2013/529 (PDF ) How to Withstand Mobile Virus Attacks, Revisited Joshua Baron, Karim El Defrawy, Joshua Lampkins, Rafail Ostrovsky
2013/528 (PDF ) Anonymous HIBE from Standard Assumptions over Type-3 Pairings using Dual System Encryption Somindu C. Ramanna, Palash Sarkar
2013/527 (PDF ) The Spammed Code Offset Method Boris Skoric, Niels de Vreede
2013/526 (PDF ) Differential and Linear Cryptanalysis of Reduced-Round Simon Farzaneh Abed, Eik List, Stefan Lucks, Jakob Wenzel
2013/525 (PDF ) Catena: A Memory-Consuming Password-Scrambling Framework Christian Forler, Stefan Lucks, Jakob Wenzel
2013/524 (PDF ) Threshold Secret Image Sharing Teng Guo, Feng Liu, ChuanKun Wu, ChingNung Yang, Wen Wang, YaWei Ren
2013/523 (PDF ) White-Box Security Notions for Symmetric Encryption Schemes Cécile Delerablée, Tancrède Lepoint, Pascal Paillier, Matthieu Rivain
2013/522 (PDF ) The Resistance of PRESENT-80 Against Related-Key Differential Attacks Sareh Emami, San Ling, Ivica Nikolic, Josef Pieprzyk, Huaxiong Wang
2013/521 (PDF ) Multiple Limited-Birthday Distinguishers and Applications Jérémy Jean, María Naya-Plasencia, Thomas Peyrin
2013/520 (PDF ) Locally Updatable and Locally Decodable Codes Nishanth Chandran, Bhavana Kanukurthi, Rafail Ostrovsky
2013/519 (PDF ) Montgomery Multiplication Using Vector Instructions Joppe W. Bos, Peter L. Montgomery, Daniel Shumow, Gregory M. Zaverucha
2013/517 (PDF ) Improvement of One Adaptive Oblivious Transfer Scheme Zhengjun Cao, Lihua Liu
2013/516 (PDF ) Algebraic MACs and Keyed-Verification Anonymous Credentials Melissa Chase, Sarah Meiklejohn, Gregory M. Zaverucha
2013/515 (PDF ) When Private Set Intersection Meets Big Data: An Efficient and Scalable Protocol Changyu Dong, Liqun Chen, Zikai Wen
2013/514 (PDF ) Leakage Resilient Proofs of Ownership in Cloud Storage, Revisited Jia Xu, Jianying Zhou
2013/513 (PDF ) Enforcing Language Semantics Using Proof-Carrying Data Stephen Chong, Eran Tromer, Jeffrey A. Vaughan
2013/512 (PDF ) Rounding LLL: Finding Faster Small Roots of Univariate Polynomial Congruences Jingguo Bi, Phong Q. Nguyen
2013/511 (PDF ) Low Data Complexity Biclique Cryptanalysis of Block Ciphers with Application to Piccolo and HIGHT Siavash Ahmadi, Zahra Ahmadian, Javad Mohajeri, Mohammad Reza Aref
2013/510 (PDF ) Discrete Ziggurat: A Time-Memory Trade-off for Sampling from a Gaussian Distribution over the Integers Johannes Buchmann, Daniel Cabarcas, Florian Göpfert, Andreas Hülsing, Patrick Weiden
2013/509 (PDF ) Replacing a Random Oracle: Full Domain Hash From Indistinguishability Obfuscation Susan Hohenberger, Amit Sahai, Brent Waters
2013/508 (PDF ) Multi-Key Searchable Encryption Raluca Ada Popa, Nickolai Zeldovich
2013/507 (PDF ) SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer, Madars Virza
2013/506 (PDF ) A Formal Proof of Countermeasures Against Fault Injection Attacks on CRT-RSA Pablo Rauzy, Sylvain Guilley
2013/505 (PDF ) Improvement of One Anonymous Identity-Based Encryption Zhengjun Cao, Lihua Liu
2013/504 (PDF ) A Comparison of Double Point Multiplication Algorithms and their Implementation over Binary Elliptic Curves Reza Azarderakhsh, Koray Karabina
2013/503 (PDF ) On secret sharing with nonlinear product reconstruction Ignacio Cascudo, Ronald Cramer, Diego Mirandola, Carles Padro, Chaoping Xing
2013/502 (PDF ) Proving TLS-attack related open biases of RC4 Santanu Sarkar, Sourav Sen Gupta, Goutam Paul, Subhamoy Maitra
2013/501 (PDF ) Type-Based Analysis of Protected Storage in the TPM (full version) Jianxiong Shao, Dengguo Feng, Yu Qin
2013/500 (PDF ) Obfuscating Branching Programs Using Black-Box Pseudo-Free Groups Ran Canetti, Vinod Vaikuntanathan
2013/499 (PDF ) Limits on the Power of Cryptographic Cheap Talk Pavel Hubacek, Jesper Buus Nielsen, Alon Rosen
2013/498 (PDF ) Non-Malleable Codes from Two-Source Extractors Stefan Dziembowski, Tomasz Kazana, Maciej Obremski
2013/497 (PDF ) Improvement of Camenisch-Neven-Shelat Oblivious Transfer Scheme Zhengjun Cao, Hanyue Cao
2013/496 (PDF ) Rational Protocol Design: Cryptography Against Incentive-driven Adversaries Juan Garay, Jonathan Katz, Ueli Maurer, Bjoern Tackmann, Vassilis Zikas
2013/495 (PDF ) Revocable IBE Systems with Almost Constant-size Key Update Le Su, Hoon Wei Lim, San Ling, Huaxiong Wang
2013/494 (PDF ) Differential Fault Attack against Grain family with very few faults and minimal assumptions Santanu Sarkar, Subhadeep Banik, Subhamoy Maitra
2013/493 (PDF ) A new class of semi-bent quadratic Boolean functions Chunming Tang, Yanfeng Qi
2013/492 (PDF ) Cryptographically Enforced RBAC Anna Lisa Ferrara, George Fuchsbauer, Bogdan Warinschi
2013/491 (PDF ) Improved OT Extension for Transferring Short Secrets Vladimir Kolesnikov, Ranjit Kumaresan
2013/490 (PDF ) For an EPC-C1 G2 RFID compliant Protocol, CRC with Concatenation : No; PRNG with Concatenation : Yes Masoumeh Safkhani, Nasour Bagheri
2013/489 (PDF ) An Efficient Scheme for Centralized Group Key Management in Collaborative Environments Constantinos Patsakis, Agusti Solanas
2013/488 (PDF ) Adaptively Secure Broadcast Encryption under Standard Assumptions with Better Efficiency Kwangsu Lee, Dong Hoon Lee
2013/487 (PDF ) Classification of Elliptic/hyperelliptic Curves with Weak Coverings against the GHS attack under an Isogeny Condition Tsutomu Iijima, Fumiyuki Momose, Jinhui Chao
2013/483 (PDF ) A Variant of Coppersmith's Algorithm with Improved Complexity and Efficient Exhaustive Search Jean-Sébastien Coron, Jean-Charles Faugère, Guénaël Renault, Rina Zeitoun
2013/482 (PDF ) Bounds in Shallows and in Miseries Céline Blondeau, Andrey Bogdanov, Gregor Leander
2013/481 (PDF ) Cryptanalysis of the Huang-Liu-Yang Cryptosystem from PKC 2012 Yosuke Todo, Keita Xagawa
2013/480 (PDF ) Efficient Multiparty Protocols via Log-Depth Threshold Formulae Gil Cohen, Ivan Bjerre Damgård, Yuval Ishai, Jonas Kölker, Peter Bro Miltersen, Ran Raz, Ron D. Rothblum
2013/479 (PDF ) Security analysis of Quantum-Readout PUFs in the case of challenge-estimation attacks B. Skoric
2013/478 (PDF ) Enabling End-to-End Secure Communication with Anonymous and Mobile Receivers - an Attribute-Based Messaging Approach Stefan G. Weber
2013/477 (PDF ) Golden Sequence for the PPSS Broadcast Encryption Scheme with an Asymmetric Pairing Renaud Dubois, Margaux Dugardin, Aurore Guillevic
2013/476 (PDF ) Dependence in IV-related bytes of RC4 key enhances vulnerabilities in WPA Sourav Sen Gupta, Subhamoy Maitra, Willi Meier, Goutam Paul, Santanu Sarkar
2013/475 (PDF ) A note on verifying the APN property Pascale Charpin, Gohar M. Kyureghyan
2013/474 (PDF ) Eavesdropping or Disrupting a Communication --- On the Weakness of Quantum Communications Zhengjun Cao
2013/473 (PDF ) The Norwegian Internet Voting Protocol Kristian Gjøsteen
2013/472 (PDF ) Partially blind password-based signatures using elliptic curves Kristian Gjøsteen
2013/471 (PDF ) Obfuscating Conjunctions Zvika Brakerski, Guy N. Rothblum
2013/470 (PDF ) Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions Martin R. Albrecht, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret
2013/469 (PDF ) Verifiable Delegation of Computation on Outsourced Data Michael Backes, Dario Fiore, Raphael M. Reischuk
2013/468 (PDF ) How To Construct Extractable One-Way Functions Against Uniform Adversaries Nir Bitansky, Ran Canetti, Omer Paneth
2013/467 (PDF ) Analysis of BLAKE2 Jian Guo, Pierre Karpman, Ivica Nikolic, Lei Wang, Shuang Wu
2013/466 (PDF ) Efficient computation of addition-subtraction chains using generalized continued Fractions Amadou Tall, Ali Yassin Sanghare
2013/465 (PDF ) Practical & Provably Secure Distance-Bounding Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay
2013/464 (PDF ) Towards A Practical JCJ / Civitas Implementation Stephan Neumann, Christian Feier, Melanie Volkamer, Reto Koenig
2013/463 (PDF ) Secret Key Cryptosystem based on Polar Codes over Binary Erasure Channel Reza Hooshmand, Masoumeh Koochak Shooshtari, Mohammad Reza Aref
2013/462 (PDF ) VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data Qingji Zheng, Shouhuai Xu, Giuseppe Ateniese
2013/461 (PDF ) HPAZ: a High-throughput Pipeline Architecture of ZUC in Hardware Zongbin Liu, Neng Gao, Jiwu Jing, Peng Liu
2013/460 (PDF ) Solving Terminal Revocation in EAC by Augmenting Terminal Authentication Rafik Chaabouni
2013/459 (PDF ) Reset Indifferentiability and its Consequences Paul Baecher, Chris Brzuska, Arno Mittelbach
2013/458 (PDF ) Exponentiating in Pairing Groups Joppe W. Bos, Craig Costello, Michael Naehrig
2013/457 (PDF ) Deduction Soundness: Prove One, Get Five for Free Florian Böhl, Véronique Cortier, Bogdan Warinschi
2013/456 (PDF ) On the Security of Group-based Proxy Re-encryption Scheme Purushothama B R, B B Amberker
2013/455 (PDF ) Another Nail in the Coffin of White-Box AES Implementations Tancrède Lepoint, Matthieu Rivain
2013/454 (PDF ) How to Use Indistinguishability Obfuscation: Deniable Encryption, and More Amit Sahai, Brent Waters
2013/453 (PDF ) Secret Disclosure attack on Kazahaya, a Yoking-Proof For Low-Cost RFID Tags Nasour Bagheri, Masoumeh Safkhani
2013/452 (PDF ) Secure Channel Coding Schemes based on Polar Codes Behnam Mafakheri, Taraneh Eghlidos, Hossein Pilaram
2013/451 (PDF ) Candidate Indistinguishability Obfuscation and Functional Encryption for all circuits Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai, Brent Waters
2013/450 (PDF ) Revisiting the BGE Attack on a White-Box AES Implementation Yoni De Mulder, Peter Roelse, Bart Preneel
2013/449 (PDF ) A Note On the Storage Requirement for AKS Primality Testing Algorithm Zhengjun Cao
2013/448 (PDF ) Flush+Reload: a High Resolution, Low Noise, L3 Cache Side-Channel Attack Yuval Yarom, Katrina Falkner
2013/447 (PDF ) Dynamic Runtime Methods to Enhance Private Key Blinding Karine Gandolfi-Villegas, Nabil Hamzi
2013/446 (PDF ) Weakness of F_{3^{6*509}} for Discrete Logarithm Cryptography Gora Adj, Alfred Menezes, Thomaz Oliveira, Francisco Rodríguez-Henríquez
2013/445 (PDF ) Implementing Lightweight Block Ciphers on x86 Architectures Ryad Benadjila, Jian Guo, Victor Lomné, Thomas Peyrin
2013/444 (PDF ) Sequential message authentication code without random oracles Bin Wang, Xiaojing Hong
2013/443 (PDF ) Optimally Anonymous and Transferable Conditional E-cash Jiangxiao Zhang, Hua Guo, Zhoujun Li, Chang Xu
2013/442 (PDF ) On Fair Exchange, Fair Coins and Fair Sampling Shashank Agrawal, Manoj Prabhakaran
2013/440 (PDF ) Revisiting Conditional Rényi Entropies and Generalizing Shannon's Bounds in Information Theoretically Secure Encryption Mitsugu Iwamoto, Junji Shikata
2013/439 (PDF ) Pushing the Limits of SHA-3 Hardware Implementations to Fit on RFID Peter Pessl, Michael Hutter
2013/438 (PDF ) Clustering Algorithms for Non-Profiled Single-Execution Attacks on Exponentiations Johann Heyszl, Andreas Ibing, Stefan Mangard, Fabrizio De Santis, Georg Sigl
2013/437 (PDF ) A Uniform Min-Max Theorem with Applications in Cryptography Salil Vadhan, Colin Jia Zheng
2013/436 (PDF ) Fast Exhaustive Search for Quadratic Systems in $\mathbb{F}_2$ on FPGAs --- Extended Version Charles Bouillaguet, Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Bo-Yin Yang
2013/435 (PDF ) Efficient Cryptosystems From $2^k$-th Power Residue Symbols Fabrice Benhamouda, Javier Herranz, Marc Joye, Benoît Libert
2013/434 (PDF ) Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures Susan Hohenberger, Amit Sahai, Brent Waters
2013/433 (PDF ) On Symmetric Encryption with Distinguishable Decryption Failures Alexandra Boldyreva, Jean Paul Degabriele, Kenneth G. Paterson, Martijn Stam
2013/432 (PDF ) How to Sign Paper Contracts? Conjectures & Evidence Related to Equitable & Efficient Collaborative Task Scheduling Eric Brier, David Naccache, Li-yao Xia
2013/431 (PDF ) Practical-Time Attacks Against Reduced Variants of MISTY1 Orr Dunkelman, Nathan Keller
2013/430 (PDF ) Security of the Misty Structure Beyond the Birthday Bound Jooyoung Lee
2013/429 (PDF ) DupLESS: Server-Aided Encryption for Deduplicated Storage Mihir Bellare, Sriram Keelveedhi, Thomas Ristenpart
2013/428 (PDF ) Faster 128-EEA3 and 128-EIA3 Software Roberto Avanzi, Billy Bob Brumley
2013/427 (PDF ) Toeplitz matrix-vector product based GF(2^n) shifted polynomial basis multipliers for all irreducible pentanomials Jiangtao Han, Haining Fan
2013/426 (PDF ) Efficient Garbling from a Fixed-Key Blockcipher Mihir Bellare, Viet Tung Hoang, Sriram Keelveedhi, Phillip Rogaway
2013/425 (PDF ) Break WEP Faster with Statistical Analysis Rafik Chaabouni
2013/424 (PDF ) Instantiating Random Oracles via UCEs Mihir Bellare, Viet Tung Hoang, Sriram Keelveedhi
2013/423 (PDF ) Locally Computable UOWHF with Linear Shrinkage Benny Applebaum, Yoni Moses
2013/422 (PDF ) Private Database Queries Using Somewhat Homomorphic Encryption Dan Boneh, Craig Gentry, Shai Halevi, Frank Wang, David J. Wu
2013/421 (PDF ) Light-weight primitive, feather-weight security? A cryptanalytic knock-out. (Preliminary results) Valentina Banciu, Simon Hoerder, Dan Page
2013/420 (PDF ) The Holey Grail: A special score function for non-binary traitor tracing B. Skoric, J. -J. Oosterwijk, J. Doumen
2013/419 (PDF ) How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBE Rikke Bendlin, Sara Krehbiel, Chris Peikert
2013/418 (PDF ) On Tight Security Proofs for Schnorr Signatures Nils Fleischhacker, Tibor Jager, Dominique Schröder
2013/417 (PDF ) The Improved Cube Attack on Grain-v1 Yongjuan Wang, Liren Ding, Wenbao Han, Xiangyu Wang
2013/416 (PDF ) Computational Fuzzy Extractors Benjamin Fuller, Xianrui Meng, Leonid Reyzin
2013/415 (PDF ) SL2 homomorphic hash functions: Worst case to average case reduction and short collision search Ciaran Mullan, Boaz Tsaban
2013/414 (PDF ) A novel certificateless deniable authentication protocol Chunhua Jin, Chunxiang Xu, Xiaojun Zhang, Qianna Xie, Fagen Li
2013/413 (PDF ) Policy-Based Signatures Mihir Bellare, Georg Fuchsbauer
2013/412 (PDF ) Moduar Form Aprroach to Solving Lattice Problems Yuan Tian, Xueyong Zhu, Rongxin Sun
2013/411 (PDF ) Security Analysis of Lightweight Authentication Protocol from WISTP 2013 Wang Shao-Hui, Xiao Fu, Chen Dan-wei, Wang Ru-chuan
2013/410 (PDF ) Plug-and-Play IP Security: Anonymity Infrastructure Instead of PKI Yossi Gilad, Amir Herzberg
2013/409 (PDF ) Order-Preserving Encryption Secure Beyond One-Wayness Tal Malkin, Isamu Teranishi, Moti Yung
2013/408 (PDF ) Delegatable Functional Signatures Michael Backes, Sebastian Meiser, Dominique Schröder
2013/407 (PDF ) Automated Security Proofs for Almost-Universal Hash for MAC verification Martin Gagné, Pascal Lafourcade, Yassine Lakhnech
2013/405 (PDF ) New Quadratic Bent Functions in Polynomial Forms with Coefficients in Extension Fields Chunming Tang, Yanfeng Qi, Maozhi Xu
2013/404 (PDF ) The SIMON and SPECK Families of Lightweight Block Ciphers Ray Beaulieu, Douglas Shors, Jason Smith, Stefan Treatman-Clark, Bryan Weeks, Louis Wingers
2013/403 (PDF ) Function-Private Subspace-Membership Encryption and Its Applications Dan Boneh, Ananth Raghunathan, Gil Segev
2013/402 (PDF ) Efficient Two-Pass Anonymous Identity Authentication Using Smart Card Jue-Sam Chou, Chun-Hui Huang, Yu-Siang Huang, Yalin Chen
2013/401 (PDF ) Functional Signatures and Pseudorandom Functions Elette Boyle, Shafi Goldwasser, Ioana Ivan
2013/400 (PDF ) A quasi-polynomial algorithm for discrete logarithm in finite fields of small characteristic Razvan Barbulescu, Pierrick Gaudry, Antoine Joux, Emmanuel Thomé
2013/399 (PDF ) Attack on Liao and Hsiao's Secure ECC-based RFID Authentication Scheme integrated with ID-Verifier Transfer Protocol Roel Peeters, Jens Hermans
2013/398 (PDF ) ASICS: Authenticated Key Exchange Security Incorporating Certification Systems Colin Boyd, Cas Cremers, Michèle Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila
2013/397 (PDF ) Practical Secure Logging: Seekable Sequential Key Generators Giorgia Azzurra Marson, Bertram Poettering
2013/396 (PDF ) On the Practical Security of a Leakage Resilient Masking Scheme Emmanuel Prouff, Matthieu Rivain, Thomas Roche
2013/394 (PDF ) A Public Key Cryptoscheme Using Bit-pair Shadows Shenghui Su, Shuwang Lü, Maozhi Xu, Tao Xie
2013/393 (PDF ) Strongly Secure One-round Group Authenticated Key Exchange in the Standard Model Yong Li, Zheng Yang
2013/392 (PDF ) Efficient Simultaneous Privately and Publicly Verifiable Robust Provable Data Possession from Elliptic Curves Christian Hanser, Daniel Slamanig
2013/391 (PDF ) Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full $\mbox{AES}^{2}$ Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir
2013/390 (PDF ) Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption Keita Emura, Goichiro Hanaoka, Koji Nuida, Go Ohtake, Takahiro Matsuda, Shota Yamada
2013/389 (PDF ) A Capacity-Achieving Simple Decoder for Bias-Based Traitor Tracing Schemes Jan-Jaap Oosterwijk, Boris Skoric, Jeroen Doumen
2013/388 (PDF ) Parallel Gauss Sieve Algorithm : Solving the SVP in the Ideal Lattice of 128-dimensions Tsukasa Ishiguro, Shinsaku Kiyomoto, Yutaka Miyake, Tsuyoshi Takagi
2013/387 (PDF ) Cryptographically Protected Prefixes for Location Privacy in IPv6 Jonathan Trostle, Hosei Matsuoka, James Kempf, Toshiro Kawahara, Ravi Jain
2013/386 (PDF ) Side Channel Attacks against Pairing over Theta Functions Nadia El Mrabet
2013/384 (PDF ) Sequential Aggregate Signatures Made Shorter Kwangsu Lee, Dong Hoon Lee, Moti Yung
2013/383 (PDF ) Lattice Signatures and Bimodal Gaussians Léo Ducas, Alain Durmus, Tancrède Lepoint, Vadim Lyubashevsky
2013/382 (PDF ) To Hash or Not to Hash Again? (In)differentiability Results for H^2 and HMAC Yevgeniy Dodis, Thomas Ristenpart, John Steinberger, Stefano Tessaro
2013/380 (PDF ) Comments on Three Multi-Server Authentication Protocols Yalin Chen, Jue-Sam Chou, Wen-Yi Tsai
2013/379 (PDF ) Delegatable Pseudorandom Functions and Applications Aggelos Kiayias, Stavros Papadopoulos, Nikos Triandopoulos, Thomas Zacharias
2013/378 (PDF ) A note on quantum related-key attacks Martin Roetteler, Rainer Steinwandt
2013/377 (PDF ) An Algebraic Framework for Diffie-Hellman Assumptions Alex Escala, Gottfried Herold, Eike Kiltz, Carla Ràfols, Jorge Villar
2013/376 (PDF ) An Accurate Probabilistic Reliability Model for Silicon PUFs Roel Maes
2013/375 (PDF ) NaCl on 8-Bit AVR Microcontrollers Michael Hutter, Peter Schwabe
2013/374 (PDF ) A Secure and efficient elliptic curve based authentication and key agreement protocol suitable for WSN Majid Bayat, Mohammad Reza Aref
2013/373 (PDF ) Injective Encoding to Elliptic Curves Pierre-Alain Fouque, Antoine Joux, Mehdi Tibouchi
2013/372 (PDF ) Practical Bootstrapping in Quasilinear Time Jacob Alperin-Sheriff, Chris Peikert
2013/371 (PDF ) Domain-Polymorphic Programming of Privacy-Preserving Applications Dan Bogdanov, Peeter Laud, Jaak Randmets
2013/370 (PDF ) Leakage-Resilient Symmetric Cryptography Under Empirically Verifiable Assumptions François-Xavier Standaert, Olivier Pereira, Yu Yu
2013/369 (PDF ) Block Ciphers that are Easier to Mask: How Far Can we Go? Benoît Gérard, Vincent Grosso, María Naya-Plasencia, François-Xavier Standaert
2013/368 (PDF ) Security in $O(2^n)$ for the Xor of Two Random Permutations\\ -- Proof with the standard $H$ technique-- Jacques Patarin
2013/367 (PDF ) On the Security of TLS-DH and TLS-RSA in the Standard Model Florian Kohlar, Sven Schäge, Jörg Schwenk
2013/366 (PDF ) Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128 Pierre-Alain Fouque, Jérémy Jean, Thomas Peyrin
2013/365 (PDF ) Efficient eCK-secure Authenticated Key Exchange Protocols in the Standard Model Zheng Yang
2013/364 (PDF ) On the Achievability of Simulation-Based Security for Functional Encryption Angelo De Caro, Vincenzo Iovino Abhishek Jain, Adam O'Neill, Omer Paneth, Giuseppe Persiano
2013/363 (PDF ) A New Class of Public Key Cryptosystems Constructed Based on Reed-Solomon Codes, K(XII)SE(1)PKC.-- Along with a presentation of K(XII)SE(1)PKC over the extension field extensively used for present day various storage and transmission systems -- Masao KASAHARA
2013/362 (PDF ) A Fast Implementation of the Optimal Ate Pairing over BN curve on Intel Haswell Processor Shigeo MITSUNARI
2013/361 (PDF ) Linearly Homomorphic Structure-Preserving Signatures and Their Applications Benoit Libert, Thomas Peters, Marc Joye, Moti Yung
2013/360 (PDF ) Achieving the limits of the noisy-storage model using entanglement sampling Frédéric Dupuis, Omar Fawzi, Stephanie Wehner
2013/359 (PDF ) A heuristic for finding compatible differential paths with application to HAS-160 Aleksandar Kircanski, Riham AlTawy, Amr M. Youssef
2013/358 (PDF ) Counter-cryptanalysis Marc Stevens
2013/357 (PDF ) The LOCAL attack: Cryptanalysis of the authenticated encryption scheme ALE Dmitry Khovratovich, Christian Rechberger
2013/356 (PDF ) Verifying Computations with State (Extended Version) Benjamin Braun, Ariel J. Feldman, Zuocheng Ren, Srinath Setty, Andrew J. Blumberg, Michael Walfish
2013/355 (PDF ) New Attacks against Transformation-Based Privacy-Preserving Linear Programming Peeter Laud, Alisa Pankova
2013/354 (PDF ) Programmable Hash Functions in the Multilinear Setting Eduarda S. V. Freire, Dennis Hofheinz, Kenneth G. Paterson, Christoph Striecks
2013/353 (PDF ) Profiling DPA: Efficacy and efficiency trade-offs Carolyn Whitnall, Elisabeth Oswald
2013/352 (PDF ) Constrained Pseudorandom Functions and Their Applications Dan Boneh, Brent Waters
2013/351 (PDF ) Time-Optimal Interactive Proofs for Circuit Evaluation Justin Thaler
2013/350 (PDF ) Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions Paul Baecher, Pooya Farshim, Marc Fischlin, Martijn Stam
2013/349 (PDF ) A Dynamic Tradeoff Between Active and Passive Corruptions in Secure Multi-Party Computation Martin Hirt, Christoph Lucas, Ueli Maurer
2013/348 (PDF ) Multi-file proofs of retrievability for cloud storage auditing Bin Wang, Xiaojing Hong
2013/347 (PDF ) STES: A Stream Cipher Based Low Cost Scheme for Securing Stored Data Debrup Chakraborty, Cuauhtemoc Mancillas-Lopez, Palash Sarkar
2013/346 (PDF ) Using Bleichenbacher's Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-Bit ECDSA Elke De Mulder, Michael Hutter, Mark E. Marson, Peter Pearson
2013/345 (PDF ) Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012 Arnab Roy, Srinivas Vivek
2013/344 (PDF ) Limits of provable security for homomorphic encryption Andrej Bogdanov, Chin Ho Lee
2013/343 (PDF ) Quantum one-time programs Anne Broadbent, Gus Gutoski, Douglas Stebila
2013/342 (PDF ) Attribute-Based Encryption for a Subclass of Circuits with Bounded Depth from Lattices Xiang Xie, Rui Xue
2013/341 (PDF ) Trapdoor Smooth Projective Hash Functions Fabrice Benhamouda, David Pointcheval
2013/340 (PDF ) Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based Craig Gentry, Amit Sahai, Brent Waters
2013/339 (PDF ) On the Security of the TLS Protocol: A Systematic Analysis Hugo Krawczyk, Kenneth G. Paterson, Hoeteck Wee
2013/338 (PDF ) Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust Yevgeniy Dodis, David Pointcheval, Sylvain Ruhault, Damien Vergnaud, Daniel Wichs
2013/337 (PDF ) Attribute-Based Encryption for Circuits Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee
2013/335 (PDF ) Parallel and Dynamic Searchable Symmetric Encryption Seny Kamara, Charalampos Papamanthou
2013/334 (PDF ) Protecting PUF Error Correction by Codeword Masking Dominik Merli, Frederic Stumpf, Georg Sigl
2013/333 (PDF ) Double-authentication-preventing signatures Bertram Poettering, Douglas Stebila
2013/332 (PDF ) A method for obtaining lower bounds on the higher order nonlinearity of Boolean function Mikhail S. Lobanov
2013/331 (PDF ) New Constructions and Applications of Trapdoor DDH Groups Yannick Seurin
2013/330 (PDF ) Trapdoor Privacy in Asymmetric Searchable Encryption Schemes Afonso Arriaga, Qiang Tang, Peter Ryan
2013/329 (PDF ) Protocol Variants and Electronic Identification Kristian Gjøsteen
2013/328 (PDF ) Towards Finding Optimal Differential Characteristics for ARX: Application to Salsa20 Nicky Mouha, Bart Preneel
2013/327 (PDF ) A Lightweight Hash Function Resisting Birthday Attack and Meet-in-the-middle Attack Shenghui Su, Tao Xie, Shuwang Lü
2013/326 (PDF ) Key-Versatile Signatures and Applications: RKA, KDM and Joint Enc/Sig Mihir Bellare, Sarah Meiklejohn, Susan Thomson
2013/325 (PDF ) Elligator: Elliptic-curve points indistinguishable from uniform random strings Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, Tanja Lange
2013/324 (PDF ) Sieve-in-the-Middle: Improved MITM Attacks (Full Version) Anne Canteaut, María Naya-Plasencia, Bastien Vayssiere
2013/323 (PDF ) Encryption Schemes with Post-Challenge Auxiliary Inputs Tsz Hon Yuen, Ye Zhang, Siu-Ming Yiu
2013/322 (PDF ) BLAKE2: simpler, smaller, fast as MD5 Jean-Philippe Aumasson, Samuel Neves, Zooko Wilcox-O'Hearn, Christian Winnerlein
2013/321 (PDF ) Generic Constructions of Secure-Channel Free Searchable Encryption with Adaptive Security Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman, Kazumasa Omote
2013/320 (PDF ) Instantaneous Frequency Analysis Roman Korkikian, David Naccache, Guilherme Ozari de Almeida
2013/319 (PDF ) On the use of continued fractions for stream ciphers Amadou Moctar Kane
2013/318 (PDF ) Fully-Anonymous Functional Proxy-Re-Encryption Yutaka Kawai, Katsuyuki Takashima
2013/317 (PDF ) Anon-Pass: Practical Anonymous Subscriptions Michael Z. Lee, Alan M. Dunn, Jonathan Katz, Brent Waters, Emmett Witchel
2013/316 (PDF ) Certified computer-aided cryptography: efficient provably secure machine code from high-level implementations José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir
2013/315 (PDF ) Hybrid Approach for the Fast Verification for Improved Versions of the UOV and Rainbow Signature Schemes Albrecht Petzoldt
2013/314 (PDF ) Keyed Side-Channel Based Hashing for IP Protection using Wavelets Timo Bartkewitz
2013/313 (PDF ) Pairing Inversion via Non-degenerate Auxiliary Pairings Seunghwan Chang, Hoon Hong, Eunjeong Lee, Hyang-Sook Lee
2013/312 (PDF ) Families of fast elliptic curves from Q-curves Benjamin Smith
2013/311 (PDF ) Four-dimensional GLV via the Weil restriction Aurore Guillevic, Sorina Ionica
2013/310 (PDF ) MinimaLT: Minimal-latency Networking Through Better Security W. Michael Petullo, Xu Zhang, Jon A. Solworth, Daniel J. Bernstein, Tanja Lange
2013/309 (PDF ) Bypassing Passkey Authentication in Bluetooth Low Energy Tomas Rosa
2013/308 (PDF ) Lattice-Based Group Signatures with Logarithmic Signature Size Fabien Laguillaumie, Adeline Langlois, Benoit Libert, Damien Stehle
2013/307 (PDF ) Maliciously Circuit-Private FHE Rafail Ostrovsky, Anat Paskin-Cherniavsky, Beni Paskin-Cherniavsky
2013/306 (PDF ) Solving a $6120$-bit DLP on a Desktop Computer Faruk Golouglu, Robert Granger, Gary McGuire, Jens Zumbragel
2013/305 (PDF ) Towards Fresh Re-Keying with Leakage-Resilient PRFs: Cipher Design Principles and Analysis Sonia Belaid, Fabrizio De Santis, Johann Heyszl, Stefan Mangard, Marcel Medwed, Jorn-Marc Schmidt, Francois-Xavier Standaert, Stefan Tillich
2013/304 (PDF ) Secure PRNG Seeding on Commercial Off-the-Shelf Microcontrollers Anthony Van Herrewege, Vincent van der Leest, André Schaller, Stefan Katzenbeisser, Ingrid Verbauwhede
2013/303 (PDF ) Theory of masking with codewords in hardware: low-weight $d$th-order correlation-immune Boolean functions Shivam Bhasin, Claude Carlet, Sylvain Guilley
2013/302 (PDF ) Cryptanalysis of Grigoriev-Shpilrain Physical Asymmetric Scheme With Capacitors Nicolas T. Courtois
2013/301 (PDF ) Impossible Differential-Linear Cryptanalysis of Reduced-Round CLEFIA-128 Zheng Yuan, Xian Li, Bart Preneel
2013/300 (PDF ) A Profitable Sub-Prime Loan: Obtaining the Advantages of Composite Order in Prime-Order Bilinear Groups Allison Lewko, Sarah Meiklejohn
2013/299 (PDF ) Computing class polynomials for abelian surfaces Andres Enge, Emmanuel Thomé
2013/298 (PDF ) Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests Luke Mather, Elisabeth Oswald, Joe Bandenburg, Marcin Wojcik
2013/297 (PDF ) Improvement and Efficient Implementation of a Lattice-based Signature Scheme Rachid El Bansarkhani, Johannes Buchmann
2013/296 (PDF ) Universally Composable Symbolic Analysis for Two-Party Protocols based on Homomorphic Encryption Morten Dahl, Ivan Damgård
2013/295 (PDF ) Survey and Benchmark of Lightweight Block Ciphers for Wireless Sensor Networks Mickaël Cazorla, Kevin Marquet, Marine Minier
2013/294 (PDF ) Synchronous Sampling and Clock Recovery of Internal Oscillators for Side Channel Analysis Colin O'Flynn, Zhizhang (David) Chen
2013/293 (PDF ) A Toolkit for Ring-LWE Cryptography Vadim Lyubashevsky, Chris Peikert, Oded Regev
2013/292 (PDF ) A Leakage Resilient MAC Daniel P. Martin, Elisabeth Oswald, Martijn Stam, Marcin Wojcik
2013/291 (PDF ) Security ranking among assumptions within the Uber assumption framework Antoine Joux, Antoine Rojat
2013/290 (PDF ) Massive Group Message Authentication with Revocable Anonymity Boaz Catane, Amir Herzberg
2013/289 (PDF ) Secure Second Price Auctions with a Rational Auctioneer Boaz Catane, Amir Herzberg
2013/288 (PDF ) Key Classification Attack on Block Ciphers Maghsoud Parviz, Seyed Hassan Mousavi, Saeed Mirahmadi
2013/287 (PDF ) The failure of McEliece PKC based on Reed-Muller codes. I. V. Chizhov, M. A. Borodin
2013/286 (PDF ) Salvaging Indifferentiability in a Multi-stage Setting Arno Mittelbach
2013/285 (PDF ) A Novel Proof on Weil Pairing Sutirtha Sanyal
2013/284 (PDF ) A Secure Paper-Based Electronic Voting With No Encryption Asghar Tavakkoli, Reza Ebrahimi Atani
2013/283 (PDF ) Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption Dan Boneh, Ananth Raghunathan, Gil Segev
2013/282 (PDF ) Three Snakes in One Hole: The First Systematic Hardware Accelerator Design for SOSEMANUK with Optional Serpent and SNOW 2.0 Modes Goutam Paul, Anupam Chattopadhyay
2013/281 (PDF ) Adapting Lyubashevsky’s Signature Schemes to the Ring Signature Setting Carlos Aguilar-Melchor, Slim Bettaieb, Xavier Boyen, Laurent Fousse, Philippe Gaborit
2013/280 (PDF ) Path ORAM: An Extremely Simple Oblivious RAM Protocol Emil Stefanov, Marten van Dijk, Elaine Shi, T-H. Hubert Chan, Christopher Fletcher, Ling Ren, Xiangyao Yu, Srinivas Devadas
2013/279 (PDF ) Pinocchio: Nearly Practical Verifiable Computation Bryan Parno, Craig Gentry, Jon Howell, Mariana Raykova
2013/278 (PDF ) A Frequency Leakage Model and its application to CPA and DPA S. Tiran, S. Ordas, Y. Teglia, M. Agoyan, P. Maurine
2013/277 (PDF ) ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo
2013/276 (PDF ) Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs David Bernhard, Stephan Neumann, Melanie Volkamer
2013/275 (PDF ) The Potential of an Individualized Set of trusted CAs: Defending against CA Failures in the Web PKI (Extended Version) Johannes Braun, Gregor Rynkowski
2013/273 (PDF ) Computing the Rank of Incidence Matrix and the Algebraic Immunity of Boolean Functions Deepak Kumar Dalai
2013/272 (PDF ) Cryptography Challenges for Computational Privacy in Public Clouds Sashank Dara
2013/271 (PDF ) The Legal Classification of Identity-Based Signatures Christoph Sorge
2013/270 (PDF ) Pseudorandom Generators from Regular One-way Functions: New Constructions with Improved Parameters Yu Yu
2013/269 (PDF ) CMCC: Misuse Resistant Authenticated Encryption with Minimal Ciphertext Expansion Jonathan Trostle
2013/268 (PDF ) Dynamic Cube Attack on Grain-v1 Majid Rahimi, Mostafa Barmshory, Mohammad Hadi Mansouri, Mohammad Reza Aref
2013/267 (PDF ) Multi-Party Computation of Polynomials and Branching Programs without Simultaneous Interaction S. Dov Gordon, Tal Malkin, Mike Rosulek, Hoeteck Wee
2013/266 (PDF ) L-P States of RC4 Stream Cipher Jing Lv, Dongdai Lin
2013/265 (PDF ) Attribute-Based Encryption with Fast Decryption Susan Hohenberger, Brent Waters
2013/264 (PDF ) Encrypted Secret Sharing and Analysis by Plaintext Randomization Stephen R. Tate, Roopa Vishwanathan, Scott Weeks
2013/263 (PDF ) Speeding up QUAD Albrecht Petzoldt
2013/262 (PDF ) An efficient FHE based on the hardness of solving systems of non-linear multivariate equations Gérald Gavin
2013/261 (PDF ) Secure information transmission based on physical principles Dima Grigoriev, Vladimir Shpilrain
2013/260 (PDF ) From Weak to Strong Zero-Knowledge and Applications Kai-Min Chung, Edward Lui, Rafael Pass
2013/259 (PDF ) Private Interactive Communication Across an Adversarial Channel Ran Gelles, Amit Sahai, Akshay Wadia
2013/258 (PDF ) Witness Encryption and its Applications Sanjam Garg, Craig Gentry, Amit Sahai, Brent Waters
2013/257 (PDF ) Secure two-party computation: a visual way Paolo D'Arco, Roberto De Prisco
2013/256 (PDF ) On the Lossiness of the Rabin Trapdoor Function Yannick Seurin
2013/255 (PDF ) How to Construct an Ideal Cipher from a Small Set of Public Permutations Rodolphe Lampe, Yannick Seurin
2013/254 (PDF ) Towards Adoption of DNSSEC: Availability and Security Challenges Amir Herzberg, Haya Shulman
2013/253 (PDF ) CacheAudit: A Tool for the Static Analysis of Cache Side Channels Goran Doychev, Dominik Feld, Boris Köpf, Laurent Mauborgne, Jan Reineke
2013/252 (PDF ) On the Primitivity of some Trinomials over Finite Fields LI Yujuan, WANG Huaifu, ZHAO Jinhua
2013/251 (PDF ) Permutation Polynomials and Their Differential Properties over Residue Class Rings Yuyin Yu, Mingsheng Wang
2013/250 (PDF ) Fully Homomorphic Encryption for Mathematicians Alice Silverberg
2013/249 (PDF ) How to Factor N_1 and N_2 When p_1=p_2 mod 2^t Kaoru Kurosawa, Takuma Ueda
2013/248 (PDF ) Another Look at Security Theorems for 1-Key Nested MACs Neal Koblitz, Alfred Menezes
2013/247 (PDF ) Leakage-resilient Attribute-based Encryptions with Fast Decryption: Model, Analysis and Construction Mingwu Zhang, Wei Shi, Chunzhi Wang, Zhenhua Chen, Yi Mu
2013/246 (PDF ) A New Lever Function with Adequate Indeterminacy Shenghui Su, Ping Luo, Shuwang Lv, Maozhi Xu
2013/245 (PDF ) The Fiat-Shamir Transformation in a Quantum World Özgür Dagdelen, Marc Fischlin, Tommaso Gagliardoni
2013/244 (PDF ) Cryptographic schemes, key exchange, public key. Ted Hurley
2013/243 (PDF ) A Simple ORAM Kai-Min Chung, Rafael Pass
2013/242 (PDF ) AE5 Security Notions: Definitions Implicit in the CAESAR Call Chanathip Namprempre, Phillip Rogaway, Tom Shrimpton
2013/241 (PDF ) The Perils of Repeating Patterns: Observation of Some Weak Keys in RC4 Joachim Strömbergson, Simon Josefsson
2013/240 (PDF ) Algebraic analysis of Trivium-like ciphers Sui-Guan Teo, Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson
2013/239 (PDF ) Optimizing ORAM and Using it Efficiently for Secure Computation Craig Gentry, Kenny Goldman, Shai Halevi, Charanjit Julta, Mariana Raykova, Daniel Wichs
2013/238 (PDF ) Anonymity-preserving Public-Key Encryption: A Constructive Approach Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Björn Tackmann, Daniele Venturi
2013/237 (PDF ) Type-Based Analysis of Generic Key Management APIs (Long Version) Pedro Adão, Riccardo Focardi, Flaminia L. Luccio
2013/236 (PDF ) A Ciphertext-Policy Attribute-Based Proxy Re-Encryption with Chosen-Ciphertext Security Kaitai Liang, Liming Fang, Duncan S. Wong, Willy Susilo
2013/235 (PDF ) Ballot secrecy and ballot independence: definitions and relations Ben Smyth, David Bernhard
2013/234 (PDF ) A Cryptographic Analysis of OPACITY Özgür Dagdelen, Marc Fischlin, Tommaso Gagliardoni, Giorgia Azzurra Marson, Arno Mittelbach, Cristina Onete
2013/233 (PDF ) Attacks on JH, Grøstl and SMASH Hash Functions Yiyuan Luo, Xuejia Lai
2013/232 (PDF ) Quantum algorithms to check Resiliency, Symmetry and Linearity of a Boolean function Kaushik Chakraborty, Anupam Chattopadhyay, Subhamoy Maitra
2013/231 (PDF ) Sakura: a flexible coding for tree hashing Guido Bertoni, Joan Daemen, Michael Peeters, Gilles Van Assche
2013/230 (PDF ) Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt'' Yang Wang, Mark Manulis, Man Ho Au, Willy Susilo
2013/229 (PDF ) How to Run Turing Machines on Encrypted Data Shafi Goldwasser, Yael Kalai, Raluca Ada Popa, Vinod Vaikuntanathan, Nickolai Zeldovich
2013/228 (PDF ) Public-Key Revocation and Tracing Schemes with Subset Difference Methods Revisited Kwangsu Lee, Woo Kwon Koo, Dong Hoon Lee, Jong Hwan Park
2013/227 (PDF ) Analysis of authentication and key establishment in inter-generational mobile telephony Chunyu Tang, David A. Naumann, Susanne Wetzel
2013/226 (PDF ) Public key exchange using semidirect product of (semi)groups Maggie Habeeb, Delaram Kahrobaei, Charalambos Koupparis, Vladimir Shpilrain
2013/225 (PDF ) Transparent, Distributed, and Replicated Dynamic Provable Data Possession Mohammad Etemad, Alptekin Küpçü
2013/224 (PDF ) On the Need of Physical Security for Small Embedded Devices: a Case Study with COMP128-1 Implementations in SIM Cards Yuanyuan Zhou, Yu Yu, François-Xavier Standaert, Jean-Jacques Quisquater
2013/223 (PDF ) The PACE|AA Protocol for Machine Readable Travel Documents, and its Security Jens Bender, Özgür Dagdelen, Marc Fischlin, Dennis Kügler
2013/222 (PDF ) Tight security bounds for key-alternating ciphers Shan Chen, John Steinberger
2013/221 (PDF ) Identity-based Aggregate Signatures with Verifiable Single Ones Yang Zhang, Jun-liang Chen
2013/220 (PDF ) Towards Efficient Private Distributed Computation on Unbounded Input Streams Shlomi Dolev, Juan Garay, Niv Gilboa, Vladimir Kolesnikov, Yelena Yuditsky
2013/219 (PDF ) Designing a Hybrid Attribute-Based Encryption Scheme Supporting Dynamic Attributes Stefan G. Weber
2013/218 (PDF ) Comparing the Pairing Efficiency over Composite-Order and Prime-Order Elliptic Curves Aurore Guillevic
2013/217 (PDF ) Computing on Authenticated Data for Adjustable Predicates Björn Deiseroth, Victoria Fehr, Marc Fischlin, Manuel Maasz, Nils Fabian Reimers, Richard Stein
2013/216 (PDF ) Election Verifiability or Ballot Privacy: Do We Need to Choose? Edouard Cuvelier, Olivier Pereira, Thomas Peters
2013/215 (PDF ) Optical PUFs Reloaded Ulrich Rührmair, Christian Hilgers, Sebastian Urban, Agnes Weiershäuser, Elias Dinter, Brigitte Forster, Christian Jirauschek
2013/214 (PDF ) Remotegrity: Design and Use of an End-to-End Verifiable Remote Voting System Filip Zagorski, Richard T. Carback, David Chaum, Jeremy Clark, Aleksander Essex, Poorvi L. Vora
2013/213 (PDF ) On the Impacts of Mathematical Realization over Practical Security of Leakage Resilient Cryptographic Schemes Guangjun Fan, Yongbin Zhou, F. -X. Standaert, Dengguo Feng
2013/212 (PDF ) A Closer Look at HMAC Krzysztof Pietrzak
2013/211 (PDF ) A new criterion for avoiding the propagation of linear relations through an Sbox (Full version) Christina Boura, Anne Canteaut
2013/210 (PDF ) Cryptophia's Short Combiner for Collision-Resistant Hash Functions Arno Mittelbach
2013/209 (PDF ) New modular multiplication and division algorithms based on continued fraction expansion Mourad Gouicem
2013/208 (PDF ) CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud Computing Yi-Ruei Chen, Cheng-Kang Chu, Wen-Guey Tzeng, Jianying Zhou
2013/207 (PDF ) Self-blindable Credential: Towards LightWeight Anonymous Entity Authentication Yanjiang Yang, Xuhua Ding, Haibing Lu, Jian Weng
2013/206 (PDF ) Privacy-Preserving Billing for e-Ticketing Systems in Public Transportation Florian Kerschbaum, Hoon Wei Lim, Ivan Gudymenko
2013/205 (PDF ) Practical and Employable Protocols for UC-Secure Circuit Evaluation over $Z_n$ Jan Camenisch, Robert R. Enderlein, Victor Shoup
2013/204 (PDF ) Computing Privacy-Preserving Edit Distance and Smith-Waterman Problems on the GPU Architecture Shi Pu, Jyh-Charn Liu
2013/203 (PDF ) From oblivious AES to efficient and secure database join in the multiparty setting Sven Laur, Riivo Talviste, Jan Willemson
2013/202 (PDF ) Breaking NLM-MAC Generator Mohammad Ali Orumiehchiha, Josef Pieprzyk, Ron Steinfeld
2013/201 (PDF ) Non-malleable Codes from Additive Combinatorics Divesh Aggarwal, Yevgeniy Dodis, Shachar Lovett
2013/200 (PDF ) Selecting polynomials for the Function Field Sieve Razvan Barbulescu
2013/199 (PDF ) Quantum algorithms for the subset-sum problem Daniel J. Bernstein, Stacey Jeffery, Tanja Lange, Alexander Meurer
2013/198 (PDF ) On Evaluating Circuits with Inputs Encrypted by Different Fully Homomorphic Encryption Schemes Zhizhou Li, Ten H. Lai
2013/197 (PDF ) Discrete logarithm in GF(2^809) with FFS Razvan Barbulescu, Cyril Bouvier, Jérémie Detrey, Pierrick Gaudry, Hamza Jeljeli, Emmanuel Thomé, Marion Videau, Paul Zimmermann
2013/196 (PDF ) Fast Two-Party Secure Computation with Minimal Assumptions abhi shelat, Chih-hao Shen
2013/195 (PDF ) On the (re)design of an FPGA-based PUF Philipp Grabher, Dan Page, Marcin Wójcik
2013/194 (PDF ) On the Impossibility of Cryptography with Tamperable Randomness Per Austrin, Kai-Min Chung, Mohammad Mahmoody, Rafael Pass, Karn Seth
2013/193 (PDF ) Certificateless Signatures: Structural Extensions of Security Models and New Provably Secure Schemes Yu-Chi Chen, Raylin Tso, Willy Susilo, Xinyi Huang, Gwoboa Horng
2013/192 (PDF ) A generalisation of Miller's algorithm and applications to pairing computations on abelian varieties David Lubicz, Damien Robert
2013/191 (PDF ) Improved Differential Fault Analysis on ARIA using Small Number of Faults Yuseop Lee, Kitae Jeong, Jaechul Sung, Seokhie Hong
2013/190 (PDF ) Power Analysis Attacks against FPGA Implementations of KLEIN Shaohua Tang, Jianhao Wu, Weijian Li, Zheng Gong
2013/189 (PDF ) Ideal and Perfect Hierarchical Secret Sharing Schemes based on MDS codes Appala Naidu Tentu, Prabal Paul, V Ch Venkaiah
2013/188 (PDF ) A family of 6-to-4-bit S-boxes with large linear branch number Daniel Loebenberger, Michael Nüsken
2013/187 (PDF ) Enhanced Ownership Transfer Protocol for RFID in an Extended Communication Model Jorge Munilla, Alberto Peinado, Guoming Yang, Willy Susilo
2013/186 (PDF ) On the (Im)possibility of Projecting Property in Prime-Order Setting Jae Hong Seo
2013/185 (PDF ) Security Analysis of Linearly Filtered NLFSRs Mohammad Ali Orumiehchiha, Josef Pieprzyk, Ron Steinfeld, Harry Bartlett
2013/184 (PDF ) The Vernam cipher is robust to small deviations from randomness Boris Ryabko
2013/183 (PDF ) Practical Multilinear Maps over the Integers Jean-Sebastien Coron, Tancrede Lepoint, Mehdi Tibouchi
2013/182 (PDF ) Collusion-Resistant Domain-Specific Pseudonymous Signatures Julien Bringer, Herve Chabanne, Alain Patey
2013/181 (PDF ) On the evaluation of modular polynomials Andrew V. Sutherland
2013/180 (PDF ) A New Class of Product-sum Type Public Key Cryptosystem,K(V)$\Sigma\Pi$PKC,Constructed Based on Maximum Length Code Masao KASAHARA
2013/179 (PDF ) Malleable Signatures: Complex Unary Transformations and Delegatable Anonymous Credentials Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn
2013/178 (PDF ) Cryptanalysis of RC4(n,m) Stream Cipher Mohammad Ali Orumiehchiha, Josef Pieprzyk, Elham Shakour, Ron Steinfeld
2013/177 (PDF ) A generic construction for voting correctness at minimum cost - Application to Helios Veronique Cortier, David Galindo, Stephane Glondu, Malika Izabachene
2013/176 (PDF ) Distinguishing Attacks on RC4 and A New Improvement of the Cipher Jing Lv, Bin Zhang, Dongdai Lin
2013/175 (PDF ) Machine-Generated Algorithms, Proofs and Software for the Batch Verification of Digital Signature Schemes Joseph A. Akinyele, Matthew Green, Susan Hohenberger, Matthew W. Pagano
2013/174 (PDF ) Cryptanalysis of Some Double-Block-Length Hash Modes of Block Ciphers with $n$-Bit Block and $n$-Bit Key Deukjo Hong, Daesung Kwon
2013/173 (PDF ) On the Classification of Differential Invariants for Multivariate Post-Quantum Cryptosystems" Ray Perlner, Daniel Smith-Tone
2013/172 (PDF ) On the Applicability of Time-Driven Cache Attacks on Mobile Devices (Extended Version) Raphael Spreitzer, Thomas Plos
2013/171 (PDF ) Confined Guessing: New Signatures From Standard Assumptions Florian Böhl, Dennis Hofheinz, Tibor Jager, Jessica Koch, Christoph Striecks
2013/170 (PDF ) Fast Collision Attack on MD5 Tao Xie, Fanbao Liu, Dengguo Feng
2013/169 (PDF ) Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries David Cash, Stanislaw Jarecki, Charanjit Jutla, Hugo Krawczyk, Marcel Rosu, Michael Steiner
2013/168 (PDF ) On secure embedded token design (Long Version) -- Quasi-looped Yao circuits and bounded leakage Simon Hoerder, Kimmo Järvinen, Dan Page
2013/167 (PDF ) Single Password Authentication Tolga Acar, Mira Belenkiy, Alptekin Küpçü
2013/166 (PDF ) On generalized semi-bent (and partially bent) Boolean functions Brajesh Kumar Singh
2013/164 (PDF ) Provably Secure LWE Encryption with Smallish Uniform Noise and Secret Daniel Cabarcas, Florian Göpfert, Patrick Weiden
2013/163 (PDF ) Search Pattern Leakage in Searchable Encryption: Attacks and New Construction Chang Liu, Liehuang Zhu, Mingzhong Wang, Yu-an Tan
2013/162 (PDF ) A Non Asymptotic Analysis of Information Set Decoding Yann Hamdaoui, Nicolas Sendrier
2013/161 (PDF ) Completeness Theorems for All Finite Stateless 2-Party Primitives Daniel Kraschewski
2013/160 (PDF ) Interactive Coding, Revisited Kai-Min Chung, Rafael Pass, Sidharth Telang
2013/159 (PDF ) Improving the Message-ciphertext Rate of Lewko's Fully Secure IBE Scheme Dingding Jia, Bao Liand Yamin Liu, Qixiang Mei
2013/158 (PDF ) Efficient and Secure Algorithms for GLV-Based Scalar Multiplication and their Implementation on GLV-GLS Curves (Extended Version) Armando Faz-Hernandez, Patrick Longa, Ana H. Sanchez
2013/157 (PDF ) The fragility of AES-GCM authentication algorithm Shay Gueron, Vlad Krasnov
2013/156 (PDF ) Incentivizing Outsourced Computation Mira Belenkiy, Melissa Chase, C. Chris Erway, John Jannotti, Alptekin Küpçü, Anna Lysyanskaya
2013/155 (PDF ) MiniLEGO: Efficient Secure Two-Party Computation From General Assumptions Tore Kasper Frederiksen, Thomas Pelle Jakobsen, Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi
2013/154 (PDF ) Optimal Suspicion Functions for Tardos Traitor Tracing Schemes Jan-Jaap Oosterwijk, Boris Skoric, Jeroen Doumen
2013/153 (PDF ) On the security of a certicateless signature scheme in the standard model Lin Cheng, Qiaoyan Wen, Zhengping Jin, Hua Zhang
2013/152 (PDF ) Policy-based Secure Deletion Christian Cachin, Kristiyan Haralambiev, Hsu-Chun Hsiao, Alessandro Sorniotti
2013/151 (PDF ) Some Fixes To SSH Xu ZiJie
2013/150 (PDF ) Practical (Second) Preimage Attacks on TCS_SHA-3 Gautham Sekar, Soumyadeep Bhattacharya
2013/149 (PDF ) Secure and Constant Cost Public Cloud Storage Auditing with Deduplication Jiawei Yuan, Shucheng Yu
2013/148 (PDF ) AES-like ciphers: are special S-boxes better then random ones? (Virtual isomorphisms again) Alexander Rostovtsev
2013/147 (PDF ) A note on the practical complexity of the NFS in the medium prime case: Smoothness of Norms Naomi Benger, Manuel Charlemagne, Kefei Chen
2013/146 (PDF ) High-Performance Scalar Multiplication using 8-Dimensional GLV/GLS Decomposition Joppe W. Bos, Craig Costello, Huseyin Hisil, Kristin Lauter
2013/145 (PDF ) Key Wrapping with a Fixed Permutation Dmitry Khovratovich
2013/144 (PDF ) On Weak Keys and Forgery Attacks against Polynomial-based MAC Schemes Gordon Procter, Carlos Cid
2013/143 (PDF ) An architecture for practical actively secure MPC with dishonest majority Marcel Keller, Peter Scholl, Nigel P. Smart
2013/142 (PDF ) A NEW METHOD OF CHOOSING PRIMITIVE ELEMENTS FOR BREZING-WENG FAMILIES OF PAIRING FRIENDLY ELLIPTIC CURVES Kisoon YOON
2013/141 (PDF ) Non-isomorphic Biclique Cryptanalysis and Its Application to Full-Round mCrypton M. Shakiba, M. Dakhilalian, H. Mala
2013/140 (PDF ) Limitations of the Meta-Reduction Technique: The Case of Schnorr Signatures Marc Fischlin, Nils Fleischhacker
2013/139 (PDF ) Rethinking Definitions of Security for Session Key Agreement Wesley George, Charles Rackoff
2013/138 (PDF ) Multi-bit homomorphic encryption based on learning with errors over rings Zhang Wei, Liu Shuguang, Yang Xiaoyuan
2013/137 (PDF ) How to Hide Circuits in MPC: An Efficient Framework for Private Function Evaluation Payman Mohassel, Saeed Sadeghian
2013/136 (PDF ) 2048XKS-F & 4096XKS-F - Two Software Oriented High Security Block Ciphers Dieter Schmidt
2013/135 (PDF ) An MQ/Code Cryptosystem Proposal Leonard J. Schulman
2013/134 (PDF ) Hard-Core Predicates for a Diffie-Hellman Problem over Finite Fields Nelly Fazio, Rosario Gennaro, Irippuge Milinda Perera, William E. Skeith III
2013/133 (PDF ) New Lattice Based Signature Using The Jordan Normal Form Hemlata Nagesh, Birendra Kumar Sharma
2013/132 (PDF ) Yet Another Attack On the Chinese Remainder Theorem Based Hierarchical Access Control Scheme Niu Liu, Shaohua Tang, Lingling Xu
2013/131 (PDF ) Two is the fastest prime: lambda coordinates for binary elliptic curves Thomaz Oliveira, Julio López, Diego F. Aranha, Francisco Rodríguez-Henríquez
2013/130 (PDF ) Blank Digital Signatures Christian Hanser, Daniel Slamanig
2013/129 (PDF ) An Ideal-Security Protocol for Order-Preserving Encoding Raluca Ada Popa, Frank H. Li, Nickolai Zeldovich
2013/128 (PDF ) Attribute-Based Encryption for Circuits from Multilinear Maps Sanjam Garg, Craig Gentry, Shai Halevi, Amit Sahai, Brent Waters
2013/127 (PDF ) Oblivious PAKE: Efficient Handling of Password Trials Franziskus Kiefer, Mark Manulis
2013/126 (PDF ) Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key Aysajan Abidin, Jan-Åke Larsson
2013/125 (PDF ) Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions Ananth Raghunathan, Gil Segev, Salil Vadhan
2013/123 (PDF ) Analysis and Improvement of Lindell's UC-Secure Commitment Schemes Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud
2013/122 (PDF ) Practical collision attack on 40-step RIPEMD-128 Gaoli Wang
2013/121 (PDF ) Succinct Non-Interactive Zero Knowledge Arguments from Span Programs and Linear Error-Correcting Codes Helger Lipmaa
2013/120 (PDF ) An Attack Against Fixed Value Discrete Logarithm Representations Gergely Alpár, Jaap-Henk Hoepman, Wouter Lueks
2013/119 (PDF ) Speeding up Ate Pairing Computation in Affine Coordinates Duc-Phong Le, Chik How Tan
2013/118 (PDF ) Throughput Optimized Implementations of QUAD Jason R. Hamlet, Robert W. Brocato
2013/117 (PDF ) On r-th Root Extraction Algorithm in F_q For q=lr^s+1 (mod r^(s+1)) with 0 < l < r and Small s Namhun Koo, Gook Hwa Cho, Soonhak Kwon
2013/116 (PDF ) The Algorithm of AAES Shiyong Zhang, Gongliang Chen, Lei Fan
2013/115 (PDF ) A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release Kaitai Liang, Qiong Huang, Roman Schlegel, Duncan S. Wong, Chunming Tang
2013/114 (PDF ) Public Key Exchange Using Matrices Over Group Rings Delaram Kahrobaei, Charalambos Koupparis, Vladimir Shpilrain
2013/113 (PDF ) Compact Hardware Implementations of ChaCha, BLAKE, Threefish, and Skein on FPGA Nuray At, Jean-Luc Beuchat, Eiji Okamoto, Ismail San, Teppei Yamazaki
2013/112 (PDF ) PUF Modeling Attacks on Simulated and Silicon Data Ulrich Rührmair, Jan Sölter, Frank Sehnke, Xiaolin Xu, Ahmed Mahmoud, Vera Stoyanova, Gideon Dror, Jürgen Schmidhuber, Wayne Burleson, Srinivas Devadas
2013/111 (PDF ) Message Authentication Codes Secure against Additively Related-Key Attacks Keita Xagawa
2013/110 (PDF ) Full Characterization of Functions that Imply Fair Coin Tossing and Ramifications to Fairness Gilad Asharov, Yehuda Lindell, Tal Rabin
2013/109 (PDF ) Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces Charanjit S. Jutla, Arnab Roy
2013/108 (PDF ) Unconditionally Secure and Universally Composable Commitments from Physical Assumptions Ivan Damgard, Alessandra Scafuro
2013/107 (PDF ) On the Arithmetic Complexity of Strassen-Like Matrix Multiplications Murat Cenk, M. Anwar Hasan
2013/105 (PDF ) Lossy Chains and Fractional Secret Sharing Yuval Ishai, Eyal Kushilevitz, Omer Strulovich
2013/104 (PDF ) A Tutorial on White-box AES James A. Muir
2013/103 (PDF ) On the Complexity of Broadcast Setup Martin Hirt, Pavel Raykov
2013/102 (PDF ) On the Negative Effects of Trend Noise and Its Applications in Side-Channel Cryptanalysis Yuchen Cao, Yongbin Zhou, Zhenmei Yu
2013/101 (PDF ) Notions of Black-Box Reductions, Revisited Paul Baecher, Chris Brzuska, Marc Fischlin
2013/100 (PDF ) Attacks and Comments on Several Recently Proposed Key Management Schemes Niu Liu, Shaohua Tang, Lingling Xu
2013/099 (PDF ) Constant-round secure two-party computation from a linear number of oblivious transfer Samuel Ranellucci, Alain Tapp
2013/098 (PDF ) Learning with Rounding, Revisited: New Reduction, Properties and Applications Joel Alwen, Stephan Krenn, Krzysztof Pietrzak, Daniel Wichs
2013/097 (PDF ) Biclique Cryptanalysis of the Full-Round KLEIN Block Cipher Zahra Ahmadian, Mahmoud Salmasizadeh, Mohammad Reza Aref
2013/096 (PDF ) State convergence in bit-based stream ciphers Sui-Guan Teo, Harry Bartlett, Ali Alhamdan, Leonie Simpson, Kenneth Koon-Ho Wong, Ed Dawson
2013/095 (PDF ) A new index calculus algorithm with complexity $L(1/4+o(1))$ in very small characteristic Antoine Joux
2013/094 (PDF ) On-the-Fly Multiparty Computation on the Cloud via Multikey Fully Homomorphic Encryption Adriana Lopez-Alt, Eran Tromer, Vinod Vaikuntanathan
2013/093 (PDF ) On the security of a certificateless aggregate signature scheme Lin Cheng, Qiaoyan Wen, Zhengping Jin, Hua Zhang, Liming Zhou
2013/092 (PDF ) Man-in-the-Middle Secure Authentication Schemes from LPN and Weak PRFs Vadim Lyubashevsky, Daniel Masny
2013/091 (PDF ) Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test based Side-Channel Distinguishers Hui Zhao, Yongbin Zhou, Francois-Xavier Standaert, Hailong Zhang
2013/089 (PDF ) Filtered nonlinear cryptanalysis of reduced-round Serpent, and the Wrong-Key Randomization Hypothesis. James McLaughlin, John A. Clark
2013/088 (PDF ) Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World Dan Boneh, Mark Zhandry
2013/087 (PDF ) Square Root Algorithm in F_q for q=2^s+1 (mod 2^(s+1)) Namhun Koo, Gook Hwa Cho, Soonhak Kwon
2013/086 (PDF ) Efficient Private File Retrieval by Combining ORAM and PIR Travis Mayberry, Erik-Oliver Blass, Agnes Hui Chan
2013/085 (PDF ) Between a Rock and a Hard Place: Interpolating Between MPC and FHE Ashish Choudhury, Jake Loftus, Emmanuela Orsini, Arpita Patra, Nigel P. Smart
2013/084 (PDF ) Security of Quantum-Readout PUFs against quadrature based challenge estimation attacks Boris Skoric, Allard P. Mosk, Pepijn W. H. Pinkse
2013/083 (PDF ) A Security Framework for Analysis and Design of Software Attestation Frederik Armknecht, Ahmad-Reza Sadeghi, Steffen Schulz, Christian Wachsmann
2013/082 (PDF ) Secret Sharing, Rank Inequalities, and Information Inequalities Sebastia Martin, Carles Padro, An Yang
2013/081 (PDF ) Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose Yan Huang, Jonathan Katz, Dave Evans
2013/080 (PDF ) An efficient attack of a McEliece cryptosystem variant based on convolutional codes Grégory Landais, Jean-Pierre Tillich
2013/079 (PDF ) Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries Yehuda Lindell
2013/078 (PDF ) Broadcast Steganography Nelly Fazio, Antonio R. Nicolosi, Irippuge Milinda Perera
2013/077 (PDF ) UC-Secure Multi-Session OT Using Tamper-Proof Hardware Kaoru Kurosawa, Ro Nojima, Le Trieu Phong
2013/076 (PDF ) Design Space Exploration and Optimization of Path Oblivious RAM in Secure Processors Ling Ren, Xiangyao Yu, Christopher W. Fletcher, Marten van Dijk, Srinivas Devadas
2013/075 (PDF ) Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme Joppe W. Bos, Kristin Lauter, Jake Loftus, Michael Naehrig
2013/074 (PDF ) On the Function Field Sieve and the Impact of Higher Splitting Probabilities: Application to Discrete Logarithms in $\F_{2^{1971}}$ and $\F_{2^{3164}}$ Faruk Göloğlu, Robert Granger, Gary McGuire, Jens Zumbrägel
2013/073 (PDF ) Zero-Knowledge Using Garbled Circuits: How To Prove Non-Algebraic Statements Efficiently Marek Jawurek, Florian Kerschbaum, Claudio Orlandi
2013/072 (PDF ) The UC approach: an application view István Vajda
2013/071 (PDF ) Relation collection for the Function Field Sieve Jérémie Detrey, Pierrick Gaudry, Marion Videau
2013/070 (PDF ) Related-key Attacks Against Full Hummingbird-2 Markku-Juhani O. Saarinen
2013/069 (PDF ) Hardness of SIS and LWE with Small Parameters Daniele Micciancio, Chris Peikert
2013/068 (PDF ) Why Proving HIBE Systems Secure is Difficult Allison Lewko, Brent Waters
2013/067 (PDF ) Power Analysis of Hardware Implementations Protected with Secret Sharing Guido Bertoni, Joan Daemen, Nicolas Debande, Thanh-Ha Le, Michael Peeters, Gilles Van Assche
2013/066 (PDF ) Analysis and Improvement of the securing RFID systems conforming to EPC Class 1 Generation 2 standard Amin Mohammadali, Zahra Ahmadian, Mohammad Reza Aref
2013/065 (PDF ) Instantiating Treeless Signature Schemes Patrick Weiden, Andreas Hülsing, Daniel Cabarcas, Johannes Buchmann
2013/064 (PDF ) Lightweight Zero-Knowledge Proofs for Crypto-Computing Protocols Sven Laur, Bingsheng Zhang
2013/063 (PDF ) A Verifiable 1-out-of-n Distributed Oblivious Transfer Protocol Christian L. F. Corniaux, Hossein Ghodosi
2013/062 (PDF ) Symbolic Universal Composability Florian Böhl, Dominique Unruh
2013/061 (PDF ) On the Indifferentiability of Key-Alternating Ciphers Elena Andreeva, Andrey Bogdanov, Yevgeniy Dodis, Bart Mennink, John P. Steinberger
2013/060 (PDF ) On FHE without bootstrapping Aayush Jain
2013/059 (PDF ) Optimized GPU Implementation and Performance Analysis of HC Series of Stream Ciphers Ayesha Khalid, Deblin Bagchi, Goutam Paul, Anupam Chattopadhyay
2013/058 (PDF ) Cryptanalysis of the Dragonfly Key Exchange Protocol Dylan Clarke, Feng Hao
2013/057 (PDF ) CRT-based Fully Homomorphic Encryption over the Integers Jinsu Kim, Moon Sung Lee, Aaram Yun, Jung Hee Cheon
2013/056 (PDF ) On Constructions of MDS Matrices from Companion Matrices for Lightweight Cryptography Kishan Chand Gupta, Indranil Ghosh Ray
2013/055 (PDF ) Secrecy without one-way functions Dima Grigoriev, Vladimir Shpilrain
2013/054 (PDF ) Joint Compartmented Threshold Access Structures Ali Aydın Selçuk, Ramazan Yılmaz
2013/053 (PDF ) A revocable certificateless signature scheme Yinxia Sun, Futai Zhang, Limin Shen, Robert H. Deng
2013/052 (PDF ) Some Complexity Results and Bit Unpredictable for Short Vector Problem Kuan Cheng
2013/051 (PDF ) Garbled Circuits Checking Garbled Circuits: More Efficient and Secure Two-Party Computation Payman Mohassel, Ben Riva
2013/050 (PDF ) Cryptanalysis and Improvement of Akleylek et al.'s cryptosystem Roohallah Rastaghi
2013/049 (PDF ) Lessons Learned From Previous SSL/TLS Attacks - A Brief Chronology Of Attacks And Weaknesses Christopher Meyer, Jörg Schwenk
2013/048 (PDF ) Power Balanced Circuits for Leakage-Power-Attacks Resilient Design Basel Halak, Julian Murphy, Alex Yakovlev
2013/047 (PDF ) Lower Bounds on the Information Ratio of Linear Secret Sharing Schemes Carles Padro
2013/046 (PDF ) Fast and Maliciously Secure Two-Party Computation Using the GPU Tore Kasper Frederiksen, Jesper Buus Nielsen
2013/044 (PDF ) Efficient Computation Outsourcing for Inverting a Class of Homomorphic Functions Fangguo Zhang, Xu Ma, Shengli Liu
2013/043 (PDF ) Differential Fault Attack on the PRINCE Block Cipher Ling Song, Lei Hu
2013/042 (PDF ) Complexity of Multi-Party Computation Functionalities Hemanta K. Maji, Manoj Prabhakaran, Mike Rosulek
2013/041 (PDF ) Trace Expression of r-th Root over Finite Field Gook Hwa Cho, Namhun Koo, Eunhye Ha, Soonhak Kwon
2013/040 (PDF ) An Efficient CCA2-Secure Variant of the McEliece Cryptosystem in the Standard Model Roohallah Rastaghi
2013/039 (PDF ) Creating a Challenge for Ideal Lattices Thomas Plantard, Michael Schneider
2013/038 (PDF ) Verifiable Data Streaming Dominique Schröder, Heike Schröder
2013/037 (PDF ) Provably Secure Identity-Based Aggregate Signcryption Scheme in Random Oracles Jayaprakash Kar
2013/036 (PDF ) Batch Fully Homomorphic Encryption over the Integers Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi
2013/034 (PDF ) New Smooth Projective Hash Functions and One-Round Authenticated Key Exchange Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud
2013/033 (PDF ) CCA-Secure IB-KEM from Identity-Based Extractable Hash Proof Systems Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao
2013/032 (PDF ) Detection of Cheaters in Non-interactive Polynomial Evaluation Maki Yoshida, Satoshi Obana
2013/031 (PDF ) An Analysis of the EMV Channel Establishment Protocol Chris Brzuska, Nigel P. Smart, Bogdan Warinschi, Gaven J. Watson
2013/030 (PDF ) On the security of an identity-based authenticated group key agreement protocol for imbalanced mobile networks Haiyan Sun
2013/029 (PDF ) Improved Differential Fault Attack on MICKEY 2.0 Subhadeep Banik, Subhamoy Maitra, Santanu Sarkar
2013/028 (PDF ) More on linear hulls of PRESENT-like ciphers and a cryptanalysis of full-round EPCBC-96 Stanislav Bulygin
2013/027 (PDF ) Anonymity Guarantees of the UMTS/LTE Authentication and Connection Protocol Ming-Feng Lee, Nigel P. Smart, Bogdan Warinschi, Gaven Watson
2013/026 (PDF ) RSA private key reconstruction from random bits using SAT solvers Constantinos Patsakis
2013/025 (PDF ) The IITM Model: a Simple and Expressive Model for Universal Composability Ralf Kuesters, Max Tuengerthal, Daniel Rausch
2013/024 (PDF ) New Cube Root Algorithm Based on Third Order Linear Recurrence Relation in Finite Field Gook Hwa Cho, Namhun Koo, Eunhye Ha, Soonhak Kwon
2013/023 (PDF ) A New Practical Identity-Based Encryption System Jong Hwan Park, Dong Hoon Lee
2013/022 (PDF ) Nonlinear cryptanalysis of reduced-round Serpent and metaheuristic search for S-box approximations. James McLaughlin, John A. Clark
2013/021 (PDF ) Rate-Limited Secure Function Evaluation Özgür Dagdelen, Payman Mohassel, Daniele Venturi
2013/020 (PDF ) Aggregate and Verifiably Encrypted Signatures from Multilinear Maps Without Random Oracles Markus Rückert, Dominique Schroeder
2013/019 (PDF ) Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers Peter Gaźi
2013/018 (PDF ) Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption Jae Hong Seo, Keita Emura
2013/017 (PDF ) Provable Security of S-BGP and other Path Vector Protocols: Model, Analysis and Extensions Alexandra Boldyreva, Robert Lychev
2013/016 (PDF ) Revocable Identity-Based Encryption Revisited: Security Model and Construction Jae Hong Seo, Keita Emura
2013/015 (PDF ) Complete and Unified Group Laws are not Enough for Elliptic Curve Cryptography Graham Enos
2013/014 (PDF ) On formal and automatic security verification of WSN transport protocols Ta Vinh Thong, Amit Dvir
2013/013 (PDF ) Efficiently Outsourcing Multiparty Computation under Multiple Keys Andreas Peter, Erik Tews, Stefan Katzenbeisser
2013/012 (PDF ) Tropical cryptography Dima Grigoriev, Vladimir Shpilrain
2013/011 (PDF ) Evolving balanced Boolean functions with optimal resistance to algebraic and fast algebraic attacks, maximal algebraic degree, and very high nonlinearity. James McLaughlin, John A. Clark
2013/010 (PDF ) Simultaneous Resettable WI from One-way Functions Kai-Min Chung, Rafael Pass
2013/009 (PDF ) Achieving Anonymity Against Major Face Recognition Algorithms Benedikt Driessen, Markus Dürmuth
2013/008 (PDF ) Non-Black-Box Simulation from One-Way Functions And Applications to Resettable Security Kai-Min Chung, Rafael Pass, Karn Seth
2013/007 (PDF ) A Matrix Approach for Constructing Quadratic APN Functions Yuyin Yu, Mingsheng Wang, Yongqiang Li
2013/006 (PDF ) Cryptanalysis of a pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks Qingfeng Cheng
2013/005 (PDF ) Efficient Multiplier for pairings over Barreto-Naehrig Curves on Virtex-6 FPGA Riadh Brinci, Walid Khmiriy, Mefteh Mbarekz, Abdellatif Ben Rabaˆa, Ammar Bouallegue, Faouzi Chekir
2013/004 (PDF ) Making NTRUEncrypt and NTRUSign as Secure as Standard Worst-Case Problems over Ideal Lattices Damien Stehlé, Ron Steinfeld
2013/003 (PDF ) On Formal Expressions of BRW-polynomials Guillermo Morales-Luna
2013/002 (PDF ) Generalized (Identity-Based) Hash Proof System and Its Applications Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao
2013/001 (PDF ) Shielding circuits with groups Eric Miles, Emanuele Viola
2012/733 (PDF ) Reusable Garbled Circuits and Succinct Functional Encryption Shafi Goldwasser, Yael Kalai, Raluca Ada Popa, Vinod Vaikuntanathan, Nickolai Zeldovich
2012/732 (PDF ) Non-Interactive Key Exchange Eduarda S. V. Freire, Dennis Hofheinz, Eike Kiltz, Kenneth G. Paterson
2012/731 (PDF ) Time-memory Trade-offs for Near-collisions Gaëtan Leurent
2012/730 (PDF ) Twisted Edwards-Form Elliptic Curve Cryptography for 8-bit AVR-based Sensor Nodes Dalin Chu, Johann Großschädl, Zhe Liu, Volker Müller, Yang Zhang
2012/729 (PDF ) On the Impossibility of Approximate Obfuscation and Applications to Resettable Cryptography Nir Bitansky, Omer Paneth
2012/728 (PDF ) Defensive Leakage Camouflage E. Brier, Q. Fortier, R. Korkikian, K. W. Magld, D. Naccache, G. Ozari de Almeida, A. Pommellet, A. H. Ragab, J. Vuillemin
2012/727 (PDF ) On the Impossibility of Sender-Deniable Public Key Encryption Dana Dachman-Soled
2012/726 (PDF ) Applications of Polynomial Properties to Verifiable Delegation of Computation and Electronic Voting Marc Obrador, Paz Morillo, Sandra Guasch
2012/725 (PDF ) Cryptanalysis of an efficient certificateless two-party authenticated key agreement protocol Qingfeng Cheng
2012/724 (PDF ) A Coding-Theoretic Approach to Recovering Noisy RSA Keys Kenneth G. Paterson, Antigoni Polychroniadou, Dale L. Sibborn
2012/723 (PDF ) Two Exponentiation Algorithms Resistant to Cross-correlation Power Analysis and to Other Known Attacks Yaacov Belenky, Zeev Geyzel, Michael Kara-Ivanov, Avraham Entelis
2012/722 (PDF ) Hardness Preserving Reductions via Cuckoo Hashing Itay Berman, Iftach Haitner, Ilan Komargodski, Moni Naor
2012/721 (PDF ) On the (In)security of Fischlin's Paradigm Prabhanjan Ananth, Raghav Bhaskar, Vipul Goyal, Vanishree Rao
2012/720 (PDF ) Faster index calculus for the medium prime case. Application to 1175-bit and 1425-bit finite fields Antoine Joux
2012/719 (PDF ) An ideal multi-secret sharing scheme based on minimal privileged coalitions Yun Song, Zhihui Li
2012/718 (PDF ) Succinct Non-Interactive Arguments via Linear Interactive Proofs Nir Bitansky, Alessandro Chiesa, Yuval Ishai, Rafail Ostrovsky, Omer Paneth
2012/717 (PDF ) Practical Yet Universally Composable Two-Server Password-Authenticated Secret Sharing Jan Camenisch, Anna Lysyanskaya, Gregory Neven
2012/716 (PDF ) Attribute-Based Functional Encryption on Lattices Xavier Boyen
2012/715 (PDF ) New Impossible Differential Attack on $\text{SAFER}_{+}$ and $\text{SAFER}_{++}$ Jingyuan Zhao, Meiqin Wang, Jiazhe Chen, Yuliang Zheng
2012/714 (PDF ) Discrete Gaussian Leftover Hash Lemma over Infinite Domains Shweta Agrawal, Craig Gentry, Shai Halevi, Amit Sahai
2012/713 (PDF ) Systematic Treatment of Remote Attestation Aurelien Francillon, Quan Nguyen, Kasper B. Rasmussen, Gene Tsudik
2012/712 (PDF ) On the Security of the Core of PRINCE Against Biclique and Differential Cryptanalysis Farzaneh Abed, Eik List, Stefan Lucks
2012/711 (PDF ) Unprovable Security of 2-Message Zero Knowledge Kai-Min Chung, Edward Lui, Mohammad Mahmoody, Rafael Pass
2012/710 (PDF ) Non Observability in the Random Oracle Model Prabhanjan Ananth, Raghav Bhaskar
2012/709 (PDF ) Further results on the distinctness of binary sequences derived from primitive sequences modulo square-free odd integers Qun-Xiong Zheng, Wen-Feng Qi
2012/708 (PDF ) Calling out Cheaters: Covert Security With Public Verifiability Gilad Asharov, Claudio Orlandi
2012/707 (PDF ) Cryptanalysis of WIDEA Gaëtan Leurent
2012/706 (PDF ) On the (In)security of the Fiat-Shamir Paradigm, Revisited Dana Dachman-Soled, Abhishek Jain, Yael Tauman Kalai, Adriana Lopez-Alt
2012/705 (PDF ) Why "Fiat-Shamir for Proofs" Lacks a Proof Nir Bitansky, Sanjam Garg, Daniel Wichs
2012/704 (PDF ) On the Non-malleability of the Fiat-Shamir Transform Sebastian Faust, Markulf Kohlweiss, Giorgia Azzurra Marson, Daniele Venturi
2012/703 (PDF ) Profiled Model Based Power Simulator for Side Channel Evaluation Nicolas Debande, Maël Berthier, Yves Bocktaels, Thanh-Ha Le
2012/702 (PDF ) Cryptanalysis of RAPP, an RFID Authentication Protocol Nasour Bagheri, Masoumeh Safkhani, Pedro Peris-Lopez, Juan E. Tapiador
2012/701 (PDF ) Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors Noboru Kunihiro, Naoyuki Shinohara, Tetsuya Izu
2012/700 (PDF ) Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS Seung Geol Choi, Jonathan Katz, Hoeteck Wee, Hong-Sheng Zhou
2012/699 (PDF ) How Practical is Public-Key Encryption Based on LPN and Ring-LPN? Ivan Damgård, Sunoo Park
2012/698 (PDF ) 5PM: Secure Pattern Matching Joshua Baron, Karim El Defrawy, Kirill Minkovich, Rafail Ostrovsky, Eric Tressler
2012/697 (PDF ) Verifiable Elections That Scale for Free Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn
2012/696 (PDF ) Cryptanalysis of RAKAPOSHI Stream Cipher Lin Ding, Jie Guan
2012/695 (PDF ) Fully Automated Analysis of Padding-Based Encryption in the Computational Model Gilles Barthe, Juan Manuel Crespo, Benjamin Grégoire, César Kunz, Yassine Lakhnech, Benedikt Schmidt, Santiago Zanella-Béguelin
2012/694 (PDF ) Cryptanalysis of matrix conjugation schemes A. D. Myasnikov, A. Ushakov
2012/693 (PDF ) Encoding Functions with Constant Online Rate or How to Compress Garbled Circuits Keys Benny Applebaum, Yuval Ishai, Eyal Kushilevitz, Brent Waters
2012/692 (PDF ) Generic Constructions of Integrated PKE and PEKS Yu Chen, Jiang Zhang, Zhenfeng Zhang, Dongdai Lin
2012/691 (PDF ) Root Optimization of Polynomials in the Number Field Sieve Shi Bai, Richard P. Brent, Emmanuel Thomé
2012/690 (PDF ) The Weakness of Integrity Protection for LTE Teng Wu, Guang Gong
2012/689 (PDF ) Cryptography Using CAPTCHA Puzzles Abishek Kumarasubramanian, Rafail Ostrovsky, Omkant Pandey, Akshay Wadia
2012/688 (PDF ) A Simple Provably Secure Key Exchange Scheme Based on the Learning with Errors Problem Jintai Ding, Xiang Xie, Xiaodong Lin
2012/687 (PDF ) The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions Karyn Benson, Hovav Shacham, Brent Waters
2012/686 (PDF ) Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grøstl Jian Zou, Wenling Wu, Shuang Wu, Le Dong
2012/685 (PDF ) Square root computation over even extension fields Gora Adj, Francisco Rodríguez-Henríquez
2012/684 (PDF ) Generic Related-key Attacks for HMAC Thomas Peyrin, Yu Sasaki, Lei Wang
2012/682 (PDF ) Proofs of Retrievability with Public Verifiability and Constant Communication Cost in Cloud Jiawei Yuan, Shucheng Yu
2012/681 (PDF ) Resilience to Distinguishing Attacks on WG-7 Cipher and Their Generalizations Guang Gong, Mark Aagaard, Xinxin Fan
2012/680 (PDF ) Natural Generalizations of Threshold Secret Sharing Oriol Farras, Carles Padro, Chaoping Xing, An Yang
2012/679 (PDF ) Hiding the Input-Size in Secure Two-Party Computation Yehuda Lindell, Kobbi Nissim, Claudio Orlandi
2012/678 (PDF ) Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output Benedikt Gierlichs, Jorn-Marc Schmidt, Michael Tunstall
2012/677 (PDF ) What is the Effective Key Length for a Block Cipher: an Attack on Every Block Cipher Jialin Huang, Xuejia Lai
2012/676 (PDF ) Mixed-integer Linear Programming in the Analysis of Trivium and Ktantan Julia Borghoff
2012/675 (PDF ) Minkowski sum based lattice construction for multivariate simultaneous Coppersmith's technique and applications to RSA Yoshinori Aono
2012/674 (PDF ) Lecture Notes in Secret Sharing Carles Padro
2012/673 (PDF ) Robust Encryption, Revisited Pooya Farshim, Benoît Libert, Kenneth G. Paterson, Elizabeth A. Quaglia
2012/672 (PDF ) Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials Itai Dinur, Orr Dunkelman, Adi Shamir
2012/671 (PDF ) Fully Secure Unbounded Inner-Product and Attribute-Based Encryption Tatsuaki Okamoto, Katsuyuki Takashima
2012/670 (PDF ) Fast Cryptography in Genus 2 Joppe W. Bos, Craig Costello, Huseyin Hisil, Kristin Lauter
2012/669 (PDF ) Blackbox Traceable CP-ABE: How to Catch People Leaking Their Keys by Selling Decryption Devices on eBay Zhen Liu, Zhenfu Cao, Duncan S. Wong
2012/668 (PDF ) Construction of Differential Characteristics in ARX Designs -- Application to Skein Gaetan Leurent
2012/667 (PDF ) False Negative probabilities in Tardos codes Antonino Simone, Boris Skoric
2012/666 (PDF ) Estimating the Φ(n) of Upper/Lower Bound in its RSA Cryptosystem Chenglian Liu, Ziwei Ye
2012/665 (PDF ) Uniform Compression Functions Can Fail to Preserve “Full” Entropy Daniel R. L. Brown
2012/664 (PDF ) PRE- Stronger Security Notion and Efficient Construction with New Property Jiang Zhang, Zhenfeng Zhang, Yu Chen
2012/663 (PDF ) Virtual isomorphisms of ciphers: is AES secure against differential / linear attack? Alexander Rostovtsev
2012/662 (PDF ) Asynchronous Physical Unclonable Functions – AsyncPUF Julian Murphy
2012/661 (PDF ) Breaking Another Quasigroup-Based Cryptographic Scheme Markus Dichtl, Pascale Böffgen
2012/659 (PDF ) Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks Hassan Jameel Asghar, Shujun Li, Ron Steinfeld, Josef Pierpzyk
2012/658 (PDF ) Digital Signatures with Minimal Overhead from Indifferentiable Random Invertible Functions Eike Kiltz, Krzysztof Pietrzak, Mario Szegedy
2012/657 (PDF ) Fixed Argument Pairing Inversion on Elliptic Curves Sungwook Kim, Jung Hee Cheon
2012/656 (PDF ) Security Evaluation of Rakaposhi Stream Cipher Mohammad Ali Orumiehchiha, Josef Pieprzyk, Elham Shakour, Ron Steinfeld
2012/655 (PDF ) Privacy Preserving Revocable Predicate Encryption Revisited Kwangsu Lee, Intae Kim, Seong Oun Hwang
2012/654 (PDF ) Refine the Concept of Public Key Encryption with Delegated Search Qiang Tang, Yuanjie Zhao, Xiaofeng Chen, Hua Ma
2012/653 (PDF ) How powerful are the DDH hard groups? Periklis A. Papakonstantinou, Charles W. Rackoff, Yevgeniy Vahlis
2012/652 (PDF ) Round-Efficient Concurrently Composable Secure Computation via a Robust Extraction Lemma Vipul Goyal, Huijia Lin, Omkant Pandey, Rafael Pass, Amit Sahai
2012/650 (PDF ) Formal analysis of privacy in Direct Anonymous Attestation schemes Ben Smyth, Mark D. Ryan, Liqun Chen
2012/649 (PDF ) A Robust and Plaintext-Aware Variant of Signed ElGamal Encryption Yannick Seurin, Joana Treger
2012/648 (PDF ) Search in Encrypted Data: Theoretical Models and Practical Applications Qiang Tang
2012/647 (PDF ) A Measure of Dependence for Cryptographic Primitives Relative to Ideal Functions Daniel Smith-Tone, Cristina Tone
2012/646 (PDF ) Galindo-Garcia Identity-Based Signature, Revisited Sanjit Chatterjee, Chethan Kamath, Vikas Kumar
2012/645 (PDF ) Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes Eduarda S. V. Freire, Kenneth G. Paterson, Bertram Poettering
2012/644 (PDF ) Impossibility Results for Indifferentiability with Resets Atul Luykx, Elena Andreeva, Bart Mennink, Bart Preneel
2012/643 (PDF ) Protocols for Multiparty Coin Toss With Dishonest Majority Amos Beimel, Eran Omri, Ilan Orlov
2012/642 (PDF ) Practical Covertly Secure MPC for Dishonest Majority – or: Breaking the SPDZ Limits Ivan Damgard, Marcel Keller, Enrique Larraia, Valerio Pastro, Peter Scholl, Nigel P. Smart
2012/641 (PDF ) A unidirectional conditional proxy re-encryption scheme based on non-monotonic access structure Bin Wang
2012/640 (PDF ) Preimage and Pseudo-Collision Attacks on Step-Reduced SM3 Hash Function Gaoli Wang, Yanzhao Shen
2012/639 (PDF ) Coarse-grained integer - Smooth? Rough? Both! Daniel Loebenberger, Michael Nüsken
2012/638 (PDF ) Cryptanalysis and Improvement of a Multi-Receiver Generalized Signcryption Scheme Cai-xue Zhou
2012/637 (PDF ) Efficient Methods for Practical Fully Homomorphic Symmetric-key Encrypton, Randomization and Verification Aviad Kipnis, Eliphaz Hibshoosh
2012/636 (PDF ) On the Complexity of the BKW Algorithm on LWE Martin R. Albrecht, Carlos Cid, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret
2012/634 (PDF ) Cryptanalysis of Double-Block-Length Hash Mode MJH Deukjo Hong, Daesung Kwon
2012/633 (PDF ) New Preimage Attack on MDC-4 Deukjo Hong, Daesung Kwon
2012/632 (PDF ) Pairings on Generalized Huff Curves Abdoul Aziz Ciss, Djiby Sow
2012/631 (PDF ) Message-Locked Encryption and Secure Deduplication Mihir Bellare, Sriram Keelveedhi, Thomas Ristenpart
2012/630 (PDF ) On the Security of TLS Renegotiation Florian Giesen, Florian Kohlar, Douglas Stebila
2012/629 (PDF ) SCAPI: The Secure Computation Application Programming Interface Yael Ejgenberg, Moriya Farbstein, Meital Levy, Yehuda Lindell
2012/628 (PDF ) Efficient Group Key Management Schemes for Multicast Dynamic Communication Systems Muhammad Yasir Malik
2012/627 (PDF ) Efficient Group Signatures in the Standard Model Laila El Aimani, Olivier Sanders
2012/626 (PDF ) Bit-Parallel $GF(2^{n})$ Squarer Using Shifted Polynomial Basis Xi Xiong, Haining Fan
2012/625 (PDF ) Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions Alexandra Boldyreva, Nathan Chenette, Adam O’Neill
2012/624 (PDF ) Order-Preserving Symmetric Encryption Alexandra Boldyreva, Nathan Chenette, Younho Lee, Adam O’Neill
2012/623 (PDF ) Impossible plaintext cryptanalysis and probable-plaintext collision attacks of 64-bit block cipher modes David McGrew
2012/622 (PDF ) Resolving the conflict between generality and plausibility in verified computation Srinath Setty, Benjamin Braun, Victor Vu, Andrew J. Blumberg, Bryan Parno, Michael Walfish
2012/621 (PDF ) Biclique Cryptanalysis of Lightweight Block Ciphers PRESENT, Piccolo and LED Kitae Jeong, HyungChul Kang, Changhoon Lee, Jaechul Sung, Seokhie Hong
2012/620 (PDF ) Solving Subset Sum Problems of Densioty close to 1 by "randomized" BKZ-reduction Claus P. Schnorr, Taras Shevchenko
2012/619 (PDF ) Asynchronous Computational VSS with Reduced Communication Complexity Michael Backes, Amit Datta, Aniket Kate
2012/617 (PDF ) Security Analysis of an Open Car Immobilizer Protocol Stack Stefan Tillich, Marcin Wójcik
2012/616 (PDF ) Balancing Output Length and Query Bound in Hardness Preserving Constructions of Pseudorandom Functions Nishanth Chandran, Sanjam Garg
2012/615 (PDF ) Polynomial time solutions of computational problems in noncommutative-algebraic cryptography Boaz Tsaban
2012/614 (PDF ) An arithmetic intersection formula for denominators of Igusa class polynomials Kristin Lauter, Bianca Viray
2012/613 (PDF ) Resource-Restricted Indifferentiability Grégory Demay, Peter Gaźi, Martin Hirt, Ueli Maurer
2012/612 (PDF ) Analysis of the Non-Perfect Table Fuzzy Rainbow Tradeoff Byoung-Il Kim, Jin Hong
2012/611 (PDF ) A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage Maura B. Paterson, Douglas R. Stinson, Jalaj Upadhyay
2012/610 (PDF ) Candidate Multilinear Maps from Ideal Lattices Sanjam Garg, Craig Gentry, Shai Halevi
2012/609 (PDF ) A NEW APPROACH TO THE DISCRETE LOGARITHM PROBLEM WITH AUXILIARY INPUTS Taechan Kim, Jung Hee Cheon
2012/608 (PDF ) On the (Non-)Reusability of Fuzzy Sketches and Extractors and Security Improvements in the Computational Setting Marina Blanton, Mehrdad Aliasgari
2012/607 (PDF ) Graph-Theoretic Algorithms for the ``Isomorphism of Polynomials'' Problem Charles Bouillaguet, Pierre-Alain Fouque, Amandine Véber
2012/606 (PDF ) Quantum-Secure Message Authentication Codes Dan Boneh, Mark Zhandry
2012/605 (PDF ) Secure Outsourced Attribute-Based Signatures Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia, Duncan S. Wong, Willy Susilo
2012/604 (PDF ) Leakage-Resilient Cryptography from Minimal Assumptions Carmit Hazay, Adriana Lopez-Alt, Hoeteck Wee, Daniel Wichs
2012/603 (PDF ) Collecting Data while Preserving Individuals' Privacy: A Case Study Alexis Bonnecaze, Robert Rolland
2012/602 (PDF ) A note on invariant linear transformations in multivariate public key cryptography Andreas Wiemers
2012/601 (PDF ) How to Garble RAM Programs Steve Lu, Rafail Ostrovsky
2012/600 (PDF ) The LED Block Cipher Jian Guo, Thomas Peyrin, Axel Poschmann, Matt Robshaw
2012/599 (PDF ) On the coefficients of the polynomial in the number field sieve Min Yang, Qingshu Meng, Zhangyi Wang, Li Li, Huanguo Zhang
2012/598 (PDF ) Taking proof-based verified computation a few steps closer to practicality (extended version) Srinath Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Muqeet Ali, Andrew J. Blumberg, Michael Walfish
2012/597 (PDF ) A Novel Permutation-based Hash Mode of Operation FP and the Hash Function SAMOSA Souradyuti Paul, Ekawat Homsirikamol, Kris Gaj
2012/596 (PDF ) Evaluating User Privacy in Bitcoin Elli Androulaki, Ghassan Karame, Marc Roeschlin, Tobias Scherer, Srdjan Capkun
2012/595 (PDF ) Extending Brickell-Davenport Theorem to Non-Perfect Secret Sharing Schemes Oriol Farràs, Carles Padró
2012/594 (PDF ) Improved Impossible Differential Attack on Reduced Version of Camellia-192/256 Ya Liu, Dawu Gu, Zhiqiang Liu, Wei Li
2012/593 (PDF ) Factor-4 and 6 (De)compression for Values of Pairings using Trace Maps Tomoko Yonemura, Taichi Isogai, Hirofumi Muratani, Yoshikazu Hanatani
2012/592 (PDF ) Attribute-Based Encryption for Circuits from Multilinear Maps Amit Sahai, Brent Waters
2012/591 (PDF ) Biclique Cryptanalysis Of PRESENT, LED, And KLEIN Farzaneh Abed, Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel
2012/588 (PDF ) Breaking Public Keys - How to Determine an Unknown RSA Public Modulus Hans-Joachim Knobloch
2012/587 (PDF ) Symbolic computation in block cipher with application to PRESENT Changyong Peng, Chuangying zhu, Yuefei Zhu, Fei Kang
2012/586 (PDF ) SHADE: Secure HAmming DistancE computation from oblivious transfer Julien Bringer, Herve Chabanne, Alain Patey
2012/585 (PDF ) On Provably Secure Code-based Signature and Signcryption Scheme Preetha Mathew K, Sachin Vasant, C. Pandu Rangan
2012/584 (PDF ) Quantitative Analysis of the Full Bitcoin Transaction Graph Dorit Ron, Adi Shamir
2012/583 (PDF ) New Constructions and Proof Methods for Large Universe Attribute-Based Encryption Yannis Rouselakis, Brent Waters
2012/582 (PDF ) Using Randomizers for Batch Verification of ECDSA Signatures Sabyasachi Karati, Abhijit Das, Dipanwita Roychowdhury
2012/581 (PDF ) On the (in)security of some smart-card-based password authentication schemes for WSN Ding Wang, Chun-guang Ma
2012/580 (PDF ) Cryptanalysis of the OKH Authenticated Encryption Scheme Peng Wang, Wenling Wu, Liting Zhang
2012/579 (PDF ) Defending Against the Unknown Enemy: Applying FlipIt to System Security Kevin D. Bowers, Marten van Dijk, Robert Griffin, Ari Juels, Alina Oprea, Ronald L. Rivest, Nikos Triandopoulos
2012/578 (PDF ) Security Evaluations Beyond Computing Power: How to Analyze Side-Channel Attacks you Cannot Mount? Nicolas Veyrat-Charvillon, Benoît Gérard, François-Xavier Standaert
2012/577 (PDF ) A Framework for Unique Ring Signatures Matthew Franklin, Haibin Zhang
2012/576 (PDF ) Concurrent Signature without Random Oracles Xiao Tan, Qiong Huang, Duncan S. Wong
2012/575 (PDF ) Nanoelectronic Solutions for Hardware Security Jeyavijayan Rajendran, Ramesh Karri, James B. Wendt, Miodrag Potkonjak, Nathan McDonald, Garrett S. Rose, Bryant Wysocki
2012/574 (PDF ) Quantum algorithm for the discrete logarithm problem for matrices over finite group rings A. D. Myasnikov, A. Ushakov
2012/573 (PDF ) Limits on the Usefulness of Random Oracles Iftach Haitner, Eran Omri, Hila Zarosim
2012/572 (PDF ) On Constant-Round Concurrent Zero-Knowledge from a Knowledge Assumption Divya Gupta, Amit Sahai
2012/571 (PDF ) Improved side channel attack on the block cipher NOEKEON Changyong Peng, Chuangying zhu, Yuefei Zhu, Fei Kang
2012/570 (PDF ) Zero-Correlation Linear Cryptanalysis of Reduced-Round LBlock Hadi Soleimany, Kaisa Nyberg
2012/569 (PDF ) Improved Zero-knowledge Proofs of Knowledge for the ISIS Problem, and Applications San Ling, Khoa Nguyen, Damien Stehle, Huaxiong Wang
2012/568 (PDF ) On Transaction Pseudonyms with Implicit Attributes Stefan G. Weber
2012/567 (PDF ) Leakage Squeezing of Order Two Claude Carlet, Jean-Luc Danger, Sylvain Guilley, Houssem Maghrebi
2012/566 (PDF ) Quantization in Continuous-Source Zero Secrecy Leakage Helper Data Schemes Joep de Groot, Boris Škorić, Niels de Vreede, Jean-Paul Linnartz
2012/565 (PDF ) Packed Ciphertexts in LWE-based Homomorphic Encryption Zvika Brakerski, Craig Gentry, Shai Halevi
2012/564 (PDF ) Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing Mihir Bellare, Viet Tung Hoang, Phillip Rogaway
2012/563 (PDF ) Constant-Round Concurrent Zero Knowledge From Falsifiable Assumptions Kai-Min Chung, Huijia Lin, Rafael Pass
2012/562 (PDF ) Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency Kwangsu Lee, Dong Hoon Lee, Moti Yung
2012/561 (PDF ) An Attack on a Fully Homomorphic Encryption Scheme Hu Yupu, Wang Fenghe
2012/560 (PDF ) Computational Soundness of Coinductive Symbolic Security under Active Attacks Mohammad Hajiabadi, Bruce M. Kapron
2012/559 (PDF ) Plaintext Awareness in Identity-Based Key Encapsulation Mark Manulis, Bertram Poettering, Douglas Stebila
2012/558 (PDF ) Domain-Specific Pseudonymous Signatures for the German Identity Card Jens Bender, Özgür Dagdelen, Marc Fischlin, Dennis Kügler
2012/557 (PDF ) PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon (Extended Version) Stefan Katzenbeisser, Ünal Kocabaş, Vladimir Rožić, Ahmad-Reza Sadeghi, Ingrid Verbauwhede, Christian Wachsmann
2012/556 (PDF ) Resource-based Corruptions and the Combinatorics of Hidden Diversity Juan Garay, David Johnson, Aggelos Kiayias, Moti Yung
2012/555 (PDF ) New Impossibility Results for Concurrent Composition and a Non-Interactive Completeness Theorem for Secure Computation Shweta Agrawal, Vipul Goyal, Abhishek Jain, Manoj Prabhakaran, Amit Sahai
2012/554 (PDF ) Security weakness in the Proof of Storage with Deduplication Youngjoo Shin, Junbeom Hur, Kwangjo Kim
2012/553 (PDF ) Bellcore attack in practice Andrey Sidorenko, Joachim van den Berg, Remko Foekema, Michiel Grashuis, Jaap de Vos
2012/552 (PDF ) Provably Secure Concurrent Error Detection Against Differential Fault Analysis Xiaofei Guo, Debdeep Mukhopadhyay, Ramesh Karri
2012/551 (PDF ) Faster Pairing Computation on Jacobi quartic Curves with High-Degree Twists Liangze Li, Hongfeng Wu, Fan Zhang
2012/550 (PDF ) Dynamic Proofs of Retrievability via Oblivious RAM David Cash, Alptekin Kupcu, Daniel Wichs
2012/549 (PDF ) Faster batch forgery identification Daniel J. Bernstein, Jeroen Doumen, Tanja Lange, Jan-Jaap Oosterwijk
2012/548 (PDF ) Efficient Modular NIZK Arguments from Shift and Product Prastudy Fauzi, Helger Lipmaa, Bingsheng Zhang
2012/547 (PDF ) Constrained Search for a Class of Good S-Boxes with Improved DPA Resistivity Bodhisatwa Mazumdar, Debdeep Mukhopadhyay, Indranil Sengupta
2012/546 (PDF ) Rotational cryptanalysis of round-reduced Keccak Pawel Morawiecki, Josef Pieprzyk, Marian Srebrny
2012/545 (PDF ) A Versatile Multi-Input Multiplier over Finite Fields Haibo Yi, Shaohua Tang, Lingling Xu
2012/544 (PDF ) Differential Analysis of the LED Block Cipher Florian Mendel, Vincent Rijmen, Deniz Toz, Kerem Varici
2012/543 (PDF ) Enhanced Chosen-Ciphertext Security and Applications Dana Dachman-Soled, Georg Fuchsbauer, Payman Mohassel, Adam O'Neill
2012/542 (PDF ) Salus: A System for Server-Aided Secure Function Evaluation Seny Kamara, Payman Mohassel, Ben Riva
2012/540 (PDF ) A Comparison of Perfect Table Cryptanalytic Tradeoff Algorithms Ga Won Lee, Jin Hong
2012/539 (PDF ) Efficient Implementation of RSA Algorithm with MKE Sami A. Nagar, Dr. Saad Alshamma
2012/538 (PDF ) Private Top-k Aggregation Protocols Myungsun Kim, Abedelaziz Mohaisen, Jung Hee Cheon, Yongdae Kim
2012/537 (PDF ) Intercepting Tokens: The Empire Strikes Back in the Clone Wars Özgür Dagdelen, Marc Fischlin
2012/536 (PDF ) Secret Sharing and Secure Computing from Monotone Formulae Ivan Bjerre Damgård, Jonas Kölker, Peter Bro Miltersen
2012/535 (PDF ) A Low-Area Unified Hardware Architecture for the AES and the Cryptographic Hash Function Grøstl Nuray At, Jean-Luc Beuchat, Eiji Okamoto, Ismail San, Teppei Yamazaki
2012/534 (PDF ) A Simple Combinatorial Treatment of Constructions and Threshold Gaps of Ramp Schemes Maura B. Paterson, Douglas R. Stinson
2012/533 (PDF ) Solving Hard Lattice Problems and the Security of Lattice-Based Cryptosystems Thijs Laarhoven, Joop van de Pol, Benne de Weger
2012/532 (PDF ) Pairing computation on Edwards curves with high-degree twists Liangze Li, Hongfeng Wu, Fan Zhang
2012/531 (PDF ) Generic Construction of Trace and Revoke Schemes Murat Ak, Aggelos Kiayias, Serdar Pehlivanoglu, Ali Aydin Selcuk
2012/530 (PDF ) Dynamic Searchable Symmetric Encryption Seny Kamara, Charalampos Papamanthou, Tom Roeder
2012/529 (PDF ) PRINCE - A Low-latency Block Cipher for Pervasive Computing Applications (Full version) Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Knežević, Lars R. Knudsen, Gregor Leander, Ventzislav Nikov, Christof Paar, Christian Rechberger, Peter Rombouts, Søren S. Thomsen, Tolga Yalçın
2012/528 (PDF ) An ID-Based Signcryption Scheme with Compartmented Secret Sharing for Unsigncryption Graham Enos, Yuliang Zheng
2012/527 (PDF ) Cryptanalysis of a recent two factor authentication scheme Michael Scott
2012/526 (PDF ) Invertible Polynomial Representation for Private Set Operations Jung Hee Cheon, Hyunsook Hong, Hyung Tae Lee
2012/525 (PDF ) Computing endomorphism rings of abelian varieties of dimension two Gaetan Bisson
2012/524 (PDF ) Tahoe – The Least-Authority Filesystem Zooko Wilcox-O'Hearn, Brian Warner
2012/523 (PDF ) The Curious Case of Non-Interactive Commitments Mohammad Mahmoody, Rafael Pass
2012/522 (PDF ) False Positive probabilities in q-ary Tardos codes: comparison of attacks A. Simone, B. Skoric
2012/521 (PDF ) Functional Encryption with Bounded Collusions via Multi-Party Computation Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee
2012/520 (PDF ) Optimizing Segment Based Document Protection (Corrected Version) Miroslaw Kutylowski, Maciej Gebala
2012/519 (PDF ) Faster implementation of scalar multiplication on Koblitz curves Diego F. Aranha, Armando Faz-Hernández, Julio López, Francisco Rodríguez-Henríquez
2012/518 (PDF ) Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies Kwangsu Lee, Dong Hoon Lee, Moti Yung
2012/517 (PDF ) Unconditionally Secure Asynchronous Multiparty Computation with Linear Communication Complexity Ashish Choudhury, Martin Hirt, Arpita Patra
2012/516 (PDF ) Garbling XOR Gates ``For Free'' in the Standard Model Benny Applebaum
2012/515 (PDF ) Semantically-Secure Functional Encryption: Possibility Results, Impossibility Results and the Quest for a General Definition Mihir Bellare, Adam O'Neill
2012/514 (PDF ) RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures Mihir Bellare, Kenneth G. Paterson, Susan Thomson
2012/513 (PDF ) Commitments and Efficient Zero-Knowledge Proofs from Learning Parity with Noise Abhishek Jain, Stephan Krenn, Krzysztof Pietrzak, Aris Tentes
2012/512 (PDF ) Constant-Overhead Secure Computation of Boolean Circuits using Preprocessing Ivan Damgard, Sarah Zakarias
2012/511 (PDF ) Entangled Cloud Storage Giuseppe Ateniese, Özgür Dagdelen, Ivan Damgard, Daniele Venturi
2012/510 (PDF ) Enabling 3-share Threshold Implementations for any 4-bit S-box Sebastian Kutzner, Phuong Ha Nguyen, Axel Poschmann
2012/509 (PDF ) On 3-share Threshold Implementations for 4-bit S-boxes Sebastian Kutzner, Phuong Ha Nguyen, Axel Poschmann, Huaxiong Wang
2012/508 (PDF ) On the Implausibility of Constant-Round Public-Coin Zero-Knowledge Proofs Yi Deng, Juan Garay, San Ling, Huaxiong Wang, Moti Yung
2012/507 (PDF ) Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices Josep Balasch, Bariş Ege, Thomas Eisenbarth, Benoit Gérard, Zheng Gong, Tim Güneysu, Stefan Heyse, Stéphanie Kerckhof, François Koeune, Thomas Plos, Thomas Pöppelmann, Francesco Regazzoni, François-Xavier Standaert, Gilles Van Assche, Ronny Van Keer, Loïc van Oldeneel tot Oldenzeel, Ingo von Maurich
2012/506 (PDF ) Succinct Malleable NIZKs and an Application to Compact Shuffles Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn
2012/505 (PDF ) On pseudorandomization of information-theoretically secure schemes without hardness assumptions Koji Nuida
2012/504 (PDF ) Scalable Deniable Group Key Establishment Kashi Neupane, Rainer Steinwandt, Adriana Suarez Corona
2012/503 (PDF ) Hierarchical Identity-Based (Lossy) Trapdoor Functions Alex Escala, Javier Herranz, Benoit Libert, Carla Rafols
2012/502 (PDF ) Are We Compromised? Modelling Security Assessment Games Viet Pham, Carlos Cid
2012/501 (PDF ) Privacy Amplification with Asymptotically Optimal Entropy Loss Nishanth Chandran, Bhavana Kanukurthi, Rafail Ostrovsky, Leonid Reyzin
2012/500 (PDF ) Constant Ciphertext Length in CP-ABE Nishant Doshi, Devesh Jinwala
2012/498 (PDF ) Almost Perfect Algebraic Immune Functions with Good Nonlinearity Meicheng Liu, Dongdai Lin
2012/497 (PDF ) The low-call diet: Authenticated Encryption for call counting HSM users Mike Bond, George French, Nigel P. Smart, Gaven J. Watson
2012/496 (PDF ) Updating attribute in CP-ABE: A New Approach Nishant Doshi, Devesh Jinwala
2012/495 (PDF ) "Metaproofs" (and their Cryptographic Applications) Alfredo De Santis, Moti Yung
2012/494 (PDF ) Protocol Misidentification Made Easy with Format-Transforming Encryption Kevin P. Dyer, Scott E. Coull, Thomas Ristenpart, Thomas Shrimpton
2012/493 (PDF ) Efficient Query Integrity for Outsourced Dynamic Databases Qingji Zheng, Shouhuai Xu, Giuseppe Ateniese
2012/492 (PDF ) A Method for Generating Full Cycles by a Composition of NLFSRs Elena Dubrova
2012/491 (PDF ) On the Multiple Fault Attack on RSA Signatures with LSBs of Messages Unknown Lidong Han, Wei Wei, Mingjie Liu
2012/490 (PDF ) Desynchronization Attack on RAPP Ultralightweight Authentication Protocol Zahra Ahmadian, Mahmoud Salmasizadeh, Mohammad Reza Aref
2012/489 (PDF ) Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols Zahra Ahmadian, Mahmoud Salmasizadeh, Mohammad Reza Aref
2012/488 (PDF ) Designated Verifier Threshold Proxy Signature Scheme without Random Oracles Mohammad Beheshti-Atashgah, Majid Bayat, Mahmoud Gardeshi, Mohammad Reza Aref
2012/487 (PDF ) Short communication: An interpretation of the Linux entropy estimator Benjamin Pousse
2012/486 (PDF ) Computational Soundness without Protocol Restrictions Michael Backes, Ankit Malik, Dominique Unruh
2012/485 (PDF ) Exploiting Collisions in Addition Chain-based Exponentiation Algorithms Using a Single Trace Neil Hanley, HeeSeok Kim, Michael Tunstall
2012/484 (PDF ) Cryptanalysis of Two Dynamic ID-based Remote User Authentication Schemes for Multi-Server Architecture Ding Wang, Chun-guang Ma, De-li Gu, Zhen-shan Cui
2012/483 (PDF ) An Efficient Signcryption Scheme from q-Diffie-Hellman Problems Jayaprakash Kar
2012/482 (PDF ) Approaches for the Parallelization of Software Implementation of Integer Multiplication Vladislav Kovtun, Andrew Okhrimenko
2012/481 (PDF ) Improved Security Bounds for Key-Alternating Ciphers via Hellinger Distance John Steinberger
2012/480 (PDF ) Short Signatures From Diffie-Hellman: Realizing Short Public Key Jae Hong Seo
2012/479 (PDF ) Mix-Compress-Mix Revisited: Dispensing with Non-invertible Random Injection Oracles Mohammad Reza Reyhanitabar, Willy Susilo
2012/478 (PDF ) Cryptanalysis on a novel unconditionally secure oblivious polynomial evaluation protocol Wang Qinglong, Xu Li
2012/477 (PDF ) Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting Patrick Derbez, Pierre-Alain Fouque, Jérémy Jean
2012/476 (PDF ) A j-lanes tree hashing mode and j-lanes SHA-256 Shay Gueron
2012/475 (PDF ) Efficient Signatures of Knowledge and DAA in the Standard Model David Bernhard, Georg Fuchsbauer, Essam Ghadafi
2012/474 (PDF ) On the Semantic Security of Functional Encryption Schemes Manuel Barbosa, Pooya Farshim
2012/473 (PDF ) Sender Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited Zhengan Huang, Shengli Liu, Baodong Qin
2012/472 (PDF ) On the Simplicity of Converting Leakages from Multivariate to Univariate – Case Study of a Glitch-Resistant Masking Scheme – Amir Moradi, Oliver Mischke
2012/471 (PDF ) A Quasigroup Based Random Number Generator for Resource Constrained Environments Matthew Battey, Abhishek Parakh
2012/470 (PDF ) Some Connections Between Primitive Roots and Quadratic Non-Residues Modulo a Prime Sorin Iftene
2012/469 (PDF ) Perfect Keyword Privacy in PEKS Systems Mototsugu Nishioka
2012/468 (PDF ) Functional Encryption: New Perspectives and Lower Bounds Shweta Agrawal, Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee
2012/467 (PDF ) New results on nonexistence of generalized bent functions Yupeng Jiang, Yingpu Deng
2012/466 (PDF ) Computational Entropy and Information Leakage Benjamin Fuller, Leonid Reyzin
2012/465 (PDF ) T-MATCH: Privacy-Preserving Item Matching for Storage-Only RFID Tags Kaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva
2012/464 (PDF ) Finding Lower Bounds on the Complexity of Secret Sharing Schemes by Linear Programming Carles Padro, Leonor Vazquez, An Yang
2012/463 (PDF ) Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting Xiang Xie, Rui Xue, Rui Zhang
2012/462 (PDF ) Perfect Ambiguous Optimistic Fair Exchange Yang Wang, Man Ho Au, Willy Susilo
2012/461 (PDF ) Succinct Arguments from Multi-Prover Interactive Proofs and their Efficiency Benefits Nir Bitansky, Alessandro Chiesa
2012/460 (PDF ) Information-Theoretic Timed-Release Security: Key-Agreement, Encryption, and Authentication Codes Yohei Watanabe, Takenobu Seito, Junji Shikata
2012/459 (PDF ) Barriers in Cryptography with Weak, Correlated and Leaky Sources Daniel Wichs
2012/458 (PDF ) Computing small discrete logarithms faster Daniel J. Bernstein, Tanja Lange
2012/457 (PDF ) Hush Functions Extended to Any Size Input versus Any Size Output Gideon Samid
2012/456 (PDF ) Crowd-Blending Privacy Johannes Gehrke, Michael Hay, Edward Lui, Rafael Pass
2012/455 (PDF ) Must you know the code of f to securely compute f? Mike Rosulek
2012/454 (PDF ) A Probabilistic Quantum Key Transfer Protocol Abhishek Parakh
2012/453 (PDF ) New Leakage Resilient CCA-Secure Public Key Encryption Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong
2012/452 (PDF ) EPiC: Efficient Privacy-Preserving Counting for MapReduce Erik-Oliver Blass, Guevara Noubir, Triet D. Vo-Huu
2012/451 (PDF ) Stam's Conjecture and Threshold Phenomena in Collision Resistance John Steinberger, Xiaoming Sun, Zhe Yang
2012/450 (PDF ) Tweakable Blockciphers with Beyond Birthday-Bound Security Will Landecker, Thomas Shrimpton, R. Seth Terashima
2012/449 (PDF ) Long Term Confidentiality: a Survey Johannes Braun, Johannes Buchmann, Ciaran Mullan, Alex Wiesmaier
2012/448 (PDF ) On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups Goichiro Hanaoka, Takahiro Matsuda, Jacob C. N. Schuldt
2012/447 (PDF ) Multi-receiver Homomorphic Authentication Codes for Network Coding Zhaohui Tang, Hoon Wei Lim
2012/446 (PDF ) Differential Fault Analysis of AES: Towards Reaching its Limits Sk Subidh Ali, Debdeep Mukhopadhyay, Michael Tunstall
2012/445 (PDF ) A note on ‘An efficient certificateless aggregate signature with constant pairing computations’ Debiao He, Jianhua Chen, Miaomiao Tian
2012/444 (PDF ) Factorization of a 1061-bit number by the Special Number Field Sieve Greg Childers
2012/443 (PDF ) Improved CRT Algorithm for Class Polynomials in Genus 2 Kristin Lauter, Damien Robert
2012/442 (PDF ) Group Signatures with Almost-for-free Revocation Benoit Libert, Thomas Peters, Moti Yung
2012/441 (PDF ) Adaptively Secure Multi-Party Computation with Dishonest Majority Sanjam Garg, Amit Sahai
2012/440 (PDF ) New Preimage Attacks Against Reduced SHA-1 Simon Knellwolf, Dmitry Khovratovich
2012/439 (PDF ) Robust Smart Card based Password Authentication Scheme against Smart Card Security Breach Ding Wang, Ping Wang, Chun-guang Ma, Zhong Chen
2012/438 (PDF ) Breaking and Repairing GCM Security Proofs Tetsu Iwata, Keisuke Ohashi, Kazuhiko Minematsu
2012/437 (PDF ) Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption Amit Sahai, Hakan Seyalioglu, Brent Waters
2012/436 (PDF ) Secure Database Commitments and Universal Arguments of Quasi Knowledge Melissa Chase, Ivan Visconti
2012/435 (PDF ) Differential Privacy with Imperfect Randomness Yevgeniy Dodis, Adriana Lopez-Alt, Ilya Mironov, Salil Vadhan
2012/434 (PDF ) Algebraic (Trapdoor) One Way Functions and their Applications Dario Catalano, Dario Fiore, Rosario Gennaro, Konstantinos Vamvourellis
2012/433 (PDF ) Impossibility Results for Static Input Secure Computation Sanjam Garg, Abishek Kumarasubramanian, Rafail Ostrovsky, Ivan Visconti
2012/432 (PDF ) TorScan: Tracing Long-lived Connections and Differential Scanning Attacks Alex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann
2012/431 (PDF ) On the Security of Dynamic Group Signatures: Preventing Signature Hijacking Yusuke Sakai, Jacob C. N. Schuldt, Keita Emura, Goichiro Hanaoka, Kazuo Ohta
2012/430 (PDF ) A formal study of two physical countermeasures against side channel attacks Sébastien Briais, Sylvain Guilley, Jean-Luc Danger
2012/429 (PDF ) Simple construction of epsilon-biased distribution Long Hoang Nguyen, Andrew William Roscoe
2012/428 (PDF ) Rational authentication protocols and their use in financial transactions Long Hoang Nguyen
2012/427 (PDF ) Constructing Pairing-Friendly Genus 2 Curves with Split Jacobian Robert Drylo
2012/426 (PDF ) A Generalised Formula for Calculating the Resilience of Random Key Predistribution Schemes Ed Kendall, Michelle Kendall, Wilfrid S. Kendall
2012/425 (PDF ) The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing Attacks and Countermeasures Gautham Sekar
2012/424 (PDF ) Scalable Group Signatures with Revocation Benoit Libert, Thomas Peters, Moti Yung
2012/423 (PDF ) Programmable encryption and key-dependent messages Dominique Unruh
2012/422 (PDF ) Biclique Cryptanalysis of TWINE Mustafa Çoban, Ferhat Karakoç, Özkan Boztaş
2012/421 (PDF ) Security margin evaluation of SHA-3 contest finalists through SAT-based attacks Ekawat Homsirikamol, Pawel Morawiecki, Marcin Rogawski, Marian Srebrny
2012/420 (PDF ) A Publicly-Veriable Mix-net with Everlasting Privacy Towards Observers Denise Demirel, Jeroen van de Graaf
2012/418 (PDF ) Weaknesses of an Improvement Authentication Scheme using Rafael Martínez-Peláez, Francisco Rico-Novella
2012/417 (PDF ) Efficient Padding Oracle Attacks on Cryptographic Hardware Romain Bardou, Riccardo Focardi, Yusuke Kawamoto, Lorenzo Simionato, Graham Steel, Joe-Kai Tsay
2012/416 (PDF ) Beyond eCK: Perfect Forward Secrecy under Actor Compromise and Ephemeral-Key Reveal Cas Cremers, Michèle Feltz
2012/415 (PDF ) Revisiting Key Schedule's Diffusion In Relation With Round Function's Diffusion Jialin Huang, Xuejia Lai
2012/414 (PDF ) Low complexity bit-parallel $GF(2^m)$ multiplier for all-one polynomials Yin Li, Gong-liang Chen, Xiao-ning Xie
2012/413 (PDF ) Highly Secure Strong PUF based on Nonlinearity of MOSFET Subthreshold Operation Mukund Kalyanaraman, Michael Orshansky
2012/412 (PDF ) Probabilistic Infinite Secret Sharing Laszlo Csirmaz
2012/411 (PDF ) Infinite Secret Sharing -- Examples Alexander Dibert, Laszlo Csirmaz
2012/410 (PDF ) Cryptanalysis of an Identity-Based Multiple Key Agreement Scheme Qingfeng Cheng
2012/409 (PDF ) MDPC-McEliece: New McEliece Variants from Moderate Density Parity-Check Codes Rafael Misoczki, Jean-Pierre Tillich, Nicolas Sendrier, Paulo S. L. M. Barreto
2012/408 (PDF ) Efficient Implementation of Bilinear Pairings on ARM Processors Gurleen Grewal, Reza Azarderakhsh, Patrick Longa, Shi Hu, David Jao
2012/407 (PDF ) Cross-Unlinkable Hierarchical Group Signatures Julien Bringer, Herve Chabanne, Alain Patey
2012/406 (PDF ) Comments on four multi-server authentication protocols using smart card Jue-Sam Chou, Yalin Chen, Chun-Hui Huang, Yu-Siang Huang
2012/405 (PDF ) Secure Computation on Floating Point Numbers Mehrdad Aliasgari, Marina Blanton, Yihua Zhang, Aaron Steele
2012/404 (PDF ) Secret Sharing Schemes for Very Dense Graphs Amos Beimel, Oriol Farràs, Yuval Mintz
2012/403 (PDF ) Fully Private Revocable Predicate Encryption Juan Manuel Gonzälez Nieto, Mark Manulis, Dongdong Sun
2012/402 (PDF ) Forward-Secure Hierarchical Predicate Encryption Juan Manuel Gonzälez Nieto, Mark Manulis, Dongdong Sun
2012/401 (PDF ) An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers Martin Albrecht, Gregor Leander
2012/400 (PDF ) An Algebraic Fault Attack on the LED Block Cipher Philipp Jovanovic, Martin Kreuzer, Ilia Polian
2012/399 (PDF ) Differential Fault Analysis on Block Cipher Piccolo Kitae Jeong
2012/398 (PDF ) PIRMAP: Efficient Private Information Retrieval for MapReduce Travis Mayberry, Erik-Oliver Blass, Agnes Hui Chan
2012/397 (PDF ) Cross-Domain Password-Based Authenticated Key Exchange Revisited Liqun Chen, Hoon Wei Lim, Guomin Yang
2012/396 (PDF ) On second-order nonlinearity and maximum algebraic immunity of some bent functions in $\cP S^+$ Brajesh Kumar Singh
2012/395 (PDF ) A New Efficient Authenticated ID-Based Group Key Agreement Protocol Morteza Arifi, Mahmoud Gardeshi, Mohammad Sabzinejad Farash
2012/394 (PDF ) An ID-Based Key Agreement Protocol Based on ECC Among Users of Separate Networks Mohammad Sabzinejad Farash, Mahmoud Ahmadian Attari
2012/393 (PDF ) A Certificateless Multiple-key Agreement Protocol Based on Bilinear Pairings Mohammad Sabzinejad Farash, Mahmoud Ahmadian Attari, Majid Bayat
2012/392 (PDF ) ID Based Signcryption Scheme in Standard Model S. Sharmila Deva Selvi, S. Sree Vivek, Dhinakaran Vinayagamurthy, C. Pandu Rangan
2012/391 (PDF ) Analysis and Construction of Efficient RFID Authentication Protocol with Backward Privacy Shaohui Wang, Sujuan Liu, Danwei Chen
2012/390 (PDF ) Regular Ternary Algorithm for Scalar Multiplication on Elliptic Curves over Finite Fields of Characteristic Three Chol-Sun Sin
2012/389 (PDF ) Wide Strong Private RFID Identification based on Zero-Knowledge Roel Peeters, Jens Hermans
2012/388 (PDF ) The Arithmetic Codex Ignacio Cascudo, Ronald Cramer, Chaoping Xing
2012/387 (PDF ) New cryptographic constructions using generalized learning with errors problem Jintai ding
2012/386 (PDF ) Cryptanalysis of Sood et al.’s Authentication Scheme using Smart Cards Rafael Martínez-Peláez, Francisco Rico-Novella
2012/385 (PDF ) CCBKE – Session Key Negotiation for Fast and Secure Scheduling of Scientific Applications in Cloud Computing Chang Liu, Xuyun Zhang, Chi Yang, Jinjun Chen
2012/384 (PDF ) Functional Encryption for Regular Languages Brent Waters
2012/383 (PDF ) Formalization of Information-Theoretic Security for Encryption and Key Agreement, Revisited Junji Shikata
2012/382 (PDF ) On the Joint Security of Signature and Encryption Schemes under Randomness Reuse: Efficiency and Security Amplification Afonso Arriaga, Manuel Barbosa, Pooya Farshim
2012/380 (PDF ) Several Weak Bit-Commitments Using Seal-Once Tamper-Evident Devices Ioana Boureanu, Serge Vaudenay
2012/379 (PDF ) All-But-Many Encryption: A New Framework for Fully-Equipped UC Commitments Eiichiro Fujisaki
2012/378 (PDF ) Multiparty Proximity Testing with Dishonest Majority from Equality Testing Ran Gelles, Rafail Ostrovsky, Kina Winoto
2012/377 (PDF ) Distributed Key Generation in the Wild Aniket Kate, Yizhou Huang, Ian Goldberg
2012/376 (PDF ) Combinatorial Solutions Providing Improved Security for the Generalized Russian Cards Problem Colleen M. Swanson, Douglas R. Stinson
2012/375 (PDF ) How to Store some Secrets Reto E. Koenig, Rolf Haenni
2012/374 (PDF ) Infiltrate the Vault: Security Analysis and Decryption of Lion Full Disk Encryption Omar Choudary, Felix Grobert, Joachim Metz
2012/373 (PDF ) Optimal Lower Bound for Differentially Private Multi-Party Aggregation T-H. Hubert Chan, Elaine Shi, Dawn Song
2012/371 (PDF ) Simultaneous hashing of multiple messages Shay Gueron, Vlad Krasnov
2012/370 (PDF ) Improved Broadcast Encryption Scheme with Constant-Size Ciphertext Renaud Dubois, Aurore Guillevic, Marine Sengelin Le Breton
2012/369 (PDF ) Factorisation of RSA-704 with CADO-NFS Shi Bai, Emmanuel Thomé, Paul Zimmermann
2012/368 (PDF ) Comprehensive Evaluation of High-Speed and Medium-Speed Implementations of Five SHA-3 Finalists Using Xilinx and Altera FPGAs Kris Gaj, Ekawat Homsirikamol, Marcin Rogawski, Rabia Shahid, Malik Umar Sharif
2012/367 (PDF ) On Continual Leakage of Discrete Log Representations Shweta Agrawal, Yevgeniy Dodis, Vinod Vaikuntanathan, Daniel Wichs
2012/366 (PDF ) Securing Circuits Against Constant-Rate Tampering Dana Dachman-Soled, Yael Tauman Kalai
2012/365 (PDF ) Public Auditing for Ensuring Cloud Data Storage Security With Zero Knowledge Privacy Wang Shao-hui, Chen Dan-wei, Wang Zhi-wei, Chang Su-qin
2012/364 (PDF ) Zero-Knowledge Proofs with Low Amortized Communication from Lattice Assumptions Ivan Damgard, Adriana Lopez-Alt
2012/363 (PDF ) A Unified Indifferentiability Proof for Permutation- or Block Cipher-Based Hash Functions Anne Canteaut, Thomas Fuhr, María Naya-Plasencia, Pascal Paillier, Jean-René Reinhard, Marion Videau
2012/362 (PDF ) Achieving Constant Round Leakage-Resilient Zero-Knowledge Omkant Pandey
2012/361 (PDF ) Quantum Key Distribution in the Classical Authenticated Key Exchange Framework Michele Mosca, Douglas Stebila, Berkant Ustaoglu
2012/360 (PDF ) Multiple Differential Cryptanalysis using \LLR and $\chi^2$ Statistics Céline Blondeau, Benoît Gérard, Kaisa Nyberg
2012/359 (PDF ) Another look at non-uniformity Neal Koblitz, Alfred Menezes
2012/358 (PDF ) PICARO - A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance -- Extended Version -- Gilles Piret, Thomas Roche, Claude Carlet
2012/357 (PDF ) Publicly Verifiable Ciphertexts Juan Manuel Gonzälez Nieto, Mark Manulis, Bertram Poettering, Jothi Rangasamy, Douglas Stebila
2012/356 (PDF ) Fully Anonymous Attribute Tokens from Lattices Jan Camenisch, Gregory Neven, Markus Rückert
2012/355 (PDF ) Never trust a bunny Daniel J. Bernstein, Tanja Lange
2012/354 (PDF ) Hash Combiners for Second Pre-Image Resistance, Target Collision Resistance and Pre-Image Resistance have Long Output Arno Mittelbach
2012/353 (PDF ) On Reconfigurable Fabrics and Generic Side-Channel Countermeasures Robert Beat, Philipp Grabher, Dan Page, Stefan Tillich, Marcin Wójcik
2012/352 (PDF ) On Hashing Graphs Ashish Kundu, Elisa Bertino
2012/351 (PDF ) SipHash: a fast short-input PRF Jean-Philippe Aumasson, Daniel J. Bernstein
2012/350 (PDF ) A Note for the Ideal Order-Preserving Encryption Object and Generalized Order-Preserving Encryption Liangliang Xiao, I-Ling Yen
2012/349 (PDF ) A Differential Fault Attack on Grain-128a using MACs Subhadeep Banik, Subhamoy Maitra, Santanu Sarkar
2012/348 (PDF ) Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Gregory Neven
2012/347 (PDF ) Algebraic Differential Fault Attacks on LED using a Single Fault Injection Xinjie Zhao, Shize Guo, Fan Zhang, Tao Wang, Zhijie Shi, Keke Ji
2012/346 (PDF ) Edwards model of elliptic curves defined over any fields Oumar DIAO, Emmanuel FOUOTSA
2012/345 (PDF ) Breaking pairing-based cryptosystems using $\eta_T$ pairing over $GF(3^{97})$ Takuya Hayashi, Takeshi Shimoyama, Naoyuki Shinohara, Tsuyoshi Takagi
2012/344 (PDF ) Construction of New Classes of Knapsack Type Public Key Cryptosystem Using Uniform Secret Sequence, K(II)$\Sigma\Pi$PKC, Constructed Based on Maximum Length Code Masao KASAHARA
2012/343 (PDF ) High-Throughput Hardware Architecture for the SWIFFT / SWIFFTX Hash Functions Tamas Gyorfi, Octavian Cret, Guillaume Hanrot, Nicolas Brisebarre
2012/342 (PDF ) Enhancing Location Privacy for Electric Vehicles (at the right time) Joseph Liu, Man Ho Au, Willy Susilo, Jianying Zhou
2012/341 (PDF ) From Selective to Full Security: Semi-Generic Transformations in the Standard Model Michel Abdalla, Dario Fiore, Vadim Lyubashevsky
2012/340 (PDF ) Deciding Epistemic and Strategic Properties of Cryptographic Protocols Henning Schnoor
2012/339 (PDF ) Practical Polynomial Time Known Plaintext Attacks on a Stream Cipher Proposed by John Nash Adi Shamir, Eldad Zinger
2012/338 (PDF ) Characterizations on Algebraic Immunity for Multi-Output Boolean Functions Xiao Zhong, Mingsheng Wang
2012/337 (PDF ) Analysis and Trade-Offs for the (Complete Tree) Layered Subset Difference Broadcast Encryption Scheme Sanjay Bhattacherjee, Palash Sarkar
2012/336 (PDF ) RSA modulus generation in the two-party case Gerald Gavin
2012/335 (PDF ) Constructing Vectorial Boolean Functions with High Algebraic Immunity Based on Group Decomposition Yu Lou, Huiting Han, Chunming Tang, Maozhi Xu
2012/334 (PDF ) On the Traceability of Tags in SUAP RFID Authentication Protocols Masoumeh Safkhani, Nasour Bagheri, Majid Naderi
2012/333 (PDF ) On the Feasibility of Extending Oblivious Transfer Yehuda Lindell, Hila Zarosim
2012/332 (PDF ) A Non-delegatable Identity-based Designated Verifier Signature Scheme without Bilinear Pairings Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh
2012/331 (PDF ) Homomorphic Authentication Codes for Network Coding Zhaohui Tang
2012/330 (PDF ) A Way Reduce Signed Bitwise Differences that Transformed Into Same Modular Differences Xu ZiJie, Xu Ke
2012/329 (PDF ) An Analysis of ZVP-Attack on ECC Cryptosystems Claude Crépeau, Raza Ali Kazmi
2012/328 (PDF ) The Multivariate Probabilistic Encryption Scheme MQQ-ENC Danilo Gligoroski, Simona Samardjiska
2012/327 (PDF ) Security Analysis of RAPP An RFID Authentication Protocol based on Permutation Wang Shao-hui, Han Zhijie, Liu Sujuan, Chen Dan-wei
2012/326 (PDF ) New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques Allison Lewko, Brent Waters
2012/325 (PDF ) A note on generalized bent criteria for Boolean functions Sugata Gangopadhyay, Enes Pasalic, Pantelimon Stanica
2012/324 (PDF ) 3D Hardware Canaries Sébastien Briais, Stéphane Caron, Jean-Michel Cioranesco, Jean-Luc Danger, Sylvain Guilley, Jacques-Henri Jourdan, Arthur Milchior, David Naccache, Thibault Porteboeuf
2012/323 (PDF ) ML Confidential: Machine Learning on Encrypted Data Thore Graepel, Kristin Lauter, Michael Naehrig
2012/322 (PDF ) Revisiting Dedicated and Block Cipher based Hash Functions Anupam Pattanayak
2012/321 (PDF ) DECT Security Analysis Erik Tews
2012/320 (PDF ) The Discrete Logarithm Problem in non-representable rings Matan Banin, Boaz Tsaban
2012/319 (PDF ) Bounds on the Threshold Gap in Secret Sharing and its Applications Ignacio Cascudo, Ronald Cramer, Chaoping Xing
2012/318 (PDF ) Non-uniform cracks in the concrete: the power of free precomputation Daniel J. Bernstein, Tanja Lange
2012/317 (PDF ) A Do-It-All-Cipher for RFID: Design Requirements (Extended Abstract) Markku-Juhani O. Saarinen, Daniel Engels
2012/316 (PDF ) Computationally Complete Symbolic Attacker in Action Gergei Bana, Pedro Adão, Hideki Sakurada
2012/315 (PDF ) Using Variance to Analyze Visual Cryptography Schemes Teng Guo, Feng Liu, ChuanKun Wu, YoungChang Hou
2012/314 (PDF ) Generation of Nonlinear Feedback Shift Registers with special-purpose hardware Tomasz Rachwalik, Janusz Szmidt, Robert Wicik, Janusz Zablocki
2012/312 (PDF ) Cryptanalysis of a Provably Secure Gateway-Oriented Password-Based Authenticated Key Exchange Protocol Debiao He
2012/311 (PDF ) Tightly Secure Signatures and Public-Key Encryption Dennis Hofheinz, Tibor Jager
2012/310 (PDF ) A mathematical problem for security analysis of hash functions and pseudorandom generators Koji Nuida, Takuro Abe, Shizuo Kaji, Toshiaki Maeno, Yasuhide Numata
2012/309 (PDF ) Fast and compact elliptic-curve cryptography Mike Hamburg
2012/308 (PDF ) Verified Security of Redundancy-Free Encryption from Rabin and RSA Gilles Barthe, David Pointcheval, Santiago Zanella-Béguelin
2012/307 (PDF ) Multi-Channel Broadcast Encryption Duong Hieu Phan, David Pointcheval, Viet Cuong Trinh
2012/306 (PDF ) Efficient Threshold Zero-Knowledge with Applications to User-Centric Protocols Marcel Keller, Gert Læssøe Mikkelsen, Andy Rupp
2012/305 (PDF ) Resistance to Pirates 2.0: A Method from Leakage Resilient Cryptography Duong Hieu Phan, Viet Cuong Trinh
2012/304 (PDF ) Actively Secure Two-Party Evaluation of any Quantum Operation Frédéric Dupuis, Jesper Buus Nielsen, Louis Salvail
2012/303 (PDF ) On The Distribution of Linear Biases: Three Instructive Examples Mohamed Ahmed Abdelraheem, Martin Aagren, Peter Beelen, Gregor Leander
2012/302 (PDF ) On instance separation in the UC-framework István Vajda
2012/301 (PDF ) A Public Shuffle without Private Permutations Myungsun Kim, Jinsu Kim, Jung Hee Cheon
2012/300 (PDF ) Threshold Implementations of all 3x3 and 4x4 S-boxes B. Bilgin, S. Nikova, V. Nikov, V. Rijmen, G. Stütz
2012/299 (PDF ) Differential Power Analysis on ZUC Algorithm TANG Ming, CHENG PingPan, QIU ZhenLong
2012/298 (PDF ) Anonymous Credentials Light Foteini Baldimtsi, Anna Lysyanskaya
2012/297 (PDF ) Tamper and Leakage Resilience in the Split-State Model Feng-Hao Liu, Anna Lysyanskaya
2012/296 (PDF ) In the blink of an eye: There goes your AES key Sergei Skorobogatov, Christopher Woods
2012/295 (PDF ) Broadcast-enhanced key predistribution schemes Michelle Kendall, Keith M. Martin, Siaw-Lynn Ng, Maura B. Paterson, Douglas R. Stinson
2012/294 (PDF ) Two grumpy giants and a baby Daniel J. Bernstein, Tanja Lange
2012/293 (PDF ) New Transference Theorems on Lattices Possessing n^\epsilon-unique Shortest Vectors Wei Wei, Chengliang Tian, Xiaoyun Wang
2012/292 (PDF ) An Adaptive-Ciphertext Attack against "I $\oplus$ C'' Block Cipher Modes With an Oracle Jon Passki, Tom Ritter
2012/291 (PDF ) Efficient Dynamic Provable Possession of Remote Data via Update Trees Yihua Zhang, Marina Blanton
2012/290 (PDF ) Fully Homomorphic Message Authenticators Rosario Gennaro, Daniel Wichs
2012/289 (PDF ) Ring Group Signatures Liqun Chen
2012/288 (PDF ) Fair Exchange of Short Signatures without Trusted Third Party Philippe Camacho
2012/287 (PDF ) Computationally-Fair Group and Identity-Based Key-Exchange Andrew C. Yao, Yunlei Zhao
2012/286 (PDF ) Protecting Last Four Rounds of CLEFIA is Not Enough Against Differential Fault Analysis Sk Subidh Ali, Debdeep Mukhopadhyay
2012/285 (PDF ) Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions Masayuki Abe, Melissa Chase, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo
2012/284 (PDF ) Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages Fabrice Ben Hamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud
2012/283 (PDF ) Some properties of q-ary functions based on spectral analysis Deep Singh, Maheshanand Bhaintwal
2012/282 (PDF ) ALGEBRAIC COUNTERMEASURE TO ENHANCE THE IMPROVED SUMMATION GENERATOR WITH 2-BIT MEMORY Md. Iftekhar Salam, Hoon-Jae Lee
2012/281 (PDF ) Publicly Verifiable Delegation of Large Polynomials and Matrix Computations, with Applications Dario Fiore, Rosario Gennaro
2012/280 (PDF ) Improved ``Partial Sums"-based Square Attack on AES Michael Tunstall
2012/279 (PDF ) Concurrent Zero Knowledge in the Bounded Player Model Vipul Goyal, Abhishek Jain, Rafail Ostrovsky, Silas Richelson, Ivan Visconti
2012/278 (PDF ) Improved Indifferentiability Security Bound for the JH Mode Dustin Moody, Souradyuti Paul, Daniel Smith-Tone
2012/277 (PDF ) Cyptanalysis CDHP , BDHP and Tate pairing under certain conditions The Tate pairing is less secure than Weil Rkia Aouinatou, Mostafa Belkasmi
2012/276 (PDF ) Official Arbitration with Secure Cloud Storage Application Alptekin Küpçü
2012/275 (PDF ) Implementing BLAKE with AVX, AVX2, and XOP Samuel Neves, Jean-Philippe Aumasson
2012/274 (PDF ) Boomerang and Slide-Rotational Analysis of the SM3 Hash Function Aleksandar Kircanski, Amr M. Youssef
2012/273 (PDF ) Public-Key Cryptography from New Multivariate Quadratic Assumptions Yun-Ju Huang, Feng-Hao Liu, Bo-Yin Yang
2012/272 (PDF ) Passive Corruption in Statistical Multi-Party Computation Martin Hirt, Christoph Lucas, Ueli Maurer, Dominik Raub
2012/270 (PDF ) Quo Vadis Quaternion? Cryptanalysis of Rainbow over Non-Commutative Rings Enrico Thomae
2012/269 (PDF ) Quantifying Side-Channel Information Leakage from Web Applications Luke Mather, Elisabeth Oswald
2012/268 (PDF ) On the CCA2 Security of McEliece in the Standard Model Edoardo Persichetti
2012/267 (PDF ) Self-pairings on Hyperelliptic Curves Steven D. Galbraith, Chang-An Zhao
2012/266 (PDF ) Compilation Techniques for Efficient Encrypted Computation Christopher Fletcher, Marten van Dijk, Srinivas Devadas
2012/265 (PDF ) Foundations of Garbled Circuits Mihir Bellare, Viet Tung Hoang, Phillip Rogaway
2012/264 (PDF ) On the (In)Security of IDEA in Various Hashing Modes Lei Wei, Thomas Peyrin, Przemyslaw Sokolowski, San Ling, Josef Pieprzyk, Huaxiong Wang
2012/263 (PDF ) One-way Functions from Chebyshev Polynomials Kai-Yuen Cheong
2012/262 (PDF ) Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol I. Damgard, M. Keller, E. Larraia, C. Miles, N. P. Smart
2012/261 (PDF ) Dual Form Signatures: An Approach for Proving Security from Static Assumptions Michael Gerbush, Allison Lewko, Adam O'Neill, Brent Waters
2012/260 (PDF ) Transposition of AES Key Schedule Jialin Huang, Xuejia Lai
2012/259 (PDF ) A Novel Strong Designated Verifier Signature Scheme without Random Oracles Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh
2012/258 (PDF ) Full Proof Cryptography: Verifiable Compilation of Efficient Zero-Knowledge Protocols José Bacelar Almeida, Manuel Barbosa, Endre Bangerter, Gilles Barthe, Stephan Krenn, Santiago Zanella Béguelin
2012/256 (PDF ) The myth of generic DPA...and the magic of learning Carolyn Whitnall, Elisabeth Oswald, François-Xavier Standaert
2012/255 (PDF ) How to Garble Arithmetic Circuits Benny Applebaum, Yuval Ishai, Eyal Kushilevitz
2012/254 (PDF ) FastPRP: Fast Pseudo-Random Permutations for Small Domains Emil Stefanov, Elaine Shi
2012/253 (PDF ) Cryptanalysis of pairing-free certificateless authenticated key agreement protocol Zhian Zhu
2012/252 (PDF ) Fair Private Set Intersection with a Semi-trusted Arbiter Changyu Dong, Liqun Chen, Jan Camenisch, Giovanni Russello
2012/251 (PDF ) The Linux Pseudorandom Number Generator Revisited Patrick Lacharme, Andrea Röck, Vincent Strubel, Marion Videau
2012/250 (PDF ) New Identity Based Encryption And Its Proxy Re-encryption Xu An Wang, Xiaoyuan Yang
2012/249 (PDF ) Binary and q-ary Tardos codes, revisited Boris Skoric, Jan-Jaap Oosterwijk
2012/248 (PDF ) Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin Ghassan O. Karame, Elli Androulaki, Srdjan Capkun
2012/247 (PDF ) On Efficient Pairings on Elliptic Curves over Extension Fields Xusheng Zhang, Kunpeng Wang, Dongdai Lin
2012/246 (PDF ) A Secret Sharing Scheme Based on Group Presentations and the Word Problem Maggie Habeeb, Delaram Kahrobaei, Vladimir Shpilrain
2012/245 (PDF ) On the Equivalence between the Set Covering Problem and the Problem of Finding Optimal Cumulative Assignment Schemes Qiang Li, Xiangxue Li, Dong Zheng, Zheng Huang, Kefei Chen
2012/244 (PDF ) Cryptography from tensor problems Leonard J. Schulman
2012/243 (PDF ) COMPRESS MULTIPLE CIPHERTEXTS USING ELGAMAL ENCRYPTION SCHEMES MYUNGSUN KIM, JIHYE KIM, JUNG HEE CHEON
2012/242 (PDF ) Less is More: Relaxed yet Composable Security Notions for Key Exchange C. Brzuska, M. Fischlin, N. P. Smart, B. Warinschi, S. Williams
2012/241 (PDF ) Key distribution system and attribute-based encryption Masahiro Yagisawa
2012/240 (PDF ) Field Switching in BGV-Style Homomorphic Encryption Craig Gentry, Shai Halevi, Chris Peikert, Nigel P. Smart
2012/239 (PDF ) Zero-Knowledge for Multivariate Polynomials Valerie Nachef, Jacques Patarin, Emmanuel Volte
2012/238 (PDF ) The Boomerang Attacks on the Round-Reduced Skein-512 Hongbo Yu, Jiazhe Chen, XIaoyun Wang
2012/237 (PDF ) In the point of view security, An efficient scheme in IBE with random oracle Rkia Aouinatou, Mostafa Belkasmi
2012/236 (PDF ) On Necessary and Sufficient Conditions for Private Ballot Submission D. Bernhard, O. Pereira, B. Warinschi
2012/235 (PDF ) Ring-LWE in Polynomial Rings Leo Ducas, Alain Durmus
2012/234 (PDF ) SPN-Hash: Improving the Provable Resistance Against Differential Collision Attacks Jiali Choy, Huihui Yap, Khoongming Khoo, Jian Guo, Thomas Peyrin, Axel Poschmann, Chik How Tan
2012/233 (PDF ) A Cryptanalysis of HummingBird-2: The Differential Sequence Analysis Qi Chai, Guang Gong
2012/232 (PDF ) Implementing Pairings at the 192-bit Security Level Diego F. Aranha, Laura Fuentes-Castañeda, Edward Knapp, Alfred Menezes, Francisco Rodríguez-Henríquez
2012/231 (PDF ) A General Construction for 1-round $\delta$-RMT and (0, $\delta$)-SMT Reihaneh Safavi-Naini, Mohammed Ashraful Alam Tuhin, Pengwei Wang
2012/230 (PDF ) On Ideal Lattices and Learning with Errors Over Rings Vadim Lyubashevsky, Chris Peikert, Oded Regev
2012/229 (PDF ) Languages with Efficient Zero-Knowledge PCP's are in SZK Mohammad Mahmoody, David Xiao
2012/228 (PDF ) Physical Unclonable Functions in Cryptographic Protocols: Security Proofs and Impossibility Results Marten van Dijk, Ulrich Rührmair
2012/226 (PDF ) ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash Sarah Meiklejohn, C. Chris Erway, Alptekin Küpçü, Theodora Hinkle, Anna Lysyanskaya
2012/225 (PDF ) When Homomorphism Becomes a Liability Zvika Brakerski
2012/224 (PDF ) Shorter IBE and Signatures via Asymmetric Pairings Jie Chen, Hoon Wei Lim, San Ling, Huaxiong Wang, Hoeteck Wee
2012/223 (PDF ) A Generalization of the Rainbow Band Separation Attack and its Applications to Multivariate Schemes Enrico Thomae
2012/222 (PDF ) A secret sharing scheme of prime numbers based on hardness of factorization Kai-Yuen Cheong
2012/221 (PDF ) Almost-Everywhere Secure Computation with Edge Corruptions Nishanth Chandran, Juan Garay, Rafail Ostrovsky
2012/220 (PDF ) Hedged Public-key Encryption: How to Protect against Bad Randomness Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas Ristenpart, Gil Segev, Hovav Shacham, Scott Yilek
2012/219 (PDF ) Private Fingerprint Matching Siamak F. Shahandashti, Reihaneh Safavi-Naini, Philip Ogunbona
2012/218 (PDF ) Differentially Private Continual Monitoring of Heavy Hitters from Distributed Streams T-H. Hubert Chan, Mingfei Li, Elaine Shi, Wenchang Xu
2012/217 (PDF ) Efficient Dissection of Bicomposite Problems with Cryptanalytic Applications Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir
2012/216 (PDF ) Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts Duong-Hieu Phan, David Pointcheval, Siamak F. Shahandashti, Mario Strefler
2012/215 (PDF ) Quadratic Span Programs and Succinct NIZKs without PCPs Rosario Gennaro, Craig Gentry, Bryan Parno, Mariana Raykova
2012/214 (PDF ) Automatic Search of Truncated Impossible Differentials for Word-Oriented Block Ciphers (Full Version) Shengbao Wu, Mingsheng Wang
2012/213 (PDF ) Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong
2012/212 (PDF ) Perfect Algebraic Immune Functions Meicheng Liu, Yin Zhang, Dongdai Lin
2012/211 (PDF ) Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Kazuki Yoneyama
2012/210 (PDF ) On the Existence of Boolean Functions with Optimal Resistance against Fast Algebraic Attacks Yusong Du, Fangguo Zhang
2012/209 (PDF ) Adaptive Preimage Resistance Analysis Revisited:\\ Requirements, Subtleties and Implications Donghoon Chang, Moti Yung
2012/208 (PDF ) A NEW GUESS-AND-DETERMINE ATTACK ON THE A5/1 STREAM CIPHER Jay Shah, Ayan Mahalanobis
2012/206 (PDF ) (Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others (Extended Version) Shuang Wu, Dengguo Feng, Wenling Wu, Jian Guo, Le Dong, Jian Zou
2012/205 (PDF ) Information-flow control for programming on encrypted data J. C. Mitchell, R. Sharma, D. Stefan, J. Zimmerman
2012/204 (PDF ) Unique Group Signatures Matthew Franklin, Haibin Zhang
2012/203 (PDF ) Robust biometric-based user authentication scheme for wireless sensor networks Debiao He
2012/202 (PDF ) Secure Similarity Coefficients Computation with Malicious Adversaries Bo Zhang, Fangguo Zhang
2012/201 (PDF ) Comment an Anonymous Multi-receiver Identity-based Encryption Scheme J. H. Zhang, Y. B. Cui
2012/200 (PDF ) Aggregate Signcryption Alexander W. Dent
2012/199 (PDF ) Using Symmetries in the Index Calculus for Elliptic Curves Discrete Logarithm Jean-Charles Faugère, Pierrick Gaudry, Louise Huot, Guénaël Renault
2012/198 (PDF ) Beyond the Limitation of Prime-Order Bilinear Groups, and Round Optimal Blind Signatures Jae Hong Seo, Jung Hee Cheon
2012/197 (PDF ) On The Security of One-Witness Blind Signature Schemes Foteini Baldimtsi, Anna Lysyanskaya
2012/196 (PDF ) Multi-Instance Security and its Application to Password-Based Cryptography Mihir Bellare, Thomas Ristenpart, Stefano Tessaro
2012/195 (PDF ) The BlueJay Ultra-Lightweight Hybrid Cryptosystem Markku-Juhani O. Saarinen
2012/194 (PDF ) A Multivariate based Threshold Ring Signature Scheme Albrecht Petzoldt, Stanislav Bulygin, Johannes Buchmann
2012/193 (PDF ) An Efficient Homomorphic Encryption Protocol for Multi-User Systems Liangliang Xiao, Osbert Bastani, I-Ling Yen
2012/192 (PDF ) Extending Order Preserving Encryption for Multi-User Systems Liangliang Xiao, I-Ling Yen, Dung T. Huynh
2012/191 (PDF ) Security Analysis and Enhancement for Prefix-Preserving Encryption Schemes Liangliang Xiao, I-Ling Yen
2012/190 (PDF ) On the Security of an Improved Password Authentication Scheme Based on ECC Ding Wang, Chun-guang Ma
2012/189 (PDF ) Universally Composable Key-Management Steve Kremer, Robert Künnemann, Graham Steel
2012/188 (PDF ) Non-Malleable Extractors, Two-Source Extractors and Privacy Amplification Xin Li
2012/187 (PDF ) SmartTokens: Delegable Access Control with NFC-enabled Smartphones (Full Version) Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Sandeep Tamrakar, Christian Wachsmann
2012/186 (PDF ) Third-order nonlinearities of some biquadratic monomial Boolean functions Brajesh Kumar Singh
2012/185 (PDF ) Replay attacks that violate ballot secrecy in Helios Ben Smyth
2012/184 (PDF ) Asymptotic fingerprinting capacity in the Combined Digit Model Dion Boesten, Boris Skoric
2012/183 (PDF ) Differentially Private Smart Metering with Battery Recharging Michael Backes, Sebastian Meiser
2012/182 (PDF ) How to Construct Quantum Random Functions Mark Zhandry
2012/181 (PDF ) A Modular Framework for Multi-Factor Authentication and Key Exchange Nils Fleischhacker, Mark Manulis, Amir Azodi
2012/180 (PDF ) Yet Another SHA-3 Round 3 FPGA Results Paper Brian Baldwin, William P. Marnane
2012/179 (PDF ) Billion-Gate Secure Computation with Malicious Adversaries Benjamin Kreuter, abhi shelat, Chih-hao Shen
2012/178 (PDF ) Eperio: Mitigating Technical Complexity in Cryptographic Election Verification Aleksander Essex, Jeremy Clark, Urs Hengartner, Carlisle Adams
2012/177 (PDF ) Everlasting Multi-Party Computation Dominique Unruh
2012/176 (PDF ) Improvements of Algebraic Attacks Based on Structured Gaussian Elimination Satrajit Ghosh, Abhijit Das
2012/175 (PDF ) Optimal First-Order Masking with Linear and Non-Linear Bijections Houssem MAGHREBI, Claude CARLET, Sylvain GUILLEY, Jean-Luc DANGER
2012/174 (PDF ) Zero Knowledge with Rubik's Cubes and Non-Abelian Groups Emmanuel VOLTE, Jacques PATARIN, Valérie NACHEF
2012/173 (PDF ) Automatically Verified Mechanized Proof of One-Encryption Key Exchange Bruno Blanchet
2012/172 (PDF ) Attacking RSA-CRT Signatures with Faults on Montgomery Multiplication Pierre-Alain Fouque, Nicolas Guillermin, Delphine Leresteux, Mehdi Tibouchi, Jean-Christophe Zapalowicz
2012/171 (PDF ) Quantum Money from Hidden Subspaces Scott Aaronson, Paul Christiano
2012/170 (PDF ) Approaches for the performance increasing of software implementation of integer multiplication in prime fields Vladislav Kovtun, Andrew Okhrimenko
2012/169 (PDF ) Analysis of Minimum Numbers of Linearly Active S-Boxes of a Class of Generalized Feistel Block Ciphers Xiaopei Guo, Kejian Xu, Tongsen Sun, Xiubin Fan
2012/168 (PDF ) A Distinguisher-Based Attack of a Homomorphic Encryption Scheme Relying on Reed-Solomon Codes Valérie Gauthier, Ayoub Otmani, Jean-Pierre Tillich
2012/167 (PDF ) Pairing-based methods for genus 2 jacobians with maximal endomorphism ring Sorina Ionica
2012/166 (PDF ) A List of Maximum Period NLFSRs Elena Dubrova
2012/165 (PDF ) Key Updates for RFID Distance-Bounding Protocols: Achieving Narrow-Destructive Privacy Cristina Onete
2012/164 (PDF ) On Secure Two-party Integer Division Morten Dahl, Chao Ning, Tomas Toft
2012/163 (PDF ) Differential propagation analysis of Keccak Joan Daemen, Gilles Van Assche
2012/162 (PDF ) Provably Secure Online/Off-line Identity-Based Signature Scheme forWireless Sensor Network Jayaprakash Kar
2012/161 (PDF ) New Constructions of Low Correlation Sequences with High Linear Complexity Hai Xiong, Chao Li, Qingping Dai, Shaojing Fu
2012/159 (PDF ) Hybrid Encryption in the Multi-User Setting G. M. Zaverucha
2012/158 (PDF ) Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading Peter Gazi, Stefano Tessaro
2012/157 (PDF ) Attack on Fully Homomorphic Encryption over the Integers Gu Chunsheng
2012/156 (PDF ) Fast Embedded Software Hashing Dag Arne Osvik
2012/155 (PDF ) Toward Practical Group Encryption Laila El Aimani, Marc Joye
2012/153 (PDF ) A Framework for the Cryptographic Verification of Java-like Programs Ralf Kuesters, Tomasz Truderung, Juergen Graf
2012/152 (PDF ) On security of a Certificateless Aggregate Signature Scheme Limin Shen, Yinxia Sun
2012/151 (PDF ) On Boolean Ideals and Varieties with Application to Algebraic Attacks Alexander Rostovtsev, Alexey Mizyukin
2012/150 (PDF ) Circular chosen-ciphertext security with compact ciphertexts Dennis Hofheinz
2012/149 (PDF ) Attacking Scrambled Burrows-Wheeler Transform Martin Stanek
2012/148 (PDF ) Replacing Username/Password with Software-Only Two-Factor Authentication Michael Scott
2012/147 (PDF ) On Security Arguments of the Second Round SHA-3 Candidates Elena Andreeva, Andrey Bogdanov, Bart Mennink, Bart Preneel, Christian Rechberger
2012/146 (PDF ) On Polynomial Systems Arising from a Weil Descent Christophe Petit, Jean-Jacques Quisquater
2012/145 (PDF ) Construction of the Tsujii-Shamir-Kasahara (TSK) Type Multivariate Public Key Cryptosystem, which relies on the Difficulty of Prime Factorization Shigeo Tsujii, Kohtaro Tadaki, Masahito Gotaishi, Ryou Fujita
2012/144 (PDF ) Somewhat Practical Fully Homomorphic Encryption Junfeng Fan, Frederik Vercauteren
2012/143 (PDF ) Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions Rafail Ostrovsky, Alessandra Scafuro, Ivan Visconti, Akshay Wadia
2012/142 (PDF ) Identity-Based Encryption with Master Key-Dependent Message Security and Applications David Galindo, Javier Herranz, Jorge Villar
2012/141 (PDF ) Bicliques for permutations: collision and preimage attacks in stronger settings Dmitry Khovratovich
2012/140 (PDF ) Highly-Parallel Montgomery Multiplication for Multi-core General-Purpose Microprocessors Selcuk Baktir, Erkay Savas
2012/139 (PDF ) Formal verication of secure ad-hoc network routing protocols using deductive model-checking Ta Vinh Thong
2012/138 (PDF ) An Improved Differential Attack on Full GOST (extended version) Nicolas T. Courtois
2012/137 (PDF ) Usable assembly language for GPUs: a success story Daniel J. Bernstein, Hsieh-Chung Chen, Chen-Mou Cheng, Tanja Lange, Ruben Niederhagen, Peter Schwabe, Bo-Yin Yang
2012/136 (PDF ) Adaptive Key Protection in Complex Cryptosystems with Attributes Zilong Wang, Danfeng (Daphne) Yao, Rongquan Feng
2012/135 (PDF ) David & Goliath Oblivious Affine Function Evaluation - Asymptotically Optimal Building Blocks for Universally Composable Two-Party Computation from a Single Untrusted Stateful Tamper-Proof Hardware Token Nico Döttling, Daniel Kraschewski, Jörn Müller-Quade
2012/134 (PDF ) A Digital Signature Scheme for Long-Term Security Dimitrios Poulakis, Robert Rolland
2012/133 (PDF ) Toward Practical Private Access to Data Centers via Parallel ORAM Jacob R. Lorch, Bryan Parno, James Mickens, Mariana Raykova, Joshua Schiffman
2012/132 (PDF ) CFS Software Implementation Gregory Landais, Nicolas Sendrier
2012/131 (PDF ) Composition Theorems for CCA Cryptographic Security Rodolphe Lampe, Jacques Patarin
2012/130 (PDF ) Broadcast (and Round) Efficient Verifiable Secret Sharing Juan Garay, Clint Givens, Rafail Ostrovsky, Pavel Raykov
2012/129 (PDF ) Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts Nelly Fazio, Irippuge Milinda Perera
2012/128 (PDF ) Provably Secure Distance-Bounding: an Analysis of Prominent Protocols Marc Fischlin, Cristina Onete
2012/127 (PDF ) Additive autocorrelation of some classes of cubic semi-bent Boolean functions Deep Singh, Maheshanand Bhaintwal
2012/126 (PDF ) Compact Implementation of Threefish and Skein on FPGA Nuray At, Jean-Luc Beuchat, Ismail San
2012/124 (PDF ) On Securing Communication From Profilers Sandra Diaz-Santiago, Debrup Chakraborty
2012/123 (PDF ) Injection of transient faults using electromagnetic pulses -Practical results on a cryptographic system- A. Dehbaoui, J. M. Dutertre, B. Robisson, P. Orsatelli, P. Maurine, A. Tria
2012/122 (PDF ) Efficient Arithmetic on Elliptic Curves over Fields of Characteristic Three Reza R. Farashahi, Hongfeng Wu, Chang-An Zhao
2012/121 (PDF ) An Efficient Multistage Secret Sharing Scheme Using Linear One-way Functions and Bilinear Maps Mitra Fatemi, Taraneh Eghlidos, Mohammadreza Aref
2012/120 (PDF ) Password Protected Smart Card and Memory Stick Authentication Against Off-line Dictionary Attacks Yongge Wang
2012/119 (PDF ) Accelerating the Final Exponentiation in the Computation of the Tate Pairings Taechan Kim, Sungwook Kim, Jung Hee Cheon
2012/118 (PDF ) Stronger Public Key Encryption Schemes Withstanding RAM Scraper Like Attacks S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan
2012/117 (PDF ) Universally Composable Security With Local Adversaries Ran Canetti, Margarita Vald
2012/116 (PDF ) Clash Attacks on the Verifiability of E-Voting Systems Ralf Kuesters, Tomasz Truderung, Andreas Vogt
2012/115 (PDF ) Cryptanalysis of auditing protocol proposed by Wang et al. for data storage security in Cloud Computing XU Chun-xiang, HE Xiao-hu, Daniel Abraha
2012/114 (PDF ) On Hardening Leakage Resilience of Random Extractors for Instantiations of Leakage Resilient Cryptographic Primitives Danyang Chen, Yongbin Zhou, Yang Han, Rui Xue, Qing He
2012/113 (PDF ) On the Collision and Preimage Security of MDC-4 in the Ideal Cipher Model Bart Mennink
2012/112 (PDF ) On The Nonlinearity of Maximum-length NFSR Feedbacks Meltem Sonmez Turan
2012/111 (PDF ) On the Immunity of Rotation Symmetric Boolean Functions Against Fast Algebraic Attacks Yin Zhang, Meicheng Liu, Dongdai Lin
2012/110 (PDF ) Finding Optimal Formulae for Bilinear Maps Razvan Barbulescu, Jérémie Detrey, Nicolas Estibals, Paul Zimmermann
2012/108 (PDF ) On the Optimality of Lattices for the Coppersmith Technique Yoshinori Aono, Manindra Agrawal, Takakazu Satoh, Osamu Watanabe
2012/107 (PDF ) Security Analysis of A Single Sign-On Mechanism for Distributed Computer Networks Guilin Wang, Jiangshan Yu, Qi Xie
2012/106 (PDF ) More on Correcting Errors in RSA Private Keys: Breaking CRT-RSA with Low Weight Decryption Exponents Santanu Sarkar, Subhamoy Maitra
2012/105 (PDF ) Generic Construction of Certificate Based Encryption from Certificateless Encryption Revisited Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang
2012/104 (PDF ) Provably Secure Generic Construction of Certificate Based Signature from Certificateless Signature in Standard Model Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang
2012/103 (PDF ) FlipIt: The Game of "Stealthy Takeover" Marten van Dijk, Ari Juels, Alina Oprea, Ronald L. Rivest
2012/102 (PDF ) On the Circular Security of Bit-Encryption Ron Rothblum
2012/100 (PDF ) Cryptanalysis of a Universally Verifiable Efficient Re-encryption Mixnet Shahram Khazaei, Björn Terelius, Douglas Wikström
2012/099 (PDF ) Homomorphic Evaluation of the AES Circuit Craig Gentry, Shai Halevi, Nigel P. Smart
2012/098 (PDF ) Combined Attacks on the AES Key Schedule François Dassance, Alexandre Venelli
2012/097 (PDF ) An algorithm for factoring integers Yingpu Deng, Yanbin Pan
2012/096 (PDF ) The Collision Security of MDC-4 Ewan Fleischmann, Christian Forler, Stefan Lucks, Jakob Wenzel
2012/095 (PDF ) Recursive Composition and Bootstrapping for SNARKs and Proof-Carrying Data Nir Bitansky, Ran Canetti, Alessandro Chiesa, Eran Tromer
2012/094 (PDF ) Algebraic attack on lattice based cryptosystems via solving equations over real numbers. Jintai Ding, Dieter Schmidt
2012/093 (PDF ) Recent Results on Balanced Symmetric Boolean Functions Yingming Guo, Guangpu Gao, Yaqun Zhao
2012/092 (PDF ) Tolerant Algebraic Side-Channel Analysis of {AES} Yossef Oren, Avishai Wool
2012/090 (PDF ) Worst-Case to Average-Case Reductions for Module Lattices Adeline Langlois, Damien Stehle
2012/089 (PDF ) ECM at Work Joppe W. Bos, Thorsten Kleinjung
2012/087 (PDF ) Collision Bounds for the Additive Pollard Rho Algorithm for Solving Discrete Logarithms Joppe W. Bos, Alina Dudeanu, Dimitar Jetchev
2012/085 (PDF ) Study of the invariant coset attack on PRINTcipher: more weak keys with practical key recovery Stanislav Bulygin, Michael Walter
2012/084 (PDF ) Improved Algebraic Side-Channel Attack on AES Mohamed Saied Emam Mohamed, Stanislav Bulygin, Michael Zohner, Annelie Heuser, Michael Walter
2012/083 (PDF ) Optimally Robust Private Information Retrieval Casey Devet, Ian Goldberg, Nadia Heninger
2012/082 (PDF ) Semi-Supervised Template Attack Liran Lerman, Stephane Fernandes Medeiros, Nikita Veshchikov, Cedric Meuter, Gianluca Bontempi, Olivier Markowitch
2012/081 (PDF ) Computational Soundness of Symbolic Zero-knowledge Proofs: Weaker Assumptions and Mechanized Verification Michael Backes, Fabian Bendun, Dominique Unruh
2012/080 (PDF ) Strongly Unforgeable Proxy Re-Signatures in the Standard Model S. Sree Vivek, S. Sharmila Deva Selvi, Guhan Balasubramanian, C. Pandu Rangan
2012/079 (PDF ) Public Key Cryptosystems Constructed Based on Reed-Solomon Codes, K(XV)SE(2)PKC, Realizing Coding Rate of Exactly 1.0 Masao KASAHARA
2012/078 (PDF ) Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP Zvika Brakerski
2012/077 (PDF ) MAGNITUDE SQUARED COHERENCE BASED SCA Sebastien Tiran, Amine Dehbaoui, Philippe Maurine
2012/076 (PDF ) Secure Identity-Based Encryption in the Quantum Random Oracle Model Mark Zhandry
2012/075 (PDF ) Efficient identity-based threshold decryption scheme from bilinear pairings Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang, Guoyan Zhang
2012/074 (PDF ) Another look at HMAC Neal Koblitz, Alfred Menezes
2012/073 (PDF ) Efficient identity-based threshold signature scheme from bilinear pairings in the standard model Wei Gao, Guilin Wang, Xueli Wang, Kefei Chen
2012/072 (PDF ) Particularly Friendly Members of Family Trees Craig Costello
2012/071 (PDF ) Fast Reductions from RAMs to Delegatable Succinct Constraint Satisfaction Problems Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer
2012/070 (PDF ) Finding ECM-Friendly Curves through a Study of Galois Properties Razvan Barbulescu, Joppe W. Bos, Cyril Bouvier, Thorsten Kleinjung, Peter L. Montgomery
2012/069 (PDF ) Automatic Search of Attacks on round-reduced AES and Applications Charles Bouillaguet, Patrick Derbez, Pierre-Alain Fouque
2012/067 (PDF ) Parallelizing message schedules to accelerate the computations of hash functions Shay Gueron, Vlad Krasnov
2012/066 (PDF ) Weak Keys of the Full MISTY1 Block Cipher for Related-Key Cryptanalysis Jiqiang Lu, Wen-She Yap, Yongzhuang Wei
2012/065 (PDF ) Modified version of “Latin Dances Revisited: New Analytic Results of Salsa20 and ChaCha” Tsukasa Ishiguro
2012/064 (PDF ) Ron was wrong, Whit is right Arjen K. Lenstra, James P. Hughes, Maxime Augier, Joppe W. Bos, Thorsten Kleinjung, Christophe Wachter
2012/063 (PDF ) Randomized Partial Checking Revisited Shahram Khazaei, Douglas Wikström
2012/061 (PDF ) A Pairing Based Strong Designated Verifier Signature Scheme without Random Oracles Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh
2012/060 (PDF ) Improved Security for Linearly Homomorphic Signatures: A Generic Framework David Mandell Freeman
2012/059 (PDF ) Message Authentication, Revisited Yevgeniy Dodis, Eike Kiltz, Krzysztof Pietrzak, Daniel Wichs
2012/058 (PDF ) Key recycling in authentication Christopher Portmann
2012/057 (PDF ) Anonymous Constant-Size Ciphertext HIBE From Asymmetric Pairings Somindu C. Ramanna, Palash Sarkar
2012/056 (PDF ) A New Pseudorandom Generator from Collision-Resistant Hash Functions Alexandra Boldyreva, Virendra Kumar
2012/054 (PDF ) On the performance of certain Private Set Intersection protocols Emiliano De Cristofaro, Gene Tsudik
2012/053 (PDF ) Beating Shannon requires BOTH efficient adversaries AND non-zero advantage Yevgeniy Dodis
2012/052 (PDF ) Identity-based Encryption with Efficient Revocation Alexandra Boldyreva, Vipul Goyal, Virendra Kumar
2012/051 (PDF ) Eavesdropping on Satellite Telecommunication Systems Benedikt Driessen
2012/050 (PDF ) Investigating the Potential of Custom Instruction Set Extensions for SHA-3 Candidates on a 16-bit Microcontroller Architecture Jeremy Constantin, Andreas Burg, Frank K. Gurkaynak
2012/049 (PDF ) 2-Dimension Sums: Distinguishers Beyond Three Rounds of RIPEMD-128 and RIPEMD-160 Yu Sasaki, Lei Wang
2012/048 (PDF ) Designing Integrated Accelerator for Stream Ciphers with Structural Similarities Sourav Sen Gupta, Anupam Chattopadhyay, Ayesha Khalid
2012/047 (PDF ) Incremental Deterministic Public-Key Encryption Ilya Mironov, Omkant Pandey, Omer Reingold, Gil Segev
2012/046 (PDF ) Modifying Boolean Functions to Ensure Maximum Algebraic Immunity Konstantinos Limniotis, Nicholas Kolokotronis, Nicholas Kalouptsidis
2012/045 (PDF ) Signature Schemes Secure against Hard-to-Invert Leakage Sebastian Faust, Carmit Hazay, Jesper Buus Nielsen, Peter Sebastian Nordholt, Angela Zottarel
2012/044 (PDF ) PSCPA: Patient Self-controllable Privacy-preserving Cooperative Authentication in Distributed m-Healthcare Systems Jun Zhou, Zhenfu Cao
2012/043 (PDF ) A novel Group Key Transfer Protocol Chingfang Hsu, Bing Zeng, Qi Cheng, Guohua Cui
2012/042 (PDF ) Key Length Estimation of Pairing-based Cryptosystems using $\eta_T$ Pairing Naoyuki Shinohara, Takeshi Shimoyama, Takuya Hayashi, Tsuyoshi Takagi
2012/040 (PDF ) Single-block collision attack on MD5 Marc Stevens
2012/039 (PDF ) Security Analysis of a Multi-Factor Authenticated Key Exchange Protocol Feng Hao, Dylan Clarke
2012/038 (PDF ) Cryptanalysis of the CHES 2009/2010 Random Delay Countermeasure François Durvaux, Mathieu Renauld, François-Xavier Standaert, Loic van Oldeneel tot Oldenzeel, Nicolas Veyrat-Charvillon
2012/037 (PDF ) Some results on $q$-ary bent functions Deep Singh, Maheshanand Bhaintwal, Brajesh Kumar Singh
2012/036 (PDF ) Efficient Leakage-free Authentication of Trees, Graphs and Forests Ashish Kundu, Mikhail Atallah, Elisa Bertino
2012/035 (PDF ) Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, Francois-Xavier Standaert, John Steinberger, Elmar Tischhauser
2012/034 (PDF ) Automatic Quantification of Cache Side-Channels Boris Köpf, Laurent Mauborgne, Martin Ochoa
2012/033 (PDF ) A note on hyper-bent functions via Dillon-like exponents Sihem Mesnager, Jean-Pierre Flori
2012/032 (PDF ) Counterexamples to Hardness Amplification Beyond Negligible Yevgeniy Dodis, Abhishek Jain, Tal Moran, Daniel Wichs
2012/031 (PDF ) An error in "On a new formal proof model for RFID location privacy" Da-Zhi Sun
2012/030 (PDF ) Fault Analysis of the KATAN Family of Block Ciphers Shekh Faisal Abdul-Latip, Mohammad Reza Reyhanitabar, Willy Susilo, Jennifer Seberry
2012/029 (PDF ) On the Exact Security of Schnorr-Type Signatures in the Random Oracle Model Yannick Seurin
2012/028 (PDF ) A First-Order Leak-Free Masking Countermeasure Houssem MAGHREBI, Emmanuel PROUFF, Sylvain GUILLEY, Jean-Luc DANGER
2012/026 (PDF ) Decoding Random Binary Linear Codes in $2^{n/20}$: How $1+1=0$ Improves Information Set Decoding Anja Becker, Antoine Joux, Alexander May, Alexander Meurer
2012/025 (PDF ) A new remote data integrity checking scheme for cloud storage Xiangtao Yan, Yifa Li
2012/024 (PDF ) Variants of Waters' Dual-System Primitives Using Asymmetric Pairings Somindu C. Ramanna, Sanjit Chatterjee, Palash Sarkar
2012/023 (PDF ) On the security of Lo et al.’s ownership transfer protocol Masoumeh Safkhani, Nasour Bagheri, Majid Naderi, Ali Mahani
2012/022 (PDF ) Polynomial-Time, Semantically-Secure Encryption Achieving the Secrecy Capacity Mihir Bellare, Stefano Tessaro
2012/020 (PDF ) Dickson polynomials, hyperelliptic curves and hyper-bent functions Jean-Pierre Flori, Sihem Mesnager
2012/019 (PDF ) Towards Unconditional Soundness: Computationally Complete Symbolic Attacker Gergei Bana, Hubert Comon-Lundh
2012/018 (PDF ) Attacks and Security Proofs of EAX-Prime Kazuhiko Minematsu, Stefan Lucks, Hiraku Morita, Tetsu Iwata
2012/017 (PDF ) Secondary constructions on generalized bent functions Brajesh Kumar Singh
2012/015 (PDF ) A Cryptographic Treatment of the Wiretap Channel Mihir Bellare, Stefano Tessaro, Alexander Vardy
2012/014 (PDF ) Reset Indifferentiability from Weakened Random Oracle Salvages One-pass Hash Functions Yusuke Naito, Kazuki Yoneyama, Kazuo Ohta
2012/012 (PDF ) Malleable Proof Systems and Applications Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn
2012/011 (PDF ) Biclique Attack of the Full ARIA-256 Shao-zhen Chen Tian-min Xu
2012/010 (PDF ) PayTree: "Amortized Signature" for Flexible Micro-Payments Charanjit Jutla, Moti Yung
2012/009 (PDF ) On the Indifferentiability of the Integrated-Key Hash Functions Saif Al-Kuwari
2012/008 (PDF ) Security proof with dishonest keys Hubert Comon-Lundh, Véronique Cortier, Guillaume Scerri
2012/007 (PDF ) Optimal Multiple Assignments with (m,m)-Scheme for General Access Structures Qiang Li, Xiangxue Li, Dong Zheng, Kefei Chen
2012/006 (PDF ) Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security Susan Hohenberger, Allison Lewko, Brent Waters
2012/005 (PDF ) A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy Benjamin Fuller, Adam O'Neill, Leonid Reyzin
2012/004 (PDF ) The new SHA-3 software shootout Daniel J. Bernstein, Tanja Lange
2012/003 (PDF ) On the distinctness of binary sequences derived from primitive sequences modulo square-free odd integers Qun-Xiong Zheng, Wen-Feng Qi, Tian Tian
2012/002 (PDF ) ECC2K-130 on NVIDIA GPUs Daniel J. Bernstein, Hsieh-Chung Chen, Chen-Mou Cheng, Tanja Lange, Ruben Niederhagen, Peter Schwabe, Bo-Yin Yang
2012/001 (PDF ) Digital Signatures from Challenge-Divided Sigma-Protocols Andrew C. Yao, Yunlei Zhao
2011/714 (PDF ) Position-Verification in Multi-Channel Models Huajun Zhang, Zongyang Zhang, Zhenfu Cao
2011/713 (PDF ) A server-aided verification signature scheme without random oracles Bin Wang, Qing Zhao
2011/712 (PDF ) Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices Johann Großschädl, Dan Page, Stefan Tillich
2011/711 (PDF ) Evolutionary Construction of de Bruijn Sequences Meltem Sonmez Turan
2011/710 (PDF ) Cryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware Alex Biryukov, Johann Großschädl
2011/709 (PDF ) Fault Attack against Miller's algorithm Nadia El Mrabet
2011/708 (PDF ) Computational Extractors and Pseudorandomness Dana Dachman-Soled, Rosario Gennaro, Hugo Krawczyk, Tal Malkin
2011/707 (PDF ) Cryptanalysis of The Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF Alex Biryukov, Ilya Kizhvatov, Bin Zhang
2011/706 (PDF ) Improved Side Channel Attacks on Pairing Based Cryptography Johannes Blömer, Peter Günther, Gennadij Liske
2011/705 (PDF ) Differential Attacks on Generalized Feistel Schemes Valerie Nachef, Emmanuel Volte, Jacques Patarin
2011/704 (PDF ) Security Analysis of a PUF based RFID Authentication Protocol Masoumeh Safkhani, Nasour Bagheri, Majid Naderi
2011/703 (PDF ) Waters Signatures with Optimal Security Reduction Dennis Hofheinz, Tibor Jager, Edward Knapp
2011/702 (PDF ) Comments of an efficient and secure multi-server authentication scheme with key agreement Yitao Chen
2011/701 (PDF ) Decentralized Attribute-Based Signatures Tatsuaki Okamoto, Katsuyuki Takashima
2011/700 (PDF ) Efficient Attribute-Based Signatures for Non-Monotone Predicates in the Standard Model Tatsuaki Okamoto, Katsuyuki Takashima
2011/698 (PDF ) A generalization of the class of hyper-bent Boolean functions in binomial forms Chunming Tang, Yu Lou, Yanfeng Qi, Baocheng Wang, Yixian Yang
2011/697 (PDF ) SPONGENT: The Design Space of Lightweight Cryptographic Hashing Andrey Bogdanov, Miroslav Knezevic, Gregor Leander, Deniz Toz, Kerem Varici, Ingrid Verbauwhede
2011/696 (PDF ) Efficient Network Coding Signatures in the Standard Model Dario Catalano, Dario Fiore, Bogdan Warinschi
2011/695 (PDF ) Deterministic Identity Based Signature Scheme and its Application for Aggregate Signatures S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
2011/694 (PDF ) Generic Side-channel Distinguisher Based on Kolmogorov-Smirnov Test: Explicit Construction and Practical Evaluation Jiye Liu, Yongbin Zhou, Shuguo Yang, Dengguo Feng
2011/693 (PDF ) A non-interactive deniable authentication scheme in the standard model Bin Wang, Qing Zhao, Ke Dai
2011/692 (PDF ) Fully Secure (Doubly-)Spatial Encryption under Simpler Assumptions Cheng Chen, Zhenfeng Zhang, Dengguo Feng
2011/691 (PDF ) Yet Another Ultralightweight Authentication Protocol that is Broken Gildas Avoine, Xavier Carpent
2011/690 (PDF ) A New Class of Multivariate Public Key Cryptosystem Constructed on the Basis of Message-Dependent Transformation Masao KASAHARA
2011/688 (PDF ) Authenticated Key Exchange under Bad Randomness Guomin Yang, Shanshan Duan, Duncan S. Wong, Chik How Tan, Huaxiong Wang
2011/687 (PDF ) Cryptanalysis of WG-7 (A Lightweight Stream Cipher for RFID Encryption) Mohammad Ali Orumiehchiha, Josef Pieprzyk, Ron Steinfeld
2011/686 (PDF ) Analysis of some natural variants of the PKP Algorithm Rodolphe LAMPE, Jacques PATARIN
2011/685 (PDF ) Cryptanalysis of Symmetric Block Ciphers Based on the Feistel Network with Non-bijective S-boxes in the Round Function Roman Oliynykov
2011/684 (PDF ) Identification Based Encryption with RSA-OAEP. Using SEM and Without Rkia Aouinatou, Mostafa Belkasmi
2011/683 (PDF ) Timing Attacks against the Syndrome Inversion in Code-based Cryptosystems Falko Strenzke
2011/682 (PDF ) UC framework for anonymous communication István Vajda
2011/681 (PDF ) Physically Uncloneable Functions in the Universal Composition Framework Chris Brzuska, Marc Fischlin, Heike Schröder, Stefan Katzenbeisser
2011/680 (PDF ) Better Bootstrapping in Fully Homomorphic Encryption Craig Gentry, Shai Halevi, Nigel P. Smart
2011/679 (PDF ) CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm Junaid Jameel Ahmad, Shujun Li, Ahmad-Reza Sadeghi, Thomas Schneider
2011/678 (PDF ) On definitions of selective opening security Florian Böhl, Dennis Hofheinz, Daniel Kraschewski
2011/677 (PDF ) CommitCoin: Carbon Dating Commitments with Bitcoin Jeremy Clark, Aleksander Essex
2011/676 (PDF ) Enhanced Biometrics-based Remote User Authentication Scheme Using Smart Cards Jian-Zhu Lu, Shaoyuan Zhang, Shijie Qie
2011/675 (PDF ) Basing Obfuscation on Simple Tamper-Proof Hardware Assumptions Nico Döttling, Thilo Mie, Jörn Müller-Quade, Tobias Nilges
2011/674 (PDF ) Extended Combinatorial Constructions for Peer-to-peer User-Private Information Retrieval Colleen M. Swanson, Douglas R. Stinson
2011/673 (PDF ) Pseudorandom Signatures Nils Fleischhacker, Felix Günther, Franziskus Kiefer, Mark Manulis, Bertram Poettering
2011/672 (PDF ) Fast and Secure Root Finding for Code-based Cryptosystems Falko Strenzke
2011/671 (PDF ) Improved Results on Impossible Differential Cryptanalysis of Reduced-Round Camellia-192/256 Ya Liu, Dawu Gu, Zhiqiang Liu, Wei Li, Ying Man
2011/670 (PDF ) SHA-3 on ARM11 processors Peter Schwabe, Bo-Yin Yang, Shang-Yi Yang
2011/669 (PDF ) Small Linearization: Memory Friendly Solving of Non-Linear Equations over Finite Fields Christopher Wolf, Enrico Thomae
2011/668 (PDF ) Re-Encryption-Based Key Management Towards Secure and Scalable Mobile Applications in Clouds Piotr K. Tysowski, M. Anwarul Hasan
2011/666 (PDF ) A Gross-Zagier formula for quaternion algebras over totally real fields Eyal Z. Goren, Kristin E. Lauter
2011/665 (PDF ) Efficient Modular Exponentiation-based Puzzles for Denial-of-Service Protection Jothi Rangasamy, Douglas Stebila, Lakshmi Kuppusamy, Colin Boyd, Juan Gonzalez Nieto
2011/664 (PDF ) On the Security of ID Based Signcryption Schemes S. Sharmila Deva Selvi, S. Sree Vivek, Dhinakaran Vinayagamurthy, C. Pandu Rangan
2011/663 (PDF ) Cloud-Assisted Multiparty Computation from Fully Homomorphic Encryption Adriana Lopez-Alt, Eran Tromer, Vinod Vaikuntanathan
2011/662 (PDF ) Deploying secure multi-party computation for financial data analysis Dan Bogdanov, Riivo Talviste, Jan Willemson
2011/661 (PDF ) New Impossible Differential Attacks on Camellia Dongxia Bai, Leibo Li
2011/660 (PDF ) Program Obfuscation with Leaky Hardware Nir Bitansky, Ran Canetti, Shafi Goldwasser, Shai Halevi, Yael Tauman Kalai, Guy N. Rothblum
2011/659 (PDF ) Formally Assessing Cryptographic Entropy Daniel R. L. Brown
2011/658 (PDF ) Anonymous attestation with user-controlled linkability D. Bernhard, G. Fuchsbauer, E. Ghadafi, N. P. Smart, B. Warinschi
2011/657 (PDF ) A Systematic Method to Evaluate and Compare the Performance of Physical Unclonable Functions Abhranil Maiti, Vikash Gunreddy, Patrick Schaumont
2011/656 (PDF ) Use Data-depend Function Build Message Expansion Function ZiJie Xu, Ke Xu
2011/655 (PDF ) Privacy-Preserving Stream Aggregation with Fault Tolerance T-H. Hubert Chan, Elaine Shi, Dawn Song
2011/654 (PDF ) Elliptic Curve Cryptography in JavaScript Laurie Haustenne, Quentin De Neyer, Olivier Pereira
2011/652 (PDF ) Security Enhancement of the Vortex Family of Hash Functions Shay Gueron, Michael Kounavis
2011/651 (PDF ) CHECKER: On-site checking in RFID-based supply chains Kaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva
2011/650 (PDF ) Fully Secure Spatial Encryption under Simple Assumptions with Constant-Size Ciphertexts Jie Chen, Hoon Wei Lim, San Ling, Huaxiong Wang
2011/649 (PDF ) On the Security of NMAC and Its Variants Fanbao Liu, Changxiang Shen, Tao Xie, Dengguo Feng
2011/648 (PDF ) Achieving Short Ciphertexts or Short Secret-Keys for Adaptively Secure General Inner-Product Encryption Tatsuaki Okamoto, Katsuyuki Takashima
2011/647 (PDF ) Breaking $H^2$-MAC Using Birthday Paradox Fanbao Liu, Tao Xie, Changxiang Shen
2011/646 (PDF ) The security impact of a new cryptographic library Daniel J. Bernstein, Tanja Lange, Peter Schwabe
2011/645 (PDF ) Fully Homomorphic Encryption Based on Approximate Matrix GCD Gu Chunsheng
2011/644 (PDF ) McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes Ewan Fleischmann, Christian Forler, Stefan Lucks, Jakob Wenzel
2011/643 (PDF ) Some Words About Cryptographic Key Recognition In Data Streams Alexey Chilikov, Evgeny Alekseev
2011/642 (PDF ) Constructing differentially 4-uniform permutations over $\mbf_{2^{2m}}$ from quadratic APN permutations over $\mbf_{2^{2m+1}}$ Yongqiang Li, Mingsheng Wang
2011/641 (PDF ) Collision for 75-step SHA-1: Intensive Parallelization with GPU E. A. Grechnikov, A. V. Adinetz
2011/640 (PDF ) Hummingbird: Privacy at the time of Twitter Emiliano De Cristofaro, Claudio Soriente, Gene Tsudik, Andrew Williams
2011/639 (PDF ) Towards a Probabilistic Complexity-theoretic Modeling of Biological Cyanide Poisoning as Service Attack in Self-organizing Networks Jiejun Kong, Dapeng Wu, Xiaoyan Hong, Mario Gerla
2011/638 (PDF ) Rubik's for cryptographers Christophe Petit, Jean-Jacques Quisquater
2011/637 (PDF ) Random Number Generation Based on Oscillatory Metastability in Ring Circuits Laszlo Hars
2011/635 (PDF ) Groestl Tweaks and their Effect on FPGA Results Marcin Rogawski, Kris Gaj
2011/634 (PDF ) Security of Multiple-Key Agreement Protocols and Propose an Enhanced Protocol Mohammad Sabzinejad Farash, Mahmoud Ahmadian Attari, Majid Bayat
2011/633 (PDF ) Practical realisation and elimination of an ECC-related software bug attack B. B. Brumley, M. Barbosa, D. Page, F. Vercauteren
2011/632 (PDF ) A Scalable Method for Constructing Galois NLFSRs with Period $2^n-1$ using Cross-Join Pairs Elena Dubrova
2011/631 (PDF ) Cheating Human Vision in Visual Secret Sharing Yu-Chi Chen, Gwoboa Horng, Du-Shiau Tsai
2011/630 (PDF ) Indifferentiability Security of the Fast Wide Pipe Hash: Breaking the Birthday Barrier Dustin Moody, Souradyuti Paul, Daniel Smith-Tone
2011/629 (PDF ) Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority Eli Ben-Sasson, Serge Fehr, Rafail Ostrovsky
2011/628 (PDF ) Maximum Leakage Resilient IBE and IPE Kaoru Kurosawa, Le Trieu Phong
2011/627 (PDF ) A note on semi-bent functions with multiple trace terms and hyperelliptic curves Sihem Mesnager
2011/626 (PDF ) Algebraic Complexity Reduction and Cryptanalysis of GOST Nicolas T. Courtois
2011/624 (PDF ) New attacks on Keccak-224 and Keccak-256 Itai Dinur, Orr Dunkelman, Adi Shamir
2011/623 (PDF ) Indifferentiability of the Hash Algorithm BLAKE Donghoon Chang, Mridul Nandi, Moti Yung
2011/622 (PDF ) Homomorphic encryption from codes Andrej Bogdanov, Chin Ho Lee
2011/621 (PDF ) Adaptive Security of Concurrent Non-Malleable Zero-Knowledge Zhenfu Cao, Zongyang Zhang, Yunlei Zhao
2011/620 (PDF ) Provable Security of BLAKE with Non-Ideal Compression Function Elena Andreeva, Atul Luykx, Bart Mennink
2011/619 (PDF ) Multidimensional Meet-in-the-Middle Attack and Its Applications to KATAN32/48/64 Bo Zhu, Guang Gong
2011/618 (PDF ) Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones Lishoy Francis, Gerhard Hancke, Keith Mayes, Konstantinos Markantonakis
2011/617 (PDF ) Charm: A framework for Rapidly Prototyping Cryptosystems Joseph A. Akinyele, Matthew D. Green, Avi D. Rubin
2011/616 (PDF ) Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT Jiazhe Chen, Meiqin Wang, Bart Preneel
2011/615 (PDF ) On the Joint Security of Encryption and Signature in EMV Jean Paul Degabriele, Anja Lehmann, Kenneth G. Paterson, Nigel P. Smart, Mario Strefler
2011/614 (PDF ) On Security of RASP Data Perturbation for Secure Half-Space Queries in the Cloud Keke Chen
2011/613 (PDF ) Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE Gilad Asharov, Abhishek Jain, Daniel Wichs
2011/612 (PDF ) IBAKE: Identity-Based Authenticated Key Exchange Protocol Vladimir Kolesnikov, Ganapathy S. Sundaram
2011/611 (PDF ) Adaptive and Concurrent Secure Computation from New Notions of Non-Malleability Dana Dachman-Soled, Tal Malkin, Mariana Raykova, Muthuramakrishnan Venkitasubramaniam
2011/610 (PDF ) An optimal Key Enumeration Algorithm and its Application to Side-Channel Attacks Nicolas Veyrat-Charvillon, Benoît Gérard, Mathieu Renauld, François-Xavier Standaert
2011/609 (PDF ) The PHOTON Family of Lightweight Hash Functions Jian Guo, Thomas Peyrin, Axel Poschmann
2011/608 (PDF ) Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication Patrick Longa, Francesco Sica
2011/607 (PDF ) Improving Additive and Multiplicative Homomorphic Encryption Schemes Based on Worst-Case Hardness Assumptions} Carlos Aguilar Melchor, Slim Bettaieb, Philippe Gaborit, Javier Herranz
2011/605 (PDF ) Efficient and Secure Delegation of Linear Algebra Payman Mohassel
2011/604 (PDF ) Genus 2 Hyperelliptic Curve Families with Explicit Jacobian Order Evaluation and Pairing-Friendly Constructions Aurore Guillevic, Damien Vergnaud
2011/602 (PDF ) Positive Results for Concurrently Secure Computation in the Plain Model Vipul Goyal
2011/601 (PDF ) A Multi-Receiver ID-Based Generalized Signcryption Scheme Caixue Zhou
2011/600 (PDF ) A New Class of Hyper-bent Boolean Functions with Multiple Trace Terms Chunming Tang, Yanfeng Qi, Maozhi Xu, Baocheng Wang, Yixian Yang
2011/598 (PDF ) New Subexponential Algorithms for Factoring in $SL(2,\fq)$ Jean-Charles Faugère, Ludovic Perret, Christophe Petit, Guénaël Renault
2011/597 (PDF ) How to Delegate and Verify in Public: Verifiable Computation from Attribute-based Encryption Bryan Parno, Mariana Raykova, Vinod Vaikuntanathan
2011/596 (PDF ) Parallel Homomorphic Encryption Seny Kamara, Mariana Raykova
2011/594 (PDF ) Receipt Freeness of Prêt à Voter Provably Secure Dalia Khader, Peter Y. A. Ryan
2011/593 (PDF ) CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model Yu Chen, Liqun Chen, Zongyang Zhang
2011/592 (PDF ) Generic Constructions for Verifiable Signcryption Laila El Aimani
2011/591 (PDF ) A Unified Framework for Small Secret Exponent Attack on RSA Noboru Kunihiro, Naoyuki Shinohara, Tetsuya Izu
2011/590 (PDF ) An Efficient Broadcast Attack against NTRU Jianwei Li, Yanbin Pan, Mingjie Liu, Guizhen Zhu
2011/589 (PDF ) Impact of Intel's New Instruction Sets on Software Implementation of $GF(2)[x]$ Multiplication Chen Su, Haining Fan
2011/588 (PDF ) Another Look at Symmetric Incoherent Optimal Eavesdropping against BB84 Arpita Maitra, Goutam Paul
2011/587 (PDF ) Signatures of Correct Computation Charalampos Papamanthou, Elaine Shi, Roberto Tamassia
2011/586 (PDF ) TweLEX: A Tweaked Version of the LEX Stream Cipher Mainack Mondal, Avik Chakraborti, Nilanjan Datta, Debdeep Mukhopadhyay
2011/585 (PDF ) Iris: A Scalable Cloud File System with Efficient Integrity Checks Emil Stefanov, Marten van Dijk, Alina Oprea, Ari Juels
2011/584 (PDF ) A Single-Key Attack on 6-Round KASUMI Teruo Saito
2011/583 (PDF ) Revocable Identity-Based Encryption from Lattices Jie Chen, Hoon Wei Lim, San Ling, Huaxiong Wang, Khoa Nguyen
2011/582 (PDF ) Randomness Extraction in finite fields $\mathbb{F}_{p^{n}}$ Abdoul Aziz Ciss
2011/581 (PDF ) Standard Security Does Not Imply Security Against Selective-Opening Mihir Bellare, Rafael Dowsley, Brent Waters, Scott Yilek
2011/580 (PDF ) On a new generalization of Huff curves Abdoul Aziz Ciss, Djiby Sow
2011/579 (PDF ) Clockwise Collision Analysis -- Overlooked Side-Channel Leakage Inside Your Measurements Yang Li, Daisuke Nakatsu, Qi Li, Kazuo Ohta, Kazuo Sakiyama
2011/578 (PDF ) ACCELERATING THE SCALAR MULTIPLICATION ON GENUS 2 HYPERELLIPTIC CURVE CRYPTOSYSTEMS Balasingham Balamohan
2011/577 (PDF ) An Efficient Protocol for the Commit-Prove-Fair-Open functionality Ou Ruan, Cai Fu, Guohua Cui
2011/576 (PDF ) Efficient Multicast Key Distribution Using HOWP-Based Dynamic Group Access Structures Jing Liu, Qiong Huang, Bo Yang, Yang Zhang
2011/575 (PDF ) Exclusive Key Based Group Rekeying Protocols Jing Liu, Changji Wang
2011/574 (PDF ) Towards Efficient Provable Data Possession in Cloud Storage Jia Xu, Ee-Chien Chang, Jianying Zhou
2011/573 (PDF ) A New Class of Multivariate Public Key Cryptosystems Constructed Based on Random Pseudo Cyclic Codes, K(XIII)SE(2)PKC, Realizing Coding Rate of Exactly 1.0 Masao Kasahara
2011/572 (PDF ) The ElGamal cryptosystem over circulant matrices Ayan Mahalanobis
2011/570 (PDF ) Degree of regularity for HFE- Jintai Ding, Thorsten Kleinjung
2011/569 (PDF ) Analysis of the Hamming Weight of the Extended wmbNAF Ming Li, Ali Miri, Daming Zhu
2011/568 (PDF ) Single Layer Optical-scan Voting with Fully Distributed Trust Aleksander Essex, Christian Henrich, Urs Hengartner
2011/567 (PDF ) On the sparse subset sum problem from Gentry-Halevi's implementation of fully homomorphic encryption Moon Sung Lee
2011/566 (PDF ) Fully Homomorphic Encryption with Polylog Overhead Craig Gentry, Shai Halevi, Nigel P. Smart
2011/565 (PDF ) Cryptographic Hash Functions: Recent Design Trends and Security Notions Saif Al-Kuwari, James H. Davenport, Russell J. Bradford
2011/564 (PDF ) Private-key Symbolic Encryption N. Ahmed, C. D. Jensen, E. Zenner
2011/563 (PDF ) On the Security of RFID Anti Cloning Security Protocol(ACSP) Masoumeh Safkhani, Nasour Bagheri, Majid Naderi
2011/562 (PDF ) A Group Testing Approach to Improved Corruption Localizing Hashing Annalisa De Bonis, Giovanni Di Crescenzo
2011/561 (PDF ) A Domain-Specific Language for Computing on Encrypted Data Alex Bain, John Mitchell, Rahul Sharma, Deian Stefan, Joe Zimmerman
2011/560 (PDF ) Randomized Secure Two-Party Computation for Modular Conversion, Zero Test, Comparison, MOD and Exponentiation Ching-Hua Yu, Bo-Yin Yang
2011/559 (PDF ) Instantiability of RSA-OAEP under Chosen-Plaintext Attack Eike Kiltz, Adam O'Neill, Adam Smith
2011/558 (PDF ) Improved Attacks on Full GOST Itai Dinur, Orr Dunkelman, Adi Shamir
2011/557 (PDF ) An Improved Trace Driven Instruction Cache Timing Attack on RSA Chen Cai-Sen, Wang Tao, Chen Xiao-Cen, Zhou Ping
2011/556 (PDF ) GF(2^n) redundant representation using matrix embedding Yongjia Wang, Xi Xiong, Haining Fan
2011/555 (PDF ) On the Role of Expander Graphs in Key Predistribution Schemes for Wireless Sensor Networks Michelle Kendall, Keith Martin
2011/554 (PDF ) On the security models for certificateless signature schemes achieving level 3 security Yu-Chi Chen, Gwoboa Horng
2011/553 (PDF ) Publicly Verifiable Proofs of Sequential Work Mohammad Mahmoody, Tal Moran, Salil Vadhan
2011/552 (PDF ) Recyclable PUFs: Logically Reconfigurable PUFs Stefan Katzenbeisser, Ünal Kocabas, Vincent van der Leest, Ahmad-Reza Sadeghi, Geert-Jan Schrijen, Heike Schröder, Christian Wachsmann
2011/551 (PDF ) Security Evaluation against Differential Cryptanalysis for Block Cipher Structures Shengbao Wu, Mingsheng Wang
2011/550 (PDF ) A New Distinguisher for CubeHash-8/b and CubeHash-15/b Compression Functions Javad Alizadeh, Abdolrasoul Mirghadri
2011/549 (PDF ) 1-Resilient Boolean Function with Optimal Algebraic Immunity Qingfang Jin, Zhuojun Liu, Baofeng Wu
2011/548 (PDF ) On the security of MQ_DRBG V. O. Drelikhov, G. B. Marshalko, A. V. Pokrovskiy
2011/547 (PDF ) The Single Cycle T-functions Zhaopeng Dai, Zhuojun Liu
2011/546 (PDF ) Hidden Vector Encryption Fully Secure Against Unrestricted Queries Angelo De Caro, Vincenzo Iovino, Giuseppe Persiano
2011/545 (PDF ) Public Key Cryptosystems Constructed Based on Random Pseudo Cyclic Codes, K(IX)SE(1)PKC, Realizing Coding Rate of Exactly 1.0 Masao Kasahara
2011/544 (PDF ) Designing Privacy-preserving Smart Meters with Low-cost Microcontrollers Andres Molina-Markham, George Danezis, Kevin Fu, Prashant Shenoy, David Irwin
2011/543 (PDF ) Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption Tatsuaki Okamoto, Katsuyuki Takashima
2011/542 (PDF ) Certificate-Based Signcryption: Security Model and Efficient Construction Yang Lu, Jiguo Li
2011/541 (PDF ) Minimalism in Cryptography: The Even-Mansour Scheme Revisited Orr Dunkelman, Nathan Keller, Adi Shamir
2011/540 (PDF ) Efficient Implementation of the $\eta_T$ Pairing on GPU Yosuke Katoh, Yun-Ju Huang, Chen-Mou Cheng, Tsuyoshi Takagi
2011/539 (PDF ) Sign Modules in Secure Arithmetic Circuits Ching-Hua Yu
2011/538 (PDF ) Leakage-Resilient Client-side Deduplication of Encrypted Data in Cloud Storage Jia Xu, Ee-Chien Chang, Jianying Zhou
2011/537 (PDF ) Lattice Signatures Without Trapdoors Vadim Lyubashevsky
2011/536 (PDF ) Revisiting Lower and Upper Bounds for Selective Decommitments Rafail Ostrovsky, Vanishree Rao, Alessandra Scafuro, Ivan Visconti
2011/535 (PDF ) Multiparty Computation from Somewhat Homomorphic Encryption I. Damgard, V. Pastro, N. P. Smart, S. Zakarias
2011/534 (PDF ) Formal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel Attacks Maxime Nassar, Sylvain Guilley, Jean-Luc Danger
2011/533 (PDF ) Two-Output Secure Computation with Malicious Adversaries abhi shelat, Chih-hao Shen
2011/532 (PDF ) Hash Functions Based on Three Permutations: A Generic Security Analysis Bart Mennink, Bart Preneel
2011/531 (PDF ) Static Fault Attacks on Hardware DES Registers Philippe Loubet-Moundi, David Vigilant, Francis Olivier
2011/530 (PDF ) Key-Evolution Schemes Resilient to Space-Bounded Leakage Stefan Dziembowski, Tomasz Kazana, Daniel Wichs
2011/529 (PDF ) Secure and Efficient Proof of Storage with Deduplication Qingji Zheng, Shouhuai Xu
2011/528 (PDF ) Efficient Delegation-Based Authentication Protocol with Strong Mobile Privacy Jian-Zhu Lu, Hong-Qing Ren, Jipeng Zhou
2011/526 (PDF ) Universally Composable Security Analysis of OAuth v2.0 Suresh Chari, Charanjit Jutla, Arnab Roy
2011/525 (PDF ) A Note on the Density of the Multiple Subset Sum Problems Yanbin Pan, Feng Zhang
2011/524 (PDF ) Security of Reduced-Round Camellia against Impossible Differential Attack Leibo Li, Jiazhe Chen, Xiaoyun Wang
2011/522 (PDF ) A Compact S-Box Design for SMS4 Block Cipher Imran Abbasi, Mehreen Afzal
2011/521 (PDF ) Pseudorandom Knapsacks and the Sample Complexity of LWE Search-to-Decision Reductions Daniele Micciancio, Petros Mol
2011/520 (PDF ) Houssem Maghrebi and Sylvain Guilley and Claude Carlet and Jean-Luc Danger Houssem maghebi, Sylvain Guilley, Claude Carlet, Jean-Luc Danger
2011/519 (PDF ) Leakage-Resilient Cryptography From the Inner-Product Extractor Stefan Dziembowski, Sebastian Faust
2011/518 (PDF ) Two 1-Round Protocols for Delegation of Computation Ran Canetti, Ben Riva, Guy N. Rothblum
2011/517 (PDF ) Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case Study Ralf Kuesters, Tomasz Truderung, Andreas Vogt
2011/516 (PDF ) Protecting AES with Shamir's Secret Sharing Scheme Louis Goubin, Ange Martinelli
2011/515 (PDF ) A general conjecture similar to T-D conjecture and its applications in constructing Boolean functions with optimal algebraic immunity Qingfang Jin, Zhuojun Liu, Baofeng Wu, Xiaoming Zhang
2011/514 (PDF ) Milder Definitions of Computational Approximability: The Case of Zero-Knowledge Protocols Mohammad Sadeq Dousti, Rasool Jalili
2011/513 (PDF ) Non-Malleable Zero Knowledge: Black-Box Constructions and Definitional Relationships Abhishek Jain, Omkant Pandey
2011/512 (PDF ) A Dichotomy for Local Small-Bias Generators Benny Applebaum, Andrej Bogdanov, Alon Rosen
2011/511 (PDF ) The Cryptographic Power of Random Selection Matthias Krause, Matthias Hamann
2011/510 (PDF ) On the Security of the Free-XOR Technique Seung Geol Choi, Jonathan Katz, Ranjit Kumaresan, Hong-Sheng Zhou
2011/509 (PDF ) Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies Emil Stefanov, Elaine Shi, Dawn Song
2011/508 (PDF ) Secure Two-Party Computation with Low Communication Ivan Damgård, Sebastian Faust, Carmit Hazay
2011/507 (PDF ) Relatively-Sound NIZKs and Password-Based Key-Exchange Charanjit Jutla, Arnab Roy
2011/506 (PDF ) Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies Luca De Feo, David Jao, Jérôme Plût
2011/505 (PDF ) A New Second Order Side Channel Attack Based on Linear Regression Julien Doget, Guillaume Dabosville, Emmanuel Prouff
2011/504 (PDF ) From Non-Adaptive to Adaptive Pseudorandom Functions Iftach Haitner, Itay Berman
2011/503 (PDF ) On the influence of the algebraic degree of $F^{−1}$ on the algebraic degree of $G \circ F$ Christina Boura, Anne Canteaut
2011/502 (PDF ) Wild McEliece Incognito Daniel J. Bernstein, Tanja Lange, Christiane Peters
2011/501 (PDF ) Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller Daniele Micciancio, Chris Peikert
2011/500 (PDF ) Biclique Cryptanalysis of the Block Cipher SQUARE Hamid Mala
2011/499 (PDF ) Duplexing the sponge: single-pass authenticated encryption and other applications Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche
2011/498 (PDF ) An Efficient Secure Anonymous Proxy Signature Scheme Jue-Sam Chou, Shih-Che Hung, Yalin Chen
2011/497 (PDF ) Can a Program Reverse-Engineer Itself? Antoine Amarilli, David Naccache, Pablo Rauzy, Emil Simion
2011/496 (PDF ) On the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction Avradip Mandal, Jacques Patarin, Yannick Seurin
2011/495 (PDF ) Vector Commitments and their Applications Dario Catalano, Dario Fiore
2011/494 (PDF ) Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting Carmit Hazay, Gert Læssøe Mikkelsen, Tal Rabin, Tomas Toft, Angelo Agatino Nicolosi
2011/493 (PDF ) From Point Obfuscation To 3-round Zero-Knowledge Nir Bitansky, Omer Paneth
2011/492 (PDF ) Rational distance-bounding protocols over noisy channels Long H. Nguyen
2011/490 (PDF ) Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting Allison Lewko
2011/489 (PDF ) Towards a Theory of Security Evaluation for GOST-like Ciphers against Differential and Linear Cryptanalysis A. N. Alekseychuk, L. V. Kovalchuk
2011/488 (PDF ) A Survey of Cryptography Based on Physically Unclonable Objects Kai-Yuen Cheong
2011/487 (PDF ) Noiseless Database Privacy Raghav Bhaskar, Abhishek Bhowmick, Vipul Goyal, Srivatsan Laxman, Abhradeep Thakurta
2011/486 (PDF ) On the Joint Security of Encryption and Signature, Revisited Kenneth G. Paterson, Jacob C. N. Schuldt, Martijn Stam, Susan Thomson
2011/485 (PDF ) Another Look at Automated Theorem-Proving. II Neal Koblitz
2011/484 (PDF ) XMSS - A Practical Forward Secure Signature Scheme based on Minimal Security Assumptions Johannes Buchmann, Erik Dahmen, Andreas Hülsing
2011/483 (PDF ) Adaption of Pollard's kangaroo algorithm to the FACTOR problem Mario Romsy
2011/482 (PDF ) Secure Computation with Sublinear Amortized Work Dov Gordon, Jonathan Katz, Vladimir Kolesnikov, Tal Malkin, Mariana Raykova, Yevgeniy Vahlis
2011/481 (PDF ) Close to Uniform Prime Number Generation With Fewer Random Bits Pierre-Alain Fouque, Mehdi Tibouchi
2011/480 (PDF ) Complete Tree Subset Difference Broadcast Encryption Scheme and its Analysis Sanjay Bhattacherjee, Palash Sarkar
2011/479 (PDF ) Identity-Based (Lossy) Trapdoor Functions and Applications Mihir Bellare, Eike Kiltz, Chris Peikert, Brent Waters
2011/478 (PDF ) An efficient certificateless authenticated key agreement scheme Debiao He, Sahadeo Padhye, Jianhua Chen
2011/477 (PDF ) Cryptanalysis of NTRU with two public keys Abderrahmane Nitaj
2011/476 (PDF ) Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model Benoit Libert, Kenneth G. Paterson, Elizabeth A. Quaglia
2011/475 (PDF ) Solving Circuit Optimisation Problems in Cryptography and Cryptanalysis Nicolas T. Courtois, Daniel Hulme, Theodosis Mourouzis
2011/474 (PDF ) Improved Generic Algorithms for Hard Knapsacks Anja Becker, Jean-Sébastien Coron, Antoine Joux
2011/473 (PDF ) Practically Efficient Verifiable Delegation of Polynomial and its Applications Jia XU
2011/472 (PDF ) Forward Secure Ring Signature without Random Oracles Joseph K. Liu, Tsz Hon Yuen, Jianying Zhou
2011/471 (PDF ) Improved Key Generation For Gentry's Fully Homomorphic Encryption Scheme P. Scholl, N. P. Smart
2011/470 (PDF ) Non-malleable public key encryption in BRSIM/UC István Vajda
2011/469 (PDF ) Cryptanalysis of INCrypt32 in HID's iCLASS Systems ChangKyun Kim, Eun-Gu Jung, Dong Hoon Lee, Chang-Ho Jung, Daewan Han
2011/468 (PDF ) Faster Scalar Multiplication on Ordinary Weierstrass Elliptic Curves over Fields of Characteristic Three Hongfeng Wu, Chang-An Zhao
2011/467 (PDF ) A !ew Efficient Asymmetric Cryptosystem for large data sets M. R. K. Ariffin, M. A. Asbullah, N. A. Abu
2011/466 (PDF ) Green Cryptanalysis: Meet-in-the-Middle Key-Recovery for the Full KASUMI Cipher Keting Jia, Christian Rechberger, Xiaoyun Wang
2011/465 (PDF ) Attractive Subfamilies of BLS Curves for Implementing High-Security Pairings Craig Costello, Kristin Lauter, Michael Naehrig
2011/464 (PDF ) Private and Oblivious Set and Multiset Operations Marina Blanton, Everaldo Aguiar
2011/463 (PDF ) Decentralized Dynamic Broadcast Encryption Duong Hieu Phan, David Pointcheval, Mario Strefler
2011/462 (PDF ) Secure Outsourced Computation of Iris Matching Marina Blanton, Mehrdad Aliasgari
2011/461 (PDF ) Speeding Up Elliptic Curve Discrete Logarithm Computations with Point Halving Fangguo Zhang, Ping Wang
2011/460 (PDF ) Computationally Sound Symbolic Security Reduction Analysis of Group Key Exchange Protocol using Bilinear Pairings Zijian Zhang, Liehuang Zhu, Lejian Liao
2011/459 (PDF ) Sufficient conditions for sound hashing using a truncated permutation Joan Daemen, Tony Dusenge, Gilles Van Assche
2011/458 (PDF ) Sieving for Shortest Vectors in Ideal Lattices Michael Schneider
2011/457 (PDF ) Resettable Statistical Zero Knowledge Sanjam Garg, Rafail Ostrovsky, Ivan Visconti, Akshay Wadia
2011/456 (PDF ) Delegation of Computation without Rejection Problem from Designated Verifier CS-Proofs Shafi Goldwasser, Huijia Lin, Aviad Rubinstein
2011/455 (PDF ) The Relation and Transformation between Hierarchical Inner Product Encryption and Spatial Encryption Jie Chen, Hoon Wei Lim, San Ling, Huaxiong Wang
2011/454 (PDF ) Threshold Fully Homomorphic Encryption and Secure Computation Steven Myers, Mona Sergi, abhi shelat
2011/453 (PDF ) Practical Complexity Differential Cryptanalysis and Fault Analysis of AES Michael Tunstall
2011/452 (PDF ) The Good lower bound of Second-order nonlinearity of a class of Boolean function Manish Garg, Sugata Gangopadhyay
2011/451 (PDF ) Cryptanalysis and improvement of a biometrics-based multi-server authentication with key agreement scheme Hakhyun Kim, Woongryul Jeon, Yunho Lee, Dongho Won
2011/449 (PDF ) Biclique Cryptanalysis of the Full AES Andrey Bogdanov, Dmitry Khovratovich, Christian Rechberger
2011/448 (PDF ) (Non-)Random Sequences from (Non-)Random Permutations - Analysis of RC4 stream cipher Sourav Sen Gupta, Subhamoy Maitra, Goutam Paul, Santanu Sarkar
2011/447 (PDF ) On Verifying Dynamic Multiple Data Copies over Cloud Servers Ayad F. Barsoum, M. Anwar Hasan
2011/444 (PDF ) Generalised Mersenne Numbers Revisited Robert Granger, Andrew Moss
2011/443 (PDF ) From Extractable Collision Resistance to Succinct Non-Interactive Arguments of Knowledge, and Back Again Nir Bitansky, Ran Canetti, Alessandro Chiesa, Eran Tromer
2011/442 (PDF ) Another Look at Tightness Sanjit Chatterjee, Alfred Menezes, Palash Sarkar
2011/441 (PDF ) Fully Homomorphic Encryption over the Integers with Shorter Public Keys Jean-Sebastien Coron, Avradip Mandal, David Naccache, Mehdi Tibouchi
2011/440 (PDF ) Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers Jean-Sebastien Coron, David Naccache, Mehdi Tibouchi
2011/439 (PDF ) Optimal Data Authentication from Directed Transitive Signatures Philippe Camacho
2011/438 (PDF ) Short Transitive Signatures for Directed Trees Philippe Camacho, Alejandro Hevia
2011/437 (PDF ) Approximate common divisors via lattices Henry Cohn, Nadia Heninger
2011/436 (PDF ) Faster Algorithms for Approximate Common Divisors: Breaking Fully-Homomorphic-Encryption Challenges over the Integers Yuanmi Chen, Phong Q. Nguyen
2011/435 (PDF ) The IPS Compiler: Optimizations, Variants and Concrete Efficiency Yehuda Lindell, Benny Pinkas, Eli Oxman
2011/434 (PDF ) An Efficient Protocol for Oblivious DFA Evaluation and Applications Payman Mohassel, Salman Niksefat, Saeed Sadeghian, Babak Sadeghiyan
2011/433 (PDF ) Collusion-Preserving Computation Joel Alwen, Jonathan Katz, Ueli Maurer, Vassilis Zikas
2011/432 (PDF ) Ciphers that Securely Encipher their own Keys Mihir Bellare, David Cash, Sriram Keelveedhi
2011/431 (PDF ) Roots of Square: Cryptanalysis of Double-Layer Square and Square+ Enrico Thomae, Christopher Wolf
2011/430 (PDF ) Analogues of Velu's Formulas for Isogenies on Alternate Models of Elliptic Curves Dustin Moody, Daniel Shumow
2011/429 (PDF ) Round-efficient Oblivious Database Manipulation Sven Laur, Jan Willemson, Bingsheng Zhang
2011/428 (PDF ) AES Flow Interception: Key Snooping Method on Virtual Machine - Exception Handling Attack for AES-NI - Tatsuya TAKEHISA, Hiroki NOGAWA, Masakatu MORII
2011/427 (PDF ) A new attack on the KMOVcryptosystem Abderrahmane Nitaj
2011/426 (PDF ) Cryptanalysis of improved Yeh \textit{et al. }'s authentication Protocol: An EPC Class-1 Generation-2 standard compliant protocol Masoumeh Safkhani, Nasour Bagheri, Somitra Kumar Sanadhya, Majid Naderi
2011/425 (PDF ) Thwarting Higher-Order Side Channel Analysis with Additive and Multiplicative Maskings Laurie Genelle, Emmanuel Prouff, Michaël Quisquater
2011/424 (PDF ) Cryptanalysis of AZUMI: an EPC Class-1 Generation-2 Standard Compliant RFID Authentication Protocol Masoumeh Safkhani, Nasour Bagheri, Majid Naderi
2011/423 (PDF ) Linear Cryptanalysis of PRINTcipher --- Trails and Samples Everywhere Martin Ågren, Thomas Johansson
2011/422 (PDF ) Improved Analysis of ECHO-256 Jérémy Jean, María Naya-Plasencia, Martin Schläffer
2011/421 (PDF ) Superposition Attacks on Cryptographic Protocols Ivan Damgård, Jakob Funder, Jesper Buus Nielsen, Louis Salvail
2011/420 (PDF ) Unaligned Rebound Attack - Application to Keccak Alexandre Duc, Jian Guo, Thomas Peyrin, Lei Wei
2011/418 (PDF ) An efficient RFID mutual authentication scheme based on ECC Jue-Sam Chou, Yalin Chen, Cheng-Lun Wu, Chi-Fong Lin
2011/417 (PDF ) New Data-Efficient Attacks on Reduced-Round IDEA Eli Biham, Orr Dunkelman, Nathan Keller, Adi Shamir
2011/416 (PDF ) Efficient Parallelization of Lanczos Type Algorithms Ilya Popovyan
2011/415 (PDF ) On the Access Structures of Hyperelliptic Secret Sharing Lei Li, Siman Yang
2011/414 (PDF ) Fuzzy Identity Based Encryption from Lattices Shweta Agrawal, Xavier Boyen, Vinod Vaikuntanathan, Panagiotis Voulgaris, Hoeteck Wee
2011/413 (PDF ) Higher-Order Glitches Free Implementation of the AES using Secure Multi-Party Computation Protocols - Extended Version Thomas Roche, Emmanuel Prouff
2011/412 (PDF ) Automatic Insertion of DPA Countermeasures Andrew Moss, Elisabeth Oswald, Dan Page, Michael Tunstall
2011/411 (PDF ) Comments on a password authentication and update scheme based on elliptic curve cryptography Debiao He
2011/410 (PDF ) Functional Encryption for Inner Product Predicates from Learning with Errors Shweta Agrawal, David Mandell Freeman, Vinod Vaikuntanathan
2011/408 (PDF ) Resettable Cryptography in Constant Rounds -- the Case of Zero Knowledge Yi Deng, Dengguo Feng, Vipul Goyal, Dongdai Lin, Amit Sahai, Moti Yung
2011/407 (PDF ) Oblivious RAM with O((log N)^3) Worst-Case Cost Elaine Shi, Hubert Chan, Emil Stefanov, Mingfei Li
2011/406 (PDF ) Composition Theorems Without Pre-Established Session Identifiers Ralf Kuesters, Max Tuengerthal
2011/405 (PDF ) Can Homomorphic Encryption be Practical? Kristin Lauter, Michael Naehrig, Vinod Vaikuntanathan
2011/404 (PDF ) A constant-round resettably-sound resettable zero-knowledge argument in the BPK model Seiko Arita
2011/403 (PDF ) A Fair Evaluation Framework for Comparing Side-Channel Distinguishers Carolyn Whitnall, Elisabeth Oswald
2011/402 (PDF ) Formalizing Group Blind Signatures and Practical Constructions without Random Oracles Essam Ghadafi
2011/401 (PDF ) Pseudorandom Functions and Lattices Abhishek Banerjee, Chris Peikert, Alon Rosen
2011/400 (PDF ) On a generalized combinatorial conjecture involving addition $\mod 2^k - 1$ Gérard Cohen, Jean-Pierre Flori
2011/399 (PDF ) Cryptanalysis of HFE, Multi-HFE and Variants for Odd and Even Characteristic Luk Bettale, Jean-Charles Faugère, Ludovic Perret
2011/398 (PDF ) Hardness of Learning Problems over Burnside Groups of Exponent 3 Nelly Fazio, Kevin Iga, Antonio Nicolosi, Ludovic Perret, William E. Skeith III
2011/397 (PDF ) The n-Diffie-Hellman Problem and its Applications Liqun Chen, Yu Chen
2011/396 (PDF ) Fair Computation with Rational Players Amos Beimel, Adam Groce, Jonathan Katz, Ilan Orlov
2011/395 (PDF ) Improved Anonymity for Key-Trees Michael Beye, Thijs Veugen
2011/394 (PDF ) A More Efficient Computationally Sound Non-Interactive Zero-Knowledge Shuffle Argument Helger Lipmaa, Bingsheng Zhang
2011/392 (PDF ) An Efficient Rational Secret Sharing Scheme Based on the Chinese Remainder Theorem (Revised Version) Yun Zhang, Christophe Tartary, Huaxiong Wang
2011/391 (PDF ) On the Portability of Side-Channel Attacks - An Analysis of the Xilinx Virtex 4, Virtex 5, and Spartan 6 Bitstream Encryption Mechanism Amir Moradi, Markus Kasper, Christof Paar
2011/390 (PDF ) On the Vulnerability of FPGA Bitstream Encryption against Power Analysis Attacks - Extracting Keys from Xilinx Virtex-II FPGAs Amir Moradi, Alessandro Barenghi, Timo Kasper, Christof Paar
2011/389 (PDF ) Spatial Encryption Mike Hamburg
2011/388 (PDF ) Modulus Fault Attacks Against RSA-CRT Signatures Eric Brier, David Naccache, Phong Q. Nguyen, Mehdi Tibouchi
2011/387 (PDF ) Analysis of the Parallel Distinguished Point Tradeoff Jin Hong, Ga Won Lee, Daegun Ma
2011/386 (PDF ) How to share secrets simultaneously Laszlo Csirmaz
2011/385 (PDF ) Efficient Implementation of Grand Cru with TI C6x+ Processor Azhar Ali Khan, Ghulam Murtaza
2011/384 (PDF ) Distributed Oblivious RAM for Secure Two-Party Computation Steve Lu, Rafail Ostrovsky
2011/383 (PDF ) A representation of the $p$-sylow subgroup of $\perm(\F_p^n)$ and a cryptographic application Stefan Maubach
2011/382 (PDF ) Generic Fully Simulatable Adaptive Oblivious Transfer Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong
2011/381 (PDF ) A Novel RFID Authentication Protocol based on Elliptic Curve Cryptosystem Yalin Chen, Jue-Sam Chou, Chi-Fong Lin, Cheng-Lun Wu
2011/380 (PDF ) An Exploration of the Kolmogorov-Smirnov Test as Competitor to Mutual Information Analysis Carolyn Whitnall, Elisabeth Oswald, Luke Mather
2011/378 (PDF ) A generalization of the Lucas addition chains Amadou TALL
2011/377 (PDF ) Improved Generalized Birthday Attack Paul Kirchner
2011/376 (PDF ) Backward Unlinkability for a VLR Group Signature Scheme with Efficient Revocation Check Julien Bringer, Alain Patey
2011/375 (PDF ) Complexity of universal access structures Laszlo Csirmaz
2011/374 (PDF ) Restoring the Differential Resistance of MD6 Ethan Heilman
2011/373 (PDF ) An efficient characterization of a family of hyperbent functions with multiple trace terms Jean-Pierre Flori, Sihem Mesnager
2011/372 (PDF ) Identity based signcryption schemes without random oracles Prashant Kushwah, Sunder Lal
2011/371 (PDF ) Monoidic Codes in Cryptography Paulo S. L. M. Barreto, Richard Lindner, Rafael Misoczki
2011/370 (PDF ) Socio-Rational Secret Sharing as a New Direction in Rational Cryptography Mehrdad Nojoumian, Douglas R. Stinson
2011/369 (PDF ) Storing Secrets on Continually Leaky Devices Yevgeniy Dodis, Allison Lewko, Brent Waters, Daniel Wichs
2011/368 (PDF ) High-speed high-security signatures Daniel J. Bernstein, Niels Duif, Tanja Lange, Peter Schwabe, Bo-Yin Yang
2011/367 (PDF ) Decoding One Out of Many Nicolas Sendrier
2011/366 (PDF ) Highly Nonlinear Boolean Functions with Optimal Algebraic Immunity and Good Behavior Against Fast Algebraic Attacks Deng Tang, Claude Carlet, Xiaohu Tang
2011/365 (PDF ) Security flaws in a biometrics-based multi-server authentication with key agreement scheme Debiao He
2011/364 (PDF ) The Value $4$ of Binary Kloosterman Sums Jean-Pierre Flori, Sihem Mesnager, Gérard Cohen
2011/362 (PDF ) Practically Efficient Proof of Retrievability in Cloud Storage Jia XU, Ee-Chien CHANG
2011/361 (PDF ) The Exact Security of a Stateful IBE and New Compact Stateful PKE Schemes S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan
2011/360 (PDF ) Certificateless Aggregate Signcryption Schemes Ziba Eslami, Nasrollah Pakniat
2011/359 (PDF ) High-Entropy Visual Identification for Touch Screen Devices Nathaniel Wesley Filardo, Giuseppe Ateniese
2011/358 (PDF ) Constructing a Ternary FCSR with a Given Connection Integer Lin Zhiqiang, Pei Dingyi
2011/357 (PDF ) Generalized Learning Problems and Applications to Non-Commutative Cryptography Gilbert Baumslag, Nelly Fazio, Antonio R. Nicolosi, Vladimir Shpilrain, William E. Skeith III
2011/356 (PDF ) An Efficient Attack on All Concrete KKS Proposals Ayoub Otmani, Jean-Pierre Tillich
2011/355 (PDF ) On the (Non-)Equivalence of UC Security Notions Oana Ciobotaru
2011/354 (PDF ) A coprocessor for secure and high speed modular arithmetic Nicolas Guillermin
2011/353 (PDF ) Hidden Pair of Bijection Signature Scheme Masahito Gotaishi, Shigeo Tsujii
2011/352 (PDF ) Bi-Deniable Public-Key Encryption Adam O'Neill, Chris Peikert, Brent Waters
2011/350 (PDF ) $HB^N$: An HB-like protocol secure against man-in-the-middle attacks Carl Bosley, Kristiyan Haralambiev, Antonio Nicolosi
2011/349 (PDF ) Efficient Methods for Exploiting Faults Induced at AES Middle Rounds Chong Hee Kim
2011/348 (PDF ) Extractors Against Side-Channel Attacks: Weak or Strong? Marcel Medwed, Francois-Xavier Standaert
2011/346 (PDF ) Strongly Secure One Round Authenticated Key Exchange Protocol with Perfect Forward Security Hai Huang
2011/345 (PDF ) LBlock: A Lightweight Block Cipher * Wenling Wu, Lei Zhang
2011/344 (PDF ) Efficient Fully Homomorphic Encryption from (Standard) LWE Zvika Brakerski, Vinod Vaikuntanathan
2011/343 (PDF ) Another Look at Security Definitions Neal Koblitz, Alfred Menezes
2011/342 (PDF ) A Domain Transformation for Structure-Preserving Signatures on Group Elements Melissa Chase, Markulf Kohlweiss
2011/340 (PDF ) Encrypting More Information in Visual Cryptography Scheme Feng Liu, Peng Li, ChuanKun Wu
2011/339 (PDF ) Careful with Composition: Limitations of Indifferentiability and Universal Composability Thomas Ristenpart, Hovav Shacham, Thomas Shrimpton
2011/338 (PDF ) Fast and Regular Algorithms for Scalar Multiplication over Elliptic Curves Matthieu Rivain
2011/337 (PDF ) Functional Re-encryption and Collusion-Resistant Obfuscation Nishanth Chandran, Melissa Chase, Vinod Vaikuntanathan
2011/335 (PDF ) New look at impossibility result on Dolev-Yao models with hashes István Vajda
2011/334 (PDF ) On the Efficient Implementation of Pairing-Based Protocols Michael Scott
2011/333 (PDF ) Cryptanalysis of a key agreement protocol based on chaotic Hash Debiao He
2011/332 (PDF ) A depth-16 circuit for the AES S-box Joan Boyar, Rene Peralta
2011/331 (PDF ) Cryptanalysis of Cho \textit{et al.}'s Protocol, A Hash-Based Mutual Authentication Protocol for RFID Systems Masoumeh Safkhani, Pedro Peris-Lopez, Julio Cesar Hernandez-Castro, Nasour Bagheri, Majid Naderi
2011/330 (PDF ) Simple and Asymptotically Optimal $t$-Cheater Identifiable Secret Sharing Scheme Ashish Choudhury
2011/329 (PDF ) Hardness of Computing Individual Bits for One-way Functions on Elliptic Curves Alexandre Duc, Dimitar Jetchev
2011/328 (PDF ) Cryptanalysis of the Smart-Vercauteren and Gentry-Halevi’s Fully Homomorphic Encryption Gu Chunsheng
2011/327 (PDF ) On the (In)security of Hash-based Oblivious RAM and a New Balancing Scheme Eyal Kushilevitz, Steve Lu, Rafail Ostrovsky
2011/326 (PDF ) SGCM: The Sophie Germain Counter Mode Markku-Juhani O. Saarinen
2011/325 (PDF ) New Receipt-Free E-Voting Scheme and Self-Proving Mix Net as New Paradigm Aram Jivanyan, Gurgen Khachatryan
2011/324 (PDF ) On the Efficiency of Bit Commitment Reductions Samuel Ranellucci, Alain Tapp, Severin Winkler, Jürg Wullschleger
2011/323 (PDF ) A New Related-Key Boomerang Distinguishing Attack of Reduced-Round Threefish-256 Shusheng Liu, Libin Wang, Zheng Gong
2011/322 (PDF ) A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework Carolyn Whitnall, Elisabeth Oswald
2011/321 (PDF ) A Formal Approach to Distance-Bounding RFID Protocols Ulrich Duerholz, Marc Fischlin, Michael Kasper, Cristina Onete
2011/320 (PDF ) Minimal Connectivity for Unconditionally Secure Message Transmission in Synchronous Directed Networks Manan Nayak, Shashank Agrawal, Kannan Srinathan
2011/319 (PDF ) Structure Preserving CCA Secure Encryption and Its Application to Oblivious Third Parties Jan Camenisch, Kristiyan Haralambiev, Markulf Kohlweiss, Jorn Lapon, Vincent Naessens
2011/318 (PDF ) Scalar Multiplication on Koblitz Curves using $\tau^2-$NAF Sujoy Sinha Roy, Chester Rebeiro, Debdeep Mukhopadhyay, Junko Takahashi, Toshinori Fukunaga
2011/317 (PDF ) Two Simple Code-Verification Voting Protocols Helger Lipmaa
2011/316 (PDF ) Security of Blind Signatures Revisited Dominique Schröder, Dominique Unruh
2011/315 (PDF ) Implementing 4-Dimensional GLV Method on GLS Elliptic Curves with j-Invariant 0 Zhi Hu, Patrick Longa, Maozhi Xu
2011/314 (PDF ) Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience Sebastian Faust, Krzysztof Pietrzak, Daniele Venturi
2011/313 (PDF ) Error-free Multi-valued Broadcast and Byzantine Agreement with Optimal Communication Complexity Arpita Patra
2011/312 (PDF ) Differential Cryptanalysis of GOST Nicolas T. Courtois, Michal Misztal
2011/311 (PDF ) Targeted Malleability: Homomorphic Encryption for Restricted Computations Dan Boneh, Gil Segev, Brent Waters
2011/310 (PDF ) Universally Composable Synchronous Computation Jonathan Katz, Ueli Maurer, Bjoern Tackmann, Vassilis Zikas
2011/309 (PDF ) On Constructing Homomorphic Encryption Schemes from Coding Theory Frederik Armknecht, Daniel Augot, Ludovic Perret, Ahmad-Reza Sadeghi
2011/308 (PDF ) Provably Secure and Practical Onion Routing Michael Backes, Ian Goldberg, Aniket Kate, Esfandiar Mohammadi
2011/307 (PDF ) Ways to restrict the differential path ZiJie Xu, Ke Xu
2011/306 (PDF ) Group Law Computations on Jacobians of Hyperelliptic Curves Craig Costello, Kristin Lauter
2011/305 (PDF ) A new attack on Jakobsson Hybrid Mix-Net Seyyed Amir Mortazavi
2011/304 (PDF ) Auditing the Auditor: Secure Delegation of Auditing Operation over Cloud Storage Jia XU
2011/303 (PDF ) GNUC: A New Universal Composability Framework Dennis Hofheinz, Victor Shoup
2011/302 (PDF ) Univariate Side Channel Attacks and Leakage Modeling Julien Doget, Emmanuel Prouff, Matthieu Rivain, François-Xavier Standaert
2011/301 (PDF ) On the Amortized Complexity of Zero Knowledge Protocols for Multiplicative Relations Ronald Cramer, Ivan Damgard, Valerio Pastro
2011/300 (PDF ) One-round Strongly Secure Key Exchange with Perfect Forward Secrecy and Deniability Cas Cremers, Michele Feltz
2011/299 (PDF ) Modes of Operations for Encryption and Authentication Using Stream Ciphers Supporting an Initialisation Vector Palash Sarkar
2011/298 (PDF ) Local limit theorem for large deviations and statistical box-tests Igor Semaev
2011/297 (PDF ) NEW STATISTICAL BOX-TEST AND ITS POWER Igor Semaev, Mehdi M. Hassanzadeh
2011/296 (PDF ) Short Signatures From Weaker Assumptions Dennis Hofheinz, Tibor Jager, Eike Kiltz
2011/295 (PDF ) Counting Points on Genus 2 Curves with Real Multiplication P. Gaudry, D. Kohel, B. Smith
2011/294 (PDF ) Small Public Keys and Fast Verification for Multivariate Quadratic Public Key Systems Albrecht Petzoldt, Enrico Thomae, Stanislav Bulygin, Christopher Wolf
2011/292 (PDF ) On Nonlinear Polynomial Selection and Geometric Progression (mod N) for Number Field Sieve Namhun Koo, Gooc Hwa Jo, Soonhak Kwon
2011/291 (PDF ) Leakage-Resilient Coin Tossing Elette Boyle, Shafi Goldwasser, Yael Tauman Kalai
2011/290 (PDF ) Some Results Concerning Generalized Bent Functions Pantelimon Stanica, Sugata Gangopadhyay, Brajesh Kumar Singh
2011/289 (PDF ) Polly Cracker, Revisited Martin R. Albrecht, Jean-Charles Faugère, Pooya Farshim, Gottfried Herold, Ludovic Perret
2011/288 (PDF ) On the Communication Complexity of Reliable and Secure Message Transmission in Asynchronous Networks Ashish Choudhury, Arpita Patra
2011/287 (PDF ) Algebraic cryptanalysis of the round-reduced and side channel analysis of the full PRINTCipher-48 Stanislav Bulygin
2011/286 (PDF ) Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family Dmitry Khovratovich, Christian Rechberger, Alexandra Savelieva
2011/285 (PDF ) Exploiting Linear Hull in Matsui’s Algorithm 1 (extended version) Andrea Röck, Kaisa Nyberg
2011/283 (PDF ) The Fault Attack ECDLP Revisited Mingqiang Wang, Xiaoyun Wang, Tao Zhan
2011/282 (PDF ) An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware Itai Dinur, Tim Güneysu, Christof Paar, Adi Shamir, Ralf Zimmermann
2011/281 (PDF ) Computational Verifiable Secret Sharing Revisited Michael Backes, Aniket Kate, Arpita Patra
2011/280 (PDF ) DDH-like Assumptions Based on Extension Rings Ronald Cramer, Ivan Damgaard, Eike Kiltz, Sarah Zakarias, Angela Zottarel
2011/279 (PDF ) Fully Homomorphic Encryption without Squashing Using Depth-3 Arithmetic Circuits Craig Gentry, Shai Halevi
2011/278 (PDF ) Comparing Different Definitions of Secure Session Can Zhang
2011/277 (PDF ) Fully Homomorphic Encryption without Bootstrapping Zvika Brakerski, Craig Gentry, Vinod Vaikuntanathan
2011/276 (PDF ) Analysis of the SSH Key Exchange Protocol Stephen C. Williams
2011/275 (PDF ) Inverting the Square systems is exponential Jintai Ding
2011/273 (PDF ) Memory Delegation Kai-Min Chung, Yael Tauman Kalai, Feng-Hao Liu, Ran Raz
2011/272 (PDF ) Outsourcing Multi-Party Computation Seny Kamara, Payman Mohassel, Mariana Raykova
2011/271 (PDF ) Practical Key-recovery For All Possible Parameters of SFLASH Charles Bouillaguet, Pierre-Alain Fouque, Gilles Macario-Rat
2011/270 (PDF ) Programmable Hash Functions and Their Applications Dennis Hofheinz, Eike Kiltz
2011/269 (PDF ) Authenticated and Misuse-Resistant Encryption of Key-Dependent Data Mihir Bellare, Sriram Keelveedhi
2011/268 (PDF ) Birthday Forgery Attack on 128-EIA3 Version 1.5 Raja Zeshan Haider
2011/267 (PDF ) Mutual Private Set Intersection with Linear Complexity Myungsun Kim, Hyung Tae Lee, Jung Hee Cheon
2011/266 (PDF ) Identity-Based Decryption Daniel R. L. Brown
2011/265 (PDF ) Efficient 2-Round General Perfectly Secure Message Transmission: A Minor Correction to Yang and Desmedt's Protocol Qiushi Yang, Yvo Desmedt
2011/264 (PDF ) Round Optimal Blind Signatures Dominique Schröder, Dominique Unruh
2011/263 (PDF ) The Computational Square-Root Exponent Problem- Revisited Fangguo Zhang
2011/262 (PDF ) Cryptanalysis of the Light-Weight Cipher A2U2 - Reduced draft version Mohamed Ahmed Abdelraheem, Julia Borghoff, Erik Zenner
2011/261 (PDF ) OBSERVATION: An explicit form for a class of second preimages for any message M for the SHA-3 candidate Keccak Danilo Gligoroski, Rune Steinsmo Ødeård, Rune Erlend Jensen
2011/260 (PDF ) Security \& Indistinguishability in the Presence of Traffic Analysis Cristina Onete, Daniele Venturi
2011/259 (PDF ) Comments on a sensor network key redistribution technique of Cichon, Golebiewski and Kutylowski Douglas R. Stinson
2011/258 (PDF ) A High Speed Pairing Coprocessor Using RNS and Lazy Reduction Gavin Xiaoxu Yao, Junfeng Fan, Ray C. C. Cheung, Ingrid Verbauwhede
2011/257 (PDF ) Secure Multi-Party Computation of Boolean Circuits with Applications to Privacy in On-Line Marketplaces Seung Geol Choi, Kyung-Wook Hwang, Jonathan Katz, Tal Malkin, Dan Rubenstein
2011/255 (PDF ) Hiding the Policy in Cryptographic Access Control Sascha Müller, Stefan Katzenbeisser
2011/254 (PDF ) Using the Cloud to Determine Key Strengths T. Kleinjung, A. K. Lenstra, D. Page, N. P. Smart
2011/253 (PDF ) Attack Cryptosystems Based on HCDLP Mingqiang Wang, Xiaoyun Wang, Tao Zhan
2011/252 (PDF ) Cryptography Secure Against Related-Key Attacks and Tampering Mihir Bellare, David Cash, Rachel Miller
2011/251 (PDF ) Concurrently Secure Computation in Constant Rounds Sanjam Garg, Vipul Goyal, Abhishek Jain, Amit Sahai
2011/250 (PDF ) A Parallel Repetition Theorem for Leakage Resilience Zvika Brakerski, Yael Tauman Kalai
2011/248 (PDF ) Fast Password Recovery Attack: Application to APOP Fanbao Liu, Yi Liu, Tao Xie, Yumeng Feng
2011/247 (PDF ) An Ultra-Efficient Key Recovery Attack on the Lightweight Stream Cipher A2U2 Qi Chai, Xinxin Fan, Guang Gong
2011/246 (PDF ) A Framework for Secure Single Sign-On Bernardo Machado David, Anderson C. A. Nascimento, Rafael Tonicelli
2011/245 (PDF ) On the Number of Carries Occuring in an Addition $\mod 2^k-1$ Jean-Pierre Flori, Hugues Randriam
2011/244 (PDF ) PRISM -- Privacy-Preserving Search in MapReduce Erik-Oliver Blass, Roberto Di Pietro, Refik Molva, Melek Onen
2011/243 (PDF ) Affine Pairings on ARM Tolga Acar, Kristin Lauter, Michael Naehrig, Daniel Shumow
2011/242 (PDF ) Cryptanalysis of KeeLoq code-hopping using a Single FPGA Idan Sheetrit, Avishai Wool
2011/241 (PDF ) A Novel Adaptive Proactive Secret Sharing without a Trusted Party Xiuqun Wang
2011/240 (PDF ) Universal Composability from Essentially Any Trusted Setup Mike Rosulek
2011/239 (PDF ) Efficient Software Implementations of Modular Exponentiation Shay Gueron
2011/238 (PDF ) Attacks On a Double Length Blockcipher-based Hash Proposal Yiyuan Luo, Xuejia Lai
2011/237 (PDF ) The block cipher NSABC (public domain) Alice Nguyenova-Stepanikova, Tran Ngoc Duong
2011/236 (PDF ) Using Templates to Distinguish Multiplications from Squaring Operations Neil Hanley, Michael Tunstall, William P. Marnane
2011/235 (PDF ) Computer-Aided Decision-Making with Trust Relations and Trust Domains (Cryptographic Applications) Simon Kramer, Rajeev Goré, Eiji Okamoto
2011/234 (PDF ) Comments on a secure dynamic ID-based remote user authentication scheme for multi-server environment using smart cards Debiao He
2011/233 (PDF ) Correlated-Input Secure Hash Functions Vipul Goyal, Adam O'Neill, Vanishree Rao
2011/232 (PDF ) Remote Timing Attacks are Still Practical Billy Bob Brumley, Nicola Tuveri
2011/231 (PDF ) History-Free Sequential Aggregate Signatures Marc Fischlin, Anja Lehmann, Dominique Schröder
2011/230 (PDF ) All-But-Many Lossy Trapdoor Functions Dennis Hofheinz
2011/229 (PDF ) Routing Protocol Based Shared and Session Key Exchange Protocol for Wireless Mobile Ad-hoc Network Md. Golam Kaosar
2011/228 (PDF ) A Framework for Practical Universally Composable Zero-Knowledge Protocols Jan Camenisch, Stephan Krenn, Victor Shoup
2011/227 (PDF ) Robust parent-identifying codes and combinatorial arrays Alexander Barg, Grigory Kabatiansky
2011/226 (PDF ) Substitution-permutation networks, pseudorandom functions, and Natural Proofs Eric Miles, Emanuele Viola
2011/225 (PDF ) A Simple and Efficient New Group Key Management Approach Based on Linear Geometry Shaohua Tang, Jintai Ding, Yujun Liang
2011/224 (PDF ) Cryptanalysis and Improvement of an Efficient CCA Secure PKE Scheme Xu An Wang, Liqiang Wu, Xiaoyuan Yang, Huaqun Wang
2011/223 (PDF ) A Perfectly Binding Commitment Scheme Against Quantum Attacks Zeng Bing, Chen Liang, Tang Xueming
2011/222 (PDF ) Sequential Aggregate Signatures with Lazy Verification from Trapdoor Permutations Kyle Brogle, Sharon Goldberg, Leonid Reyzin
2011/221 (PDF ) Protecting Drive Encryption Systems Against Memory Attacks Leo Dorrendorf
2011/220 (PDF ) Framework for Security Proofs for On-demand Routing Protocols in Multi-Hop Wireless Networks István Vajda
2011/219 (PDF ) On the Security of TLS-DHE in the Standard Model Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk
2011/218 (PDF ) Cryptographic Analysis of All 4 x 4 - Bit S-Boxes Markku-Juhani O. Saarinen
2011/217 (PDF ) Identity Based Deterministic Signature Scheme Without Forking-Lemma S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
2011/216 (PDF ) Provably Secure Group Key Management Approach Based upon Hyper-sphere Shaohua Tang, Lingling Xu, Niu Liu, Jintai Ding, Zhiming Yang
2011/215 (PDF ) Delegatable Homomorphic Encryption with Applications to Secure Outsourcing of Computation M. Barbosa, P. Farshim
2011/214 (PDF ) On ``identities'', ``names'', ``NAMES'', ``ROLES'' and Security: A Manifesto Charles Rackoff
2011/213 (PDF ) On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model M. R. Albrecht, P. Farshim, K. G. Paterson, G. J. Watson
2011/212 (PDF ) Maiorana-McFarland Functions with High Second-Order Nonlinearity Nicholas Kolokotronis, Konstantinos Limniotis
2011/211 (PDF ) Security Evaluation of GOST 28147-89 In View Of International Standardisation Nicolas T. Courtois
2011/210 (PDF ) The preimage security of double-block-length compression functions Jooyoung Lee, Martijn Stam, John Steinberger
2011/209 (PDF ) Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting Zvika Brakerski, Gil Segev
2011/208 (PDF ) Direct Constructions of Bidirectional Proxy Re-Encryption with Alleviated Trust in Proxy Jian Weng, Yunlei Zhao
2011/207 (PDF ) Proofs of Ownership in Remote Storage Systems Shai Halevi, Danny Harnik, Benny Pinkas, Alexandra Shulman-Peleg
2011/206 (PDF ) Isomorphism classes of Edwards curves over finite fields R. Farashahi, D. Moody, H. Wu
2011/205 (PDF ) Group-oriented ring signature Chunbo Ma, Jun Ao
2011/204 (PDF ) Leakage Tolerant Interactive Protocols Nir Bitansky, Ran Canetti, Shai Halevi
2011/203 (PDF ) Key agreement based on homomorphisms of algebraic structures Juha Partala
2011/202 (PDF ) Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes Markku-Juhani O. Saarinen
2011/201 (PDF ) Improved Meet-in-the-Middle Cryptanalysis of KTANTAN Lei Wei, Christian Rechberger, Jian Guo, Hongjun Wu, Huaxiong Wang, San Ling
2011/200 (PDF ) Fair and Privacy-Preserving Multi-Party Protocols for Reconciling Ordered Input Sets (Extended version) Georg Neugebauer, Ulrike Meyer, Susanne Wetzel
2011/199 (PDF ) An efficient deterministic test for Kloosterman sum zeros Omran Ahmadi, Robert Granger
2011/198 (PDF ) Terminating BKZ Guillaume Hanrot, Xavier Pujol, Damien Stehlé
2011/197 (PDF ) Public Key Encryption for the Forgetful Puwen Wei, Yuliang Zheng, Xiaoyun Wang
2011/196 (PDF ) Acceleration of Composite Order Bilinear Pairing on Graphics Hardware Ye Zhang, Chun Jason Xue, Duncan S. Wong, Nikos Mamoulis, S. M. Yiu
2011/194 (PDF ) Cryptanalysis of Chen \textit{et al.}'s RFID Access Control Protocol Masoumeh Safkhani, Nasour Bagheri, Majid Naderi
2011/193 (PDF ) Security Analysis of $LMAP^{++}$, an RFID Authentication Protocol Nasour Bagheri, Masoumeh Safkhani, Majid Naderi, Somitra Kumar Sanadhya
2011/192 (PDF ) Short and Efficient Certificate-Based Signature Joseph K. Liu, Feng Bao, Jianying Zhou
2011/191 (PDF ) On the Security of the Winternitz One-Time Signature Scheme Johannes Buchmann, Erik Dahmen, Sarah Ereth, Andreas Hülsing, Markus Rückert
2011/190 (PDF ) SHS: Secure Hybrid Search by Combining Dynamic and Static Indexes in PEKS Peng Xu, Hai Jin
2011/189 (PDF ) SIMPL Systems as a Keyless Cryptographic and Security Primitive Ulrich Rührmair
2011/188 (PDF ) Physical Turing Machines and the Formalization of Physical Cryptography Ulrich Rührmair
2011/187 (PDF ) Accelerating ID-based Encryption based on Trapdoor DL using Pre-computation Hyung Tae Lee, Jung Hee Cheon, Jin Hong
2011/185 (PDF ) Efficient and Secure Data Storage Operations for Mobile Cloud Computing Zhibin Zhou, Dijiang Huang
2011/184 (PDF ) Fortification of AES with Dynamic Mix-Column Transformation Ghulam Murtaza, Azhar Ali Khan, Syed Wasi Alam, Aqeel Farooqi
2011/182 (PDF ) Designated Confirmer Signatures With Unified Verification Guilin Wang, Fubiao Xia, Yunlei Zhao
2011/181 (PDF ) Security of Prime Field Pairing Cryptoprocessor Against Differential Power Attack Santosh Ghosh, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury
2011/180 (PDF ) Highly-Efficient Universally-Composable Commitments based on the DDH Assumption Yehuda Lindell
2011/179 (PDF ) Compact McEliece keys based on Quasi-Dyadic Srivastava codes Edoardo Persichetti
2011/178 (PDF ) Differential Fault Analysis of AES: Toward Reducing Number of Faults Chong Hee KIM
2011/177 (PDF ) Dynamic MDS Matrices for Substantial Cryptographic Strength Muhammad Yasir Malik, Jong-Seon No
2011/176 (PDF ) A FPGA pairing implementation using the Residue Number System Sylvain Duquesne, Nicolas Guillermin
2011/175 (PDF ) Analysis of reduced-SHAvite-3-256 v2 Marine Minier, Maria Naya-Plasencia, Thomas Peyrin
2011/174 (PDF ) On-line secret sharing Laszlo Csirmaz, Gabor Tardos
2011/172 (PDF ) The weak password problem: chaos, criticality, and encrypted p-CAPTCHAs T. V. Laptyeva, S. Flach, K. Kladko
2011/171 (PDF ) On lower bounds on second--order nonliearities of bent functions obtained by using Niho power functions Manish Garg, Sugata Gangopadhyay
2011/170 (PDF ) Software implementation of binary elliptic curves: impact of the carry-less multiplier on scalar multiplication Jonathan Taverne, Armando Faz-Hernández, Diego F. Aranha, Francisco Rodríguez-Henríquez, Darrel Hankerson, Julio López
2011/169 (PDF ) Identity-Based Cryptography for Cloud Security Hongwei Li, Yuanshun Dai, Bo Yang
2011/168 (PDF ) A Commitment-Consistent Proof of a Shuffle Douglas Wikström
2011/167 (PDF ) Identifying Large-Scale RFID Tags Using Non-Cryptographic Approach Yalin Chen, Jue-Sam Chou, Cheng-Lun Wu, Chi-Fong Lin
2011/166 (PDF ) Selections: Internet Voting with Over-the-Shoulder Coercion-Resistance Jeremy Clark, Urs Hengartner
2011/165 (PDF ) Improved Side Channel Cube Attacks on PRESENT XinJie Zhao, Tao Wang, ShiZe Guo
2011/164 (PDF ) On the relation between the MXL family of algorithms and Gröbner basis algorithms Martin Albrecht, Carlos Cid, Jean-Charles Faugère, Ludovic Perret
2011/162 (PDF ) Collision Timing Attack when Breaking 42 AES ASIC Cores Amir Moradi, Oliver Mischke, Christof Paar
2011/161 (PDF ) Efficient Hardware Implementations of BRW Polynomials and Tweakable Enciphering Schemes Debrup Chakraborty, Cuauhtemoc Mancillas-Lopez, Francisco Rodriguez-Henriquez, Palash Sarkar
2011/160 (PDF ) Cryptanalysis of ARMADILLO2 Mohamed Ahmed Abdelraheem, Céline Blondeau, María Naya-Plasencia, Marion Videau, Erik Zenner
2011/158 (PDF ) Enhancing Data Privacy in the Cloud Yanbin Lu, Gene Tsudik
2011/157 (PDF ) Secure Computation on the Web: Computing without Simultaneous Interaction Shai Halevi, Yehuda Lindell, Benny Pinkas
2011/156 (PDF ) Strong Forward Security in Identity-Based Signcryption Madeline González Muñiz, Peeter Laud
2011/153 (PDF ) Lower bounds of shortest vector lengths in random knapsack lattices and random NTRU lattices Jingguo Bi, Qi Cheng
2011/152 (PDF ) A Practical Application of Differential Privacy to Personalized Online Advertising Yehuda Lindell, Eran Omri
2011/151 (PDF ) Direct Exponent and Scalar Multiplication Classes of an MDS Matrix G. Murtaza, N. Ikram
2011/150 (PDF ) A Novel k-out-of-n Oblivious Transfer Protocol from Bilinear Pairing Jue-Sam Chou, Cheng-Lun Wu, Yalin Chen
2011/149 (PDF ) Generic Side-Channel Distinguishers: Improvements and Limitations Nicolas Veyrat-Charvillon, François-Xavier Standaert
2011/148 (PDF ) Near-Collision Attack on the Step-Reduced Compression Function of Skein-256 Hongbo Yu, Jiazhe Chen, Keting jia, Xiaoyun Wang
2011/147 (PDF ) The Optimal Linear Secret Sharing Scheme for Any Given Access Structure Tang Chunming, Gao Shuhong, Zhang Chengli
2011/146 (PDF ) ECDLP on GPU Lei Xu, Dongdai Lin, Jing Zou
2011/143 (PDF ) Computing $(\ell,\ell)$-isogenies in polynomial time on Jacobians of genus~$2$ curves Romain Cosset, Damien Robert
2011/141 (PDF ) Fast and Private Computation of Cardinality of Set Intersection and Union Emiliano De Cristofaro, Paolo Gasti, Gene Tsudik
2011/140 (PDF ) Some Instant- and Practical-Time Related-Key Attacks on KTANTAN32/48/64 Martin Ågren
2011/139 (PDF ) Shortest Lattice Vectors in the Presence of Gaps Mingjie Liu, Xiaoyun Wang, Guangwu Xu, Xuexin Zheng
2011/138 (PDF ) Constant-Round Privacy Preserving Multiset Union Jeongdae Hong, Jung Woo Kim, Jihye Kim, Kunsoo Park, Jung Hee Cheon
2011/137 (PDF ) Towards a Game Theoretic View of Secure Computation Gilad Asharov, Ran Canetti, Carmit Hazay
2011/136 (PDF ) A Full Proof of the BGW Protocol for Perfectly-Secure Multiparty Computation Gilad Asharov, Yehuda Lindell
2011/135 (PDF ) On isogeny classes of Edwards curves over finite fields Omran Ahmadi, Robert Granger
2011/134 (PDF ) Differentially Private Billing with Rebates George Danezis, Markulf Kohlweiss, Alfredo Rial
2011/133 (PDF ) Fully Homomorphic SIMD Operations N. P. Smart, F. Vercauteren
2011/132 (PDF ) Verifiable Delegation of Computation over Large Datasets Siavosh Benabbas, Rosario Gennaro, Yevgeniy Vahlis
2011/131 (PDF ) Trapdoor oneway functions associated with exponentiation Virendra Sule
2011/130 (PDF ) Ergodic Theory Over ${\F}_2[[T]]$ Dongdai Lin, Tao Shi, Zifeng Yang
2011/129 (PDF ) Distance Hijacking Attacks on Distance Bounding Protocols Cas Cremers, Kasper B. Rasmussen, Benedikt Schmidt, Srdjan Capkun
2011/127 (PDF ) Integer Arithmetic without Arithmetic Addition Gideon Samid
2011/126 (PDF ) The Hummingbird-2 Lightweight Authenticated Encryption Algorithm Daniel Engels, Markku-Juhani O. Saarinen, Peter Schweitzer, Eric M. Smith
2011/125 (PDF ) A Construction of A New Class of Knapsack-Type Public Key Cryptosystem, K(III)$\Sigma$PKC Masao KASAHARA
2011/124 (PDF ) A New Class of Biometrics on the Basis of Forgotten Secret Recovering Scheme, KSS(I) Masao KASAHARA
2011/123 (PDF ) Linear Hulls with Correlation Zero and Linear Cryptanalysis of Block Ciphers Andrey Bogdanov, Vincent Rijmen
2011/122 (PDF ) Secure Multi-Party Sorting and Applications Kristjän Valur Jönsson, Gunnar Kreitz, Misbah Uddin
2011/121 (PDF ) More Practical Fully Homomorphic Encryption Gu Chunsheng
2011/120 (PDF ) Faster 2-regular information-set decoding Daniel J. Bernstein, Tanja Lange, Christiane Peters, Peter Schwabe
2011/118 (PDF ) New Fully Homomorphic Encryption over the Integers Gu Chunsheng
2011/117 (PDF ) Bounded Vector Signatures and their Applications Lei Wei, Scott E. Coull, Michael K. Reiter
2011/116 (PDF ) Short-output universal hash functions and their use in fast and secure message authentication Long Hoang Nguyen, Andrew William Roscoe
2011/115 (PDF ) Multiple Differential Cryptanalysis: Theory and Practice (Corrected) Céline Blondeau, Benoît Gérard
2011/114 (PDF ) Fully Homomorphic Encryption, Approximate Lattice Problem and LWE Gu Chunsheng
2011/113 (PDF ) Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information Emiliano De Cristofaro, Yanbin Lu, Gene Tsudik
2011/112 (PDF ) An efficient certificateless two-party authenticated key agreement scheme from pairings Debiao He, Jin Hu
2011/111 (PDF ) Generalizations of Bent Functions. A Survey Natalia Tokareva
2011/109 (PDF ) Secure Blind Decryption Matthew Green
2011/108 (PDF ) Practical Secure and Efficient Multiparty Linear Programming Based on Problem Transformation Jannik Dreier, Florian Kerschbaum
2011/107 (PDF ) Threshold Encryption into Multiple Ciphertexts Martin Stanek
2011/106 (PDF ) Common Randomness and Secret Key Capacities of Two-way Channels Hadi Ahmadi, Reihaneh Safavi-Naini
2011/105 (PDF ) Explicit Formulas for Real Hyperelliptic Curves of Genus 2 in Affine Representation S. Erickson, M. J. Jacobson Jr., A. Stein
2011/104 (PDF ) Unconditionally Secure Signature Schemes Revisited Colleen M. Swanson, Douglas R. Stinson
2011/103 (PDF ) Cryptographically Sound Security Proof for On-Demand Source Routing Protocol EndairA István Vajda
2011/102 (PDF ) Optimal and Parallel Online Memory Checking Charalampos Papamanthou, Roberto Tamassia
2011/101 (PDF ) Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices Liqun Chen, Kurt Dietrich, Hans Löhr, Ahmad-Reza Sadeghi, Christian Wachsmann, Johannes Winter
2011/100 (PDF ) A Novel Group Signature Scheme Based on MPKC Guangdong Yang, Shaohua Tang, Li Yang
2011/099 (PDF ) Can Code Polymorphism Limit Information Leakage? Antoine Amarilli, Sascha Müller, David Naccache, Daniel Page, Pablo Rauzy, Michael Tunstall
2011/098 (PDF ) Computing Discrete Logarithms in the Jacobian of High-Genus Hyperelliptic Curves over Even Characteristic Finite Fields M. D. Velichka, M. J. Jacobson Jr., A. Stein
2011/097 (PDF ) Fastplay-A Parallelization Model and Implementation of SMC on CUDA based GPU Cluster Architecture Shi Pu, Pu Duan, Jyh-Charn Liu
2011/096 (PDF ) Computing on Authenticated Data Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger, abhi shelat, Brent Waters
2011/095 (PDF ) ALRED Blues: New Attacks on AES-Based MAC's Orr Dunkelman, Nathan Keller, Adi Shamir
2011/094 (PDF ) Graceful Degradation in Multi-Party Computation Martin Hirt, Christoph Lucas, Ueli Maurer, Dominik Raub
2011/093 (PDF ) Linear Cryptanalysis Using Multiple Linear Approximations Miia Hermelin, Kaisa Nyberg
2011/092 (PDF ) Characterization of the relations between information-theoretic non-malleability, secrecy, and authenticity Akinori Kawachi, Christopher Portmann, Keisuke Tanaka
2011/091 (PDF ) A New Approach to Practical Active-Secure Two-Party Computation Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi, Sai Sheshank Burra
2011/090 (PDF ) Generic Methods to Achieve Tighter Security Reductions for a Category of IBE Schemes Yu Chen, Liqun Chen, Zhong Chen
2011/089 (PDF ) Octal Bent Generalized Boolean Functions Pantelimon Stanica, Thor Martinsen
2011/088 (PDF ) Leftover Hash Lemma, Revisited Boaz Barak, Yevgeniy Dodis, Hugo Krawczyk, Olivier Pereira, Krzysztof Pietrzak, Francois-Xavier Standaert, Yu Yu
2011/087 (PDF ) On the Instantiability of Hash-and-Sign RSA Signatures Yevgeniy Dodis, Iftach Haitner, Aris Tentes
2011/086 (PDF ) Fault-propagation Pattern Based DFA on SPN Structure Block Ciphers using Bitwise Permutation, with Application to PRESENT and PRINTcipher Xin-jie Zhao, Tao Wang, Shi-ze Guo
2011/084 (PDF ) Traitor Tracing against Public Collaboration (Full Version) Xingwen Zhao, Fangguo Zhang
2011/083 (PDF ) On the number of bent functions from iterative constructions: lower bounds and hypotheses Natalia Tokareva
2011/081 (PDF ) Secure Datastructures based on Multiparty Computation Tomas Toft
2011/080 (PDF ) Turbo Codes Can Be Asymptotically Information-Theoretically Secure Xiao Ma
2011/079 (PDF ) Identity-based Digital Signature Scheme Without Bilinear Pairings He Debiao, Chen Jianhua, Hu Jin
2011/078 (PDF ) A Low-Area Unified Hardware Architecture for the AES and the Cryptographic Hash Function ECHO Jean-Luc Beuchat, Eiji Okamoto, Teppei Yamazaki
2011/077 (PDF ) DPA Leakage Evaluation and Countermeasure Plug-in Tang Ming, Wang Xiaorong, Qiu Zhenlong, Gao Si, Zhang Huanguo, Wu Qianhong
2011/076 (PDF ) A Unified Approach to Combinatorial Key Predistribution Schemes for Sensor Networks Maura B. Paterson, Douglas R. Stinson
2011/074 (PDF ) Really fast syndrome-based hashing Daniel J. Bernstein, Tanja Lange, Christiane Peters, Peter Schwabe
2011/073 (PDF ) Cryptanalysis of three matrix-based key establishment protocols Simon R. Blackburn, Carlos Cid, Ciaran Mullan
2011/072 (PDF ) AES Variants Secure Against Related-Key Differential and Boomerang Attacks Jiali Choy, Aileen Zhang, Khoongming Khoo, Matt Henricksen, Axel Poschmann
2011/071 (PDF ) Information-theoretic Bounds for Differentially Private Mechanisms Gilles Barthe, Boris Köpf
2011/070 (PDF ) Rational authentication protocols Long H. Nguyen
2011/069 (PDF ) Constant-Rounds, Linear Multi-party Computation for Exponentiation and Modulo Reduction with Perfect Security Chao Ning, Qiuliang Xu
2011/068 (PDF ) Rational Secret Sharing with Honest Players over an Asynchronous Channel William K. Moses Jr., C. Pandu Rangan
2011/067 (PDF ) On the Distribution of the Subset Sum Pseudorandom Number Generator on Elliptic Curves Simon R. Blackburn, Alina Ostafe, Igor E. Shparlinski
2011/066 (PDF ) Deniable Encryption with Negligible Detection Probability: An Interactive Construction Markus Duermuth, David Mandell Freeman
2011/065 (PDF ) Fully Simulatable Quantum-Secure Coin-Flipping and Applications Carolin Lunemann, Jesper Buus Nielsen
2011/064 (PDF ) Cryptographic Treatment of Private User Profiles Felix Günther, Mark Manulis, Thorsten Strufe
2011/063 (PDF ) Secret Keys from Channel Noise Hadi Ahmadi, Reihaneh Safavi-Naini
2011/062 (PDF ) Cryptanalysis and Security Enhancement of an Advanced Authentication Scheme using Smart Cards, and a Key Agreement Scheme for Two-Party Communication Swapnoneel Roy, Amlan K Das, Yu Li
2011/061 (PDF ) Cryptanalysis of Some Protocols for RFID Systems Masoumeh Safkhani, Majid Naderi, Nasour Bagheri, Somitra Kumar Sanadhya
2011/060 (PDF ) A Group Signature Scheme from Lattice Assumptions S. Dov Gordon, Jonathan Katz, Vinod Vaikuntanathan
2011/059 (PDF ) Extending Baby-step Giant-step algorithm for FACTOR problem Martin Stanek
2011/058 (PDF ) Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping Jean-Sébastien Coron, Aline Gouget, Thomas Icart, Pascal Paillier
2011/057 (PDF ) Another Look at RSA Signatures With Affine Padding Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi
2011/056 (PDF ) Spectral Coherence Analysis - First Experimental Results - Amine Dehbaoui, Sébastien Tiran, Philippe Maurine, François-Xavier Standaert, Nicolas Veyrat-Charvillon
2011/055 (PDF ) On Enumeration of Polynomial Equivalence Classes and Their Application to MPKC Dongdai Lin, Jean-Charles Faugere, Ludovic Perret, Tianze Wang
2011/053 (PDF ) Adaptive Pseudo-Free Groups and Applications Dario Catalano, Dario Fiore, Bogdan Warinschi
2011/052 (PDF ) Revocable Attribute-Based Signatures with Adaptive Security in the Standard Model Alex Escala, Javier Herranz, Paz Morillo
2011/049 (PDF ) Unbounded HIBE and Attribute-Based Encryption Allison Lewko, Brent Waters
2011/048 (PDF ) A non-Abelian factorization problem and an associated cryptosystem Srinath Baba, Srinivas Kotyad, Raghu Teja
2011/047 (PDF ) Constructing differential 4-uniform permutations from know ones Yuyin Yu, Mingsheng Wang, Yongqiang Li
2011/046 (PDF ) Lower and Upper Bounds for Deniable Public-Key Encryption Rikke Bendlin, Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi
2011/045 (PDF ) Private Identification, Authentication and Key Agreement Protocol with Security Mode Setup Farshid Farhat, Somayeh Salimi, Ahmad Salahi
2011/044 (PDF ) Fast Scalar Multiplication in ECC using The Multi base Number System. G. N. Purohit, Asmita Singh Rawat
2011/043 (PDF ) Proxy Blind Multi-signature Scheme using ECC for handheld devices Jayaprakash Kar
2011/042 (PDF ) Computing endomorphism rings of elliptic curves under the GRH Gaetan Bisson
2011/041 (PDF ) Reclaiming Privacy for Smartphone Applications (Revised Version) Emiliano De Cristofaro, Anthony Durussel, Imad Aad
2011/040 (PDF ) Simple and Exact Formula for Minimum Loop Length in Ate_i Pairing based on Brezing-Weng Curves Hoon Hong, Eunjeong Lee, Hyang-Sook Lee, Cheol-Min Park
2011/039 (PDF ) Fast point quadrupling on elliptic curves Duc-Phong Le, Binh P Nguyen
2011/038 (PDF ) Cold Boot Key Recovery by Solving Polynomial Systems with Noise Martin Albrecht, Carlos Cid
2011/037 (PDF ) Higher-Order Differential Attack on Reduced SHA-256 Mario Lamberger, Florian Mendel
2011/035 (PDF ) A New Family of Implicitly Authenticated Diffie-Hellman Protocols Andrew C. Yao, Yunlei Zhao
2011/034 (PDF ) Secure Authentication from a Weak Key, Without Leaking Information Niek J. Bouman, Serge Fehr
2011/033 (PDF ) The Geometry of Flex Tangents to a Cubic Curve and its Parameterizations Jean-Marc Couveignes, Jean-Gabriel Kammerer
2011/032 (PDF ) Corrigendum to: The Cube Attack on Stream Cipher Trivium and Quadraticity Tests Piotr Mroczkowski, Janusz Szmidt
2011/031 (PDF ) Efficient Unconditional Asynchronous Byzantine Agreement with Optimal Resilience Ashish Choudhury, Arpita Patra
2011/030 (PDF ) Fast Elliptic Curve Cryptography Using Optimal Double-Base Chains Vorapong Suppakitpaisarn, Masato Edahiro, Hiroshi Imai
2011/029 (PDF ) Outline of a proposal responding to E.U. and U.S. calls for trustworthy global-scale IdM and CKM designs Benjamin Gittins
2011/028 (PDF ) The Parazoa Family: Generalizing the Sponge Hash Functions Elena Andreeva, Bart Mennink, Bart Preneel
2011/027 (PDF ) Simple and Efficient Single Round Almost Perfectly Secure Message Transmission Tolerating Generalized Adversary Ashish Choudhury, Kaoru Kurosawa, Arpita Patra
2011/026 (PDF ) Private Discovery of Common Social Contacts Emiliano De Cristofaro, Mark Manulis, Bertram Poettering
2011/025 (PDF ) Supporting Publication and Subscription Confidentiality in Pub/Sub Networks Mihaela Ion, Giovanni Russello, Bruno Crispo
2011/024 (PDF ) Secure evaluation of polynomial using privacy ring homomorphisms Alexander Rostovtsev, Alexey Bogdanov, Mikhail Mikhaylov
2011/023 (PDF ) Improved zero-sum distinguisher for full round Keccak-f permutation Ming Duan, Xuajia Lai
2011/022 (PDF ) Cryptanalysis with Ternary Difference: Applied to Block Cipher PRESENT Farzaneh Abazari, Babak Sadeghian
2011/021 (PDF ) Fully Secure Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts Jae Hong Seo, Jung Hee Cheon
2011/020 (PDF ) Cover and Decomposition Index Calculus on Elliptic Curves made practical. Application to a seemingly secure curve over $\F_{p^6}$ Antoine Joux, Vanessa Vitse
2011/019 (PDF ) Collision Resistance of the JH Hash Function Jooyoung Lee, Deukjo Hong
2011/018 (PDF ) Homomorphic Signatures for Polynomial Functions Dan Boneh, David Mandell Freeman
2011/017 (PDF ) New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256 Jiazhe Chen, Keting Jia, Hongbo Yu, Xiaoyun Wang
2011/016 (PDF ) An Anonymous Health Care System Melissa Chase, Kristin Lauter
2011/014 (PDF ) Unconditionally Reliable Message Transmission in Directed Neighbour Networks Shashank Agrawal, Abhinav Mehta, Kannan Srinathan
2011/013 (PDF ) Secure Message Transmission In Asynchronous Directed Networks Shashank Agrawal, Abhinav Mehta, Kannan Srinathan
2011/012 (PDF ) Minimizing Non-interactive Zero-Knowledge Proofs Using Fully Homomorphic Encryption Jens Groth
2011/011 (PDF ) After-the-Fact Leakage in Public-Key Encryption Shai Halevi, Huijia Lin
2011/010 (PDF ) Structured Encryption and Controlled Disclosure Melissa Chase, Seny Kamara
2011/009 (PDF ) Progression-Free Sets and Sublinear Pairing-Based Non-Interactive Zero-Knowledge Arguments Helger Lipmaa
2011/008 (PDF ) Computing Elliptic Curve Discrete Logarithms with the Negation Map Ping Wang, Fangguo Zhang
2011/007 (PDF ) KISS: A Bit Too Simple Greg Rose
2011/006 (PDF ) Exploring the Limits of Common Coins Using Frontier Analysis of Protocols Hemanta K. Maji, Pichayoot Ouppaphan, Manoj Prabhakaran, Mike Rosulek
2011/005 (PDF ) Is privacy compatible with truthfulness? David Xiao
2011/004 (PDF ) A low-memory algorithm for finding short product representations in finite groups Gaetan Bisson, Andrew V. Sutherland
2011/003 (PDF ) On the correct use of the negation map in the Pollard rho method Daniel J. Bernstein, Tanja Lange, Peter Schwabe
2011/002 (PDF ) A Zero-One Law for Secure Multi-Party Computation with Ternary Outputs (full version) Gunnar Kreitz
2011/001 (PDF ) Practical Frameworks For $h$-Out-Of-$n$ Oblivious Transfer With Security Against Covert and Malicious Adversaries Zeng Bing, Tang Xueming, Xu Peng, Jing Jiandu
2010/661 (PDF ) Security Evaluation of MISTY Structure with SPN Round Function Ruilin Li, Chao Li, Jinshu Su, Bing Sun
2010/660 (PDF ) Identification of Multiple Invalid Pairing-based Signatures in Constrained Batches Brian J. Matt
2010/659 (PDF ) Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation Mark Manulis, Bertram Poettering
2010/658 (PDF ) ABC - A New Framework for Block Ciphers Uri Avraham, Eli Biham, Orr Dunkelman
2010/657 (PDF ) On small secret key attack against RSA with high bits known prime factor Yasufumi Hashimoto
2010/656 (PDF ) A Note on Constant-Round Zero-Knowledge Proofs of Knowledge Yehuda Lindell
2010/655 (PDF ) On the Affine Equivalence and Nonlinearity Preserving Bijective Mappings İsa Sertkaya, Ali Doğanaksoy
2010/654 (PDF ) Completeness Theorems with Constructive Proofs for Finite Deterministic 2-Party Functions (full version) Daniel Kraschewski, Jörn Müller-Quade
2010/653 (PDF ) Cubic groups M. A. Popov
2010/652 (PDF ) Active Domain Expansion for Normal Narrow-pipe Hash Functions Xigen Yao
2010/651 (PDF ) On the Impossibility of Instantiating PSS in the Standard Model Rishiraj Bhattacharyya, Avradip Mandal
2010/650 (PDF ) Cryptanalysis of the RSA Subgroup Assumption from TCC 2005 Jean-Sebastien Coron, Antoine Joux, Avradip Mandal, David Naccache, Mehdi Tibouchi
2010/649 (PDF ) Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols Douglas Stebila, Lakshmi Kuppusamy, Jothi Rangasamy, Colin Boyd, Juan Gonzalez Nieto
2010/648 (PDF ) Uniqueness is a Different Story: Impossibility of Verifiable Random Functions from Trapdoor Permutations Dario Fiore, Dominique Schröder
2010/647 (PDF ) Improved Nguyen-Vidick Heuristic Sieve Algorithm for Shortest Vector Problem Xiaoyun Wang, Mingjie Liu, Chengliang Tian, Jingguo Bi
2010/646 (PDF ) Statistical Analysis of Second Order Differential Power Analysis Emmanuel Prouff, Matthieu Rivain, Régis Bévan
2010/645 (PDF ) A Timed Logic for Modeling and Reasoning about Security Protocols Xinfeng Lei, Rui Xue, Ting Yu
2010/644 (PDF ) A Practical Platform for Cube-Attack-like Cryptanalyses Bo Zhu, Wenye Yu, Tao Wang
2010/643 (PDF ) Construct MD5 Collisions Using Just A Single Block Of Message Tao Xie, Dengguo Feng
2010/642 (PDF ) More Insights on Blockcipher-Based Hash Functions Yiyuan Luo, Xuejia Lai
2010/641 (PDF ) A new algorithm for computing Groebner bases Shuhong Gao, Frank Volny IV, Mingsheng Wang
2010/640 (PDF ) Short collusion-secure fingerprint codes against three pirates Koji Nuida
2010/638 (PDF ) One-Pass HMQV and Asymmetric Key-Wrapping Shai Halevi, Hugo Krawczyk
2010/637 (PDF ) Breaking An Identity-Based Encryption Scheme based on DHIES Martin R. Albrecht, Kenneth G. Paterson
2010/636 (PDF ) Differential Fault Analysis of AES using a Single Multiple-Byte Fault Subidh Ali, Debdeep Mukhopadhyay, Michael Tunstall
2010/634 (PDF ) ROTIV: RFID Ownership Transfer with Issuer Verification Kaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva
2010/633 (PDF ) Low Data Complexity Attacks on AES Charles Bouillaguet, Patrick Derbez, Orr Dunkelman, Nathan Keller, Vincent Rijmen, Pierre-Alain Fouque
2010/632 (PDF ) Efficient and provably-secure certificateless signature scheme without bilinear pairings He Debiao, Chen Jianhua, Zhang Rui
2010/631 (PDF ) Black-box property of Cryptographic Hash Functions Michal Rjaško
2010/630 (PDF ) Divison Polynomials for Alternate Models of Elliptic Curves Dustin Moody
2010/629 (PDF ) On the Security of Hash Functions Employing Blockcipher Postprocessing Donghoon Chang, Mridul Nandi, Moti Yung
2010/628 (PDF ) State convergence and keyspace reduction of the Mixer stream cipher Sui-Guan Teo, Kenneth Koon-Ho Wong, Leonie Simpson, Ed Dawson
2010/627 (PDF ) Secure and Efficient Protocols for Iris and Fingerprint Identification Marina Blanton, Paolo Gasti
2010/626 (PDF ) Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack Peng Xu, Hai Jin
2010/625 (PDF ) Attacking and fixing Helios: An analysis of ballot secrecy Veronique Cortier, Ben Smyth
2010/624 (PDF ) No-leak authentication by the Sherlock Holmes method Dima Grigoriev, Vladimir Shpilrain
2010/623 (PDF ) Cryptanalysis of Skein Daniel J. Bernstein, Tanja Lange
2010/622 (PDF ) A new result on the distinctness of primitive sequences over Z(pq) modulo 2 Qunxiong Zheng, Wenfeng Qi
2010/621 (PDF ) Generic Compilers for Authenticated Key Exchange (Full Version) Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk
2010/619 (PDF ) Further Observations on Certificate-Base Encryption and its Generic Construction from Certificateless Public Key Encryption Yang Lu
2010/618 (PDF ) A Forgery Attack on the Candidate LTE Integrity Algorithm 128-EIA3 Thomas Fuhr, Henri Gilbert, Jean-Renë Reinhard, Marion Videau
2010/617 (PDF ) Computing Discrete Logarithms in an Interval Steven D. Galbraith, John M. Pollard, Raminder S. Ruprai
2010/616 (PDF ) A non-uniform birthday problem with applications to discrete logarithms Steven D. Galbraith, Mark Holmes
2010/615 (PDF ) Using Equivalence Classes to Accelerate Solving the Discrete Logarithm Problem in a Short Interval Steven D. Galbraith, Raminder S. Ruprai
2010/614 (PDF ) An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture Simon Hoerder, Marcin Wojcik, Stefan Tillich, Dan Page
2010/613 (PDF ) Better Key Sizes (and Attacks) for LWE-Based Encryption Richard Lindner, Chris Peikert
2010/611 (PDF ) Statistical Analysis of Reduced Round Compression Functions of SHA-3 Second Round Candidates Ali Doğanaksoy, Barış Ege, Onur Koçak, Fatih Sulak
2010/610 (PDF ) Separating Succinct Non-Interactive Arguments From All Falsifiable Assumptions Craig Gentry, Daniel Wichs
2010/609 (PDF ) The Round Complexity of General VSS Ashish Choudhury, Kaoru Kurosawa, Arpita Patra
2010/608 (PDF ) A New Model of Binary Elliptic Curves with Fast Arithmetic Hongfeng Wu, Chunming Tang, Rongquan Feng
2010/607 (PDF ) How to Improve Rebound Attacks María Naya-Plasencia
2010/606 (PDF ) Weakness of two ID-based remote mutual authentication with key agreement protocols for mobile devices He Debiao, Chen Jianhua, Hu Jin
2010/605 (PDF ) A Closer Look at Keyboard Acoustic Emanations: Random Passwords, Typing Styles and Decoding Techniques Tzipora Halevi, Nitesh Saxena
2010/604 (PDF ) On Functional Decomposition of Multivariate Polynomials with Differentiation and Homogenization Shangwei Zhao, Ruyong Feng, Xiao-Shan Gao
2010/603 (PDF ) Cryptanalysis of Dual CRT-RSA Santanu Sarkar, Subhamoy Maitra
2010/602 (PDF ) An Improved Algebraic Attack on Hamsi-256 Itai Dinur, Adi Shamir
2010/601 (PDF ) Fast Endomorphism for any Genus 2 Hyperelliptic Curve over a Finite Field of Even Characteristic Lei Li, Siman Yang
2010/600 (PDF ) Exact, Efficient and Information-Theoretically Secure Voting with an Arbitrary Number of Cheaters Anne Broadbent, Stacey Jeffery, Alain Tapp
2010/599 (PDF ) Secure Multiparty Computation with Partial Fairness Amos Beimel, Eran Omri, Ilan Orlov
2010/598 (PDF ) A Broadcast Attack against NTRU Using Ding's Algorithm Yanbin Pan, Yingpu Deng
2010/597 (PDF ) A New Class of Bent--Negabent Boolean Functions Sugata Gangopadhyay, Ankita Chaturvedi
2010/596 (PDF ) Solving Systems of Multivariate Quadratic Equations over Finite Fields or: From Relinearization to MutantXL Enrico Thomae, Christopher Wolf
2010/595 (PDF ) Attribute-Based Signatures Hemanta K. Maji, Manoj Prabhakaran, Mike Rosulek
2010/594 (PDF ) Cache Games - Bringing Access Based Cache Attacks on AES to Practice Endre Bangerter, David Gullasch, Stephan Krenn
2010/593 (PDF ) Differential Attack on Five Rounds of the SC2000 Block Cipher Jiqiang Lu
2010/591 (PDF ) Bonsai Trees, or How to Delegate a Lattice Basis David Cash, Dennis Hofheinz, Eike Kiltz, Chris Peikert
2010/590 (PDF ) Beyond the Limits of DPA: Combined Side-Channel Collision Attacks Andrey Bogdanov, Ilya Kizhvatov
2010/589 (PDF ) Higher-order differential properties of Keccak and Luffa Christina Boura, Anne Canteaut, Christophe De Cannière
2010/588 (PDF ) Improved Collisions for Reduced ECHO-256 Martin Schläffer
2010/587 (PDF ) Group Message Authentication Bartosz Przydatek, Douglas Wikström
2010/586 (PDF ) Enhanced FPGA Implementation of the Hummingbird Cryptographic Algorithm İsmail San, Nuray At
2010/585 (PDF ) Smaller decoding exponents: ball-collision decoding Daniel J. Bernstein, Tanja Lange, Christiane Peters
2010/584 (PDF ) VMCrypt - Modular Software Architecture for Scalable Secure Computation Lior Malka, Jonathan Katz
2010/583 (PDF ) Improved Preimage Attack on One-block MD4 Jinmin Zhong, Xuejia Lai
2010/582 (PDF ) Secret Key Leakage from Public Key Perturbation of DLP-based Cryptosystems Alexandre Berzati, Cécile Canovas-Dumas, Louis Goubin
2010/581 (PDF ) Fast Algorithm to solve a family of SIS problem with $l_\infty$ norm Jintai Ding
2010/580 (PDF ) The Cube Attack on Stream Cipher Trivium and Quadraticity Tests Piotr Mroczkowski, Janusz Szmidt
2010/579 (PDF ) Construction of Highly Nonlinear Resilient Boolean Functions Satisfying Strict Avalanche Criterion WeiGuo Zhang, GuoZhen Xiao
2010/578 (PDF ) L1 - An Intermediate Language for Mixed-Protocol Secure Computation Axel Schroepfer, Florian Kerschbaum, Guenter Mueller
2010/577 (PDF ) Discrete Logarithms, Diffie-Hellman, and Reductions Neal Koblitz, Alfred Menezes, Igor Shparlinski
2010/576 (PDF ) Efficient Hashing using the AES Instruction Set Joppe W. Bos, Onur Ozen, Martijn Stam
2010/575 (PDF ) A Discrete Logarithm Attack on Elliptic Curves Otto Johnston
2010/574 (PDF ) Cryptanalysis of PRESENT-like ciphers with secret S-boxes Julia Borghoff, Lars R. Knudsen, Gregor Leander, Soeren S. Thomsen
2010/573 (PDF ) On permutation polynomials EA-equivalent to the inverse function over $GF(2^n)$ Yongqiang Li, Mingsheng Wang
2010/572 (PDF ) Cryptanalysis of splay tree based encryption Jean-Philippe Aumasson
2010/571 (PDF ) Single Core Implementation of Blue Midnight Wish Hash Function on VIRTEX 5 Platform Mohamed El Hadedy, Danilo Gligoroski, Svein J. Knapskog
2010/570 (PDF ) Breaking Grain-128 with Dynamic Cube Attacks Itai Dinur, Adi Shamir
2010/569 (PDF ) Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function Jérémy Jean, Pierre-Alain Fouque
2010/568 (PDF ) Efficient Two-Move Blind Signatures in the Common Reference String Model E. Ghadafi, N. P. Smart
2010/567 (PDF ) ON DILLON'S CLASS H OF BENT FUNCTIONS, NIHO BENT FUNCTIONS AND O-POLYNOMIALS Claude Carlet, Sihem Mesnager
2010/566 (PDF ) Blockcipher-based Double-length Hash Functions for Pseudorandom Oracles Yusuke Naito
2010/565 (PDF ) Self-Protecting Electronic Medical Records Using Attribute-Based Encryption Joseph A. Akinyele, Christoph U. Lehmann, Matthew D. Green, Matthew W. Pagano, Zachary N. J. Peterson, Aviel D. Rubin
2010/564 (PDF ) Cryptographic Randomness Testing of Block Ciphers and Hash Functions Ali Doğanaksoy, Barış Ege, Onur Koçak, Fatih Sulak
2010/563 (PDF ) Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption Tatsuaki Okamoto, Katsuyuki Takashima
2010/562 (PDF ) How to Leak on Key Updates Allison Lewko, Mark Lewko, Brent Waters
2010/561 (PDF ) Password-Protected Secret Sharing Stanislaw Jarecki, Ali Bagherzandi, Nitesh Saxena, Yanbin Lu
2010/560 (PDF ) On CCA-Secure Fully Homomorphic Encryption J. Loftus, A. May, N. P. Smart, F. Vercauteren
2010/559 (PDF ) Optimal Eta Pairing on Supersingular Genus-2 Binary Hyperelliptic Curves Diego F. Aranha, Jean-Luc Beuchat, Jérémie Detrey, Nicolas Estibals
2010/558 (PDF ) Solving LWE problem with bounded errors in polynomial time Jintai Ding
2010/556 (PDF ) Definitional Issues in Functional Encryption Adam O'Neill
2010/555 (PDF ) RNS arithmetic in ${\mathbb F}_{p^k}$ and application to fast pairing computation S. Duquesne
2010/554 (PDF ) Cryptanalysis of a Fast Encryption Scheme for Databases and of its Variant Stéphane Jacob
2010/552 (PDF ) A Note on Zero-Knowledge Proofs of Knowledge and the ZKPOK Ideal Functionality Carmit Hazay, Yehuda Lindell
2010/551 (PDF ) A Note on the Relation between the Definitions of Security for Semi-Honest and Malicious Adversaries Carmit Hazay, Yehuda Lindell
2010/550 (PDF ) Isogenies and Cryptography RAZA ALI KAZMI
2010/549 (PDF ) A Novel Non-interactive Deniable Authentication Protocol with Designated Verifier on elliptic curve cryptosystem Yalin Chen, Jue-Sam Chou, Chi-Fong Lin
2010/548 (PDF ) SHA-512/256 Shay Gueron, Simon Johnson, Jesse Walker
2010/546 (PDF ) Timed Encryption and Its Application Shaoquan Jiang
2010/545 (PDF ) Optimal XOR based (2,n)-Visual Cryptography Schemes Feng Liu, Chuankun Wu
2010/544 (PDF ) Semantic Security Under Related-Key Attacks and Applications Benny Applebaum, Danny Harnik, Yuval Ishai
2010/543 (PDF ) Functional Encryption: Definitions and Challenges Dan Boneh, Amit Sahai, Brent Waters
2010/542 (PDF ) Squaring in cyclotomic subgroups Koray Karabina
2010/541 (PDF ) One-time Computable and Uncomputable Functions Stefan Dziembowski, Tomasz Kazana, Daniel Wichs
2010/540 (PDF ) Rational Secret Sharing with Side Information in Point-to-Point Networks via Time-Delayed Encryption Anna Lysyanskaya, Aaron Segal
2010/539 (PDF ) Indifferentiable Deterministic Hashing to Elliptic and Hyperelliptic Curves Reza R. Farashahi, Pierre-Alain Fouque, Igor E. Shparlinski, Mehdi Tibouchi, J. Felipe Voloch
2010/538 (PDF ) Rotational Rebound Attacks on Reduced Skein Dmitry Khovratovich, Ivica Nikolic, Christian Rechberger
2010/537 (PDF ) Meet-in-the-Middle Attack on 8 Rounds of the AES Block Cipher under 192 Key Bits Yongzhuang Wei, Jiqiang Lu, Yupu Hu
2010/536 (PDF ) On The Impact of Target Technology in SHA-3 Hardware Benchmark Rankings Xu Guo, Sinan Huang, Leyla Nazhandali, Patrick Schaumont
2010/535 (PDF ) Linear Analysis of Reduced-Round CubeHash Tomer Ashur, Orr Dunkelman
2010/534 (PDF ) Balanced Boolean Functions with Optimum Algebraic Immunity and High Nonlinearity Xiangyong Zeng, Claude Carlet, Jinyong Shan, Lei Hu
2010/532 (PDF ) A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN Andrey Bogdanov, Christian Rechberger
2010/531 (PDF ) Comparison of seven SHA-3 candidates software implementations on smart cards. Mourad Gouicem
2010/530 (PDF ) How to Read a Signature? Vanessa Gratzer, David Naccache
2010/529 (PDF ) Generating Pairing-friendly Parameters for the CM Construction of Genus 2 Curves over Prime Fields Kristin Lauter, Ning Shang
2010/528 (PDF ) Constant-Round Private Function Evaluation with Linear Complexity Jonathan Katz, Lior Malka
2010/527 (PDF ) The Digital Signature Scheme MQQ-SIG Danilo Gligoroski, Rune Steinsmo \O deg\aa rd, Rune Erlend Jensen, Ludovic Perret, Jean-Charles Faugère, Svein Johan Knapskog, Smile Markovski
2010/526 (PDF ) Faster Explicit Formulas for Computing Pairings over Ordinary Curves Diego F. Aranha, Koray Karabina, Patrick Longa, Catherine H. Gebotys, Julio López
2010/525 (PDF ) Torus-based compression by factor 4 and 6 Koray Karabina
2010/524 (PDF ) Combining properties of cryptographic hash functions Michal Rjaško
2010/523 (PDF ) Affine Masking against Higher-Order Side Channel Analysis Guillaume Fumaroli, Ange Martinelli, Emmanuel Prouff, Matthieu Rivain
2010/522 (PDF ) Signatures Resilient to Continual Leakage on Memory and Computation Tal Malkin, Isamu Teranishiy, Yevgeniy Vahlis, Moti Yung
2010/521 (PDF ) Linear Approximations of Addition Modulo $2^n$-1 Xiutao Feng, Chunfang Zhou, Chuankun Wu
2010/520 (PDF ) Implementing Gentry's Fully-Homomorphic Encryption Scheme Craig Gentry, Shai Halevi
2010/519 (PDF ) Preimage Resistance Beyond the Birthday Bound: Double-Length Hashing Revisited Matthias Krause, Frederik Armknecht, Ewan Fleischmann
2010/518 (PDF ) Boolean functions with all main cryptographic properties Ziran Tu, Yingpu Deng
2010/517 (PDF ) Cryptanalysis of block EnRUPT Elias Yarrkov
2010/516 (PDF ) Key Agreement Protocols Based on Multivariate Polynomials over Fq Masahiro Yagisawa
2010/514 (PDF ) Semi-Homomorphic Encryption and Multiparty Computation Rikke Bendlin, Ivan Damgård, Claudio Orlandi, Sarah Zakarias
2010/513 (PDF ) Key-Dependent Message Security: Generic Amplification and Completeness Benny Applebaum
2010/512 (PDF ) Multi-Party Privacy-Preserving Set Intersection with Quasi-Linear Complexity Jung Hee Cheon, Stanislaw Jarecki, Jae Hong Seo
2010/511 (PDF ) On the complexity of Decomposition Attack Koh-ichi Nagao
2010/509 (PDF ) On Efficient Non-Interactive Oblivious Transfer with Tamper-Proof Hardware Maria Dubovitskaya, Alessandra Scafuro, Ivan Visconti
2010/508 (PDF ) A Fault Analytic Method against HB+ Jose Carrijo, Rafael Tonicelli, Anderson C. A. Nascimento
2010/507 (PDF ) On isotopisms of commutative presemifields and CCZ-equivalence of functions Lilya Budaghyan, Tor Helleseth
2010/506 (PDF ) Quantum Preimage and Collision Attacks on CubeHash Gaëtan Leurent
2010/505 (PDF ) Termination-Insensitive Computational Indistinguishability (and applications to computational soundness) Dominique Unruh
2010/504 (PDF ) Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret Problem Charles Bouillaguet, Jean-Charles Faugère, Pierre-Alain Fouque, Ludovic Perret
2010/503 (PDF ) BiTR: Built-in Tamper Resilience Seung Geol Choi, Aggelos Kiayias, Tal Malkin
2010/502 (PDF ) Proving Coercion-Resistance of Scantegrity II Ralf Kuesters, Tomasz Truderung, Andreas Vogt
2010/501 (PDF ) Group Homomorphic Encryption: Characterizations, Impossibility Results, and Applications Frederik Armknecht, Stefan Katzenbeisser, Andreas Peter
2010/500 (PDF ) ATTACKS ON THE AKACP PROTOCOL Konstantinos Chalkias, Foteini Baldimtsi, Dimitrios Hristu-Varsakelis, Spyros T. Halkidis, George Stephanides
2010/499 (PDF ) Secure Computations on Non-Integer Values M. Franz, B. Deiseroth, K. Hamacher, S. Jha, S. Katzenbeisser, H. Schroeder
2010/498 (PDF ) Co-Z Divisor Addition Formulae in Jacobian of Genus 2 Hyperelliptic Curves over Prime Fields Vladislav Kovtun, Sergey Kavun
2010/496 (PDF ) Efficient Attributes for Anonymous Credentials (Extended Version) Jan Camenisch, Thomas Groß
2010/495 (PDF ) A Practical (Non-interactive) Publicly Verifiable Secret Sharing Scheme Mahabir Prasad Jhanwar
2010/494 (PDF ) Stronger Security Model of Group Key Agreement Jianjie Zhao, Dawu Gu, M. Choudary Gorantla
2010/492 (PDF ) Efficient Fully Secure Predicate Encryption for Conjunctions, Disjunctions and k-CNF/DNF formulae Angelo De Caro, Vincenzo Iovino, Giuseppe Persiano
2010/491 (PDF ) A Collaborative Framework for Privacy Protection in Online Social Networks Yan Zhu, Zexing Hu, Huaixi Wang, Hongxin Hu, Gail-Joon Ahn
2010/490 (PDF ) Strong designated verifier signature scheme: new definition and construction Zuhua Shao
2010/489 (PDF ) Loiss: A Byte-Oriented Stream Cipher Dengguo Feng, Xiutao Feng, Wentao Zhang, Xiubin Fan, Chuankun Wu
2010/488 (PDF ) Fully Leakage-Resilient Signatures Elette Boyle, Gil Segev, Daniel Wichs
2010/487 (PDF ) Constant Round Non-Malleable Protocols using One Way Functions Vipul Goyal
2010/486 (PDF ) A NOTE ON SEMI-BENT BOOLEAN FUNCTIONS Claude Carlet, Sihem Mesnager
2010/485 (PDF ) Cryptanalysis of Block Ciphers Using Almost-Impossible Differentials Hamid Mala, Mohammad Dakhilalian, Mohsen Shakiba
2010/484 (PDF ) Automata Evaluation and Text Search Protocols with Simulation Based Security Rosario Gennaro, Carmit Hazay, Jeffrey S. Sorensen
2010/483 (PDF ) Constant-round Non-Malleable Commitments from Any One-Way Function Huijia Lin, Rafael Pass
2010/481 (PDF ) A secure email login system using virtual password Bhavin Tanti, Nishant doshi
2010/480 (PDF ) Enhanced STS using Check Equation --Extended Version of the Signature scheme proposed in the PQCrypt2010-- Shigeo Tsujii, Masahito Gotaishi
2010/479 (PDF ) Side-Channel Attacks on the McEliece and Niederreiter Public-Key Cryptosystems R. M. Avanzi, S. Hoerder, D. Page, M. Tunstall
2010/478 (PDF ) Cryptanalysis of the Convex Hull Click Human Identification Protocol Hassan Jameel Asghar, Shujun Li, Josef Pieprzyk, Huaxiong Wang
2010/477 (PDF ) On Compression of Data Encrypted with Block Ciphers Demijan Klinc, Carmit Hazay, Ashish Jagmohan, Hugo Krawczyk, Tal Rabin
2010/476 (PDF ) Predicate Encryption with Partial Public Keys Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano
2010/475 (PDF ) Pairing Computation on Elliptic Curves of Jacobi Quartic Form Hong Wang, Kunpeng Wang, Lijun Zhang, Bao Li
2010/474 (PDF ) Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures Sarah Meiklejohn, Hovav Shacham, David Mandell Freeman
2010/472 (PDF ) Accusation probabilities in Tardos codes: the Gaussian approximation is better than we thought A. Simone, B. Skoric
2010/470 (PDF ) Two identification protocols based on Cayley graphs of Coxeter groups Feliú Sagols, Guillermo Morales-Luna
2010/469 (PDF ) Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model Emiliano De Cristofaro, Jihye Kim, Gene Tsudik
2010/468 (PDF ) Generic Constructions of Parallel Key-Insulated Encryption: Stronger Security Model and Novel Schemes Goichiro Hanaoka, Jian Weng
2010/467 (PDF ) Computational Soundness about Formal Encryption in the Presence of Secret Shares and Key Cycles Xinfeng Lei, Rui Xue, Ting Yu
2010/466 (PDF ) PEKSrand: Providing Predicate Privacy in Public-key Encryption with Keyword Search Benwen Zhu, Bo Zhu, Kui Ren
2010/465 (PDF ) How to implement the public Key Operations in Code-based Cryptography on Memory-constrained Devices Falko Strenzke
2010/463 (PDF ) Passive Cryptanalysis of the UnConditionally Secure Authentication Protocol for RFID Systems Mohammad Reza Sohizadeh Abyaneh
2010/462 (PDF ) Unconditionally Secure Rational Secret Sharing in Standard Communication Networks Zhifang Zhang
2010/461 (PDF ) Identity Based Partial Aggregate Signature Scheme Without Pairing S. Sharmila Deva Selvi, S. Sree Vivek, J. Shriram, C. Pandu Rangan
2010/459 (PDF ) CCA2 Secure Certificateless Encryption Schemes Based on RSA S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
2010/458 (PDF ) Key Agreement Protocols Using Multivariate Equations on Non-commutative Ring Masahiro Yagisawa
2010/457 (PDF ) Improving the performance of Luffa Hash Algorithm Thomaz Oliveira, Julio López
2010/456 (PDF ) Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets Yevgeniy Dodis, Bhavana Kanukurthi, Jonathan Katz, Leonid Reyzin, Adam Smith
2010/455 (PDF ) Optimal Verification of Operations on Dynamic Sets Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos
2010/454 (PDF ) Key Exchange with Anonymous Authentication using DAA-SIGMA Protocol Jesse Walker, Jiangtao Li
2010/453 (PDF ) Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures Dan Boneh, David Mandell Freeman
2010/452 (PDF ) Every Vote Counts: Ensuring Integrity in Large-Scale DRE-based Electronic Voting Feng Hao, Matthew Nicolas Kreeger
2010/451 (PDF ) Acceleration of Differential Fault Analysis of the Advanced Encryption Standard Using Single Fault Subidh Ali, Debdeep Mukhopadhyay
2010/450 (PDF ) Round-Efficient Perfectly Secure Message Transmission Scheme Against General Adversary Kaoru Kurosawa
2010/449 (PDF ) Oblivious and Fair Server-Aided Two-Party Computation Amir Herzberg, Haya Shulman
2010/448 (PDF ) Sequential Rationality in Cryptographic Protocols Ronen Gradwohl, Noam Livne, Alon Rosen
2010/447 (PDF ) Side-channel Analysis of Six SHA-3 Candidates Olivier Benoit, Thomas Peyrin
2010/446 (PDF ) Short One-Time Signatures G. M. Zaverucha, D. R. Stinson
2010/445 (PDF ) Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs Ekawat Homsirikamol, Marcin Rogawski, Kris Gaj
2010/444 (PDF ) New Construction of Identity-based Proxy Re-encryption Song Luo, Jianbin Hu, Zhong Chen
2010/443 (PDF ) Balanced Boolean Functions with (Almost) Optimal Algebraic Immunity and Very High Nonlinearity Xiaohu Tang, Deng Tang, Xiangyong Zeng, Lei Hu
2010/442 (PDF ) Algebraic Pseudorandom Functions with Improved Efficiency from the Augmented Cascade Dan Boneh, Hart Montgomery, Ananth Raghunathan
2010/441 (PDF ) Provably Secure Higher-Order Masking of AES Matthieu Rivain, Emmanuel Prouff
2010/440 (PDF ) Piret and Quisquater's DFA on AES Revisited Christophe Giraud, Adrian Thillard
2010/439 (PDF ) Embedded Extended Visual Cryptography Schemes Feng Liu, Chuankun Wu
2010/438 (PDF ) Achieving Leakage Resilience Through Dual System Encryption Allison Lewko, Yannis Rouselakis, Brent Waters
2010/437 (PDF ) Selecting Parameters for the Rainbow Signature Scheme - Extended Version - Albrecht Petzoldt, Stanislav Bulygin, Johannes Buchmann
2010/436 (PDF ) Arithmetic of Supersingular Koblitz Curves in Characteristic Three Roberto Avanzi, Clemens Heuberger, Helmut Prodinger
2010/435 (PDF ) The Improbable Differential Attack: Cryptanalysis of Reduced Round CLEFIA Cihangir Tezcan
2010/434 (PDF ) Low-weight Pseudo Collision Attack on Shabal and Preimage Attack on Reduced Shabal-512 Takanori Isobe, Taizo Shirai
2010/433 (PDF ) The PASSERINE Public Key Encryption and Authentication Mechanism Markku-Juhani O. Saarinen
2010/432 (PDF ) AN EFFICIENT PARALLEL ALGORITHM FOR SKEIN HASH FUNCTIONS K. Atighehchi, A. Enache, T. Muntean, G. Risterucci
2010/431 (PDF ) Collusion-Resistant Multicast Key Distribution Based on Homomorphic One-Way Function Trees Jing Liu, Bo Yang
2010/430 (PDF ) Generic Collision Attacks on Narrow-pipe Hash Functions Faster than Birthday Paradox, Applicable to MDx, SHA-1, SHA-2, and SHA-3 Narrow-pipe Candidates Vlastimil Klima, Danilo Gligoroski
2010/429 (PDF ) A Family of Implementation-Friendly BN Elliptic Curves Geovandro C. C. F. Pereira, Marcos A. Simplício Jr, Michael Naehrig, Paulo S. L. M. Barreto
2010/428 (PDF ) Random Oracles in a Quantum World Dan Boneh, Özgür Dagdelen, Marc Fischlin, Anja Lehmann, Christian Schaffner, Mark Zhandry
2010/426 (PDF ) Parallelizing the Camellia and SMS4 Block Ciphers - Extended version Huihui Yap, Khoongming Khoo, Axel Poschmann
2010/425 (PDF ) KIST: A new encryption algorithm based on splay R. Wei, Z. Zeng
2010/424 (PDF ) CyclicRainbow - A multivariate Signature Scheme with a Partially Cyclic Public Key based on Rainbow Albrecht Petzoldt, Stanislav Bulygin, Johannes Buchmann
2010/423 (PDF ) Near Collisions for the Compress Function of Hamsi-256 Found by Genetic Algorithm LI Yun-qiang, Wang Ai-lan
2010/422 (PDF ) Synchronized Aggregate Signatures: New Definitions, Constructions and Applications Jae Hyun Ahn, Matthew Green, Susan Hohenberger
2010/421 (PDF ) Binomial Sieve Series -- a Prospective Cryptographic Tool Gideon Samid
2010/420 (PDF ) Towards provable security of the Unbalanced Oil and Vinegar signature scheme under direct attacks Stanislav Bulygin, Albrecht Petzoldt, Johannes Buchmann
2010/419 (PDF ) White-Box Cryptography and SPN ciphers. LRC method. Dmitry Schelkunov
2010/418 (PDF ) Cryptanalysis and Improvement of A New Electronic Traveler’s Check Scheme Based on One-way Hash Function Jue-Sam Chou, Hsien-ching Chen, Chun-Yun Chen
2010/417 (PDF ) Distinguishing Properties of Higher Order Derivatives of Boolean Functions Ming Duan, Xuejia Lai, Mohan Yang, Xiaorui Sun, Bo Zhu
2010/416 (PDF ) Computationally Sound Verification of Source Code Michael Backes, Matteo Maffei, Dominique Unruh
2010/415 (PDF ) Perfectly Balanced Boolean Functions and Golić Conjecture Stanislav Smyshlyaev
2010/414 (PDF ) On Strong Simulation and Composable Point Obfuscation Nir Bitansky, Ran Canetti
2010/413 (PDF ) Collisions for 72-step and 73-step SHA-1: Improvements in the Method of Characteristics E. A. Grechnikov
2010/412 (PDF ) Optimal Adversary Behavior for the Serial Model of Financial Attack Trees Margus Niitsoo
2010/411 (PDF ) Cryptanalysis of Cryptosystems Based on Noncommutative Skew Polynomials. Vivien Dubois, Jean-Gabriel Kammerer
2010/410 (PDF ) Wild McEliece Daniel J. Bernstein, Tanja Lange, Christiane Peters
2010/409 (PDF ) The collision security of Tandem-DM in the ideal cipher model Jooyoung Lee, Martijn Stam, John Steinberger
2010/408 (PDF ) Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations Jean-François Gallais, Ilya Kizhvatov, Michael Tunstall
2010/407 (PDF ) Flaws in Differential Cryptanalysis of Reduced Round PRESENT Manoj Kumar, Pratibha Yadav, Meena Kumari
2010/406 (PDF ) Unfolding Method for Shabal on Virtex-5 FPGAs: Concrete Results.pdf Julien Francq, Céline Thuillet
2010/405 (PDF ) Privacy-Preserving RFID Systems: Model and Constructions Sébastien Canard, Iwen Coisel, Jonathan Etrog, Marc Girault
2010/404 (PDF ) On the Insecurity of Parallel Repetition for Leakage Resilience Allison Lewko, Brent Waters
2010/402 (PDF ) On the Security of Non-Linear HB (NLHB) Protocol Against Passive Attack Mohammad Reza Sohizadeh Abyaneh
2010/401 (PDF ) Privacy-friendly Incentives and their Application to Wikipedia (Extended Version) Jan Camenisch, Thomas Groß, Peter Hladky, Christian Hoertnagl
2010/400 (PDF ) Security Analysis of a Threshold Proxy Signature Scheme Kitae Kim, Dahun Nyang
2010/399 (PDF ) Faster Computation of Self-pairings Chang-An Zhao, Fangguo Zhang, Dongqing Xie
2010/398 (PDF ) Distinguisher for Shabal's Permutation Function Peter Novotney
2010/397 (PDF ) Pseudorandom Functions and Permutations Provably Secure Against Related-Key Attacks Mihir Bellare, David Cash
2010/396 (PDF ) From AES-128 to AES-192 and AES-256, How to Adapt Differential Fault Analysis Attacks Noémie Floissac, Yann L'Hyver
2010/395 (PDF ) On Efficient Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption Zhibin Zhou, Dijiang Huang
2010/394 (PDF ) Horizontal Correlation Analysis on Exponentiation Christophe Clavier, Benoit Feix, Georges Gagnerot, Mylene Roussellet, Vincent Verneuil
2010/393 (PDF ) A Privacy-Flexible Password Authentication Scheme for Multi-Server Environment Jue-Sam Chou, Yalin Chen, Chun-Hui Huang
2010/392 (PDF ) Interplay between (Im)perfectness, Synchrony and Connectivity: The Case of Reliable Message Transmission Abhinav Mehta, Shashank Agrawal, Kannan Srinathan
2010/391 (PDF ) Exponential Bounds for Information Leakage in Unknown-Message Side-Channel Attacks Daniel Z. Zanger
2010/390 (PDF ) Elliptic curves in Huff's model Hongfeng Wu, Rongquan Feng
2010/389 (PDF ) The impossibility of computationally sound XOR Dominique Unruh
2010/388 (PDF ) On the Efficiency and Security of Pairing-Based Protocols in the Type 1 and Type 4 Settings Sanjit Chatterjee, Darrel Hankerson, Alfred Menezes
2010/387 (PDF ) A Combinatorial Analysis of HC-128 Goutam Paul, Subhamoy Maitra, Shashwat Raizada
2010/386 (PDF ) BoostReduce - A Framework For Strong Lattice Basis Reduction Werner Backes, Susanne Wetzel
2010/385 (PDF ) First-Order Side-Channel Attacks on the Permutation Tables Countermeasure –Extended Version– Emmanuel Prouff, Robert McEvoy
2010/384 (PDF ) Practical consequences of the aberration of narrow-pipe hash designs from ideal random functions Danilo Gligoroski, Vlastimil Klima
2010/383 (PDF ) Huff's Model for Elliptic Curves Marc Joye, Mehdi Tibouchi, Damien Vergnaud
2010/382 (PDF ) Deterministic Encoding and Hashing to Odd Hyperelliptic Curves Pierre-Alain Fouque, Mehdi Tibouchi
2010/381 (PDF ) Security Reductions of the Second Round SHA-3 Candidates Elena Andreeva, Bart Mennink, Bart Preneel
2010/380 (PDF ) Analysis of an internet voting protocol Kristian Gjøsteen
2010/379 (PDF ) Pairing computation on elliptic curves with efficiently computable endomorphism and small embedding degree Sorina Ionica, Antoine Joux
2010/378 (PDF ) Ring Signature and Identity-Based Ring Signature from Lattice Basis Delegation Jin Wang
2010/377 (PDF ) Key Agreement Protocols Based on Multivariate Algebraic Equations on Quaternion Ring Masahiro Yagisawa
2010/376 (PDF ) Identity Based Online/Offline Signcryption Scheme S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
2010/375 (PDF ) Improved Collision Attacks on the Reduced-Round Grøstl Hash Function Kota Ideguchi, Elmar Tischhauser, Bart Preneel
2010/374 (PDF ) Efficient Generation of Linear Secret Sharing Scheme Matrices from Threshold Access Trees Zhen Liu, Zhenfu Cao, Duncan S. Wong
2010/373 (PDF ) Hashing into Hessian Curves Reza Rezaeian Farashahi
2010/372 (PDF ) Decoding square-free Goppa codes over $\F_p$ Paulo S. L. M. Barreto, Richard Lindner, Rafael Misoczki
2010/371 (PDF ) Compact hardware for computing the Tate pairing over 128-bit-security supersingular curves Nicolas Estibals
2010/370 (PDF ) Finding discrete logarithms with a set orbit distinguisher Robert P. Gallant
2010/369 (PDF ) Double Ciphertext Mode : A Proposal for Secure Backup Debrup Chakraborty, Cuauhtemoc Mancillas-Lopez
2010/368 (PDF ) Round-Optimal Password-Based Authenticated Key Exchange Jonathan Katz, Vinod Vaikuntanathan
2010/367 (PDF ) Starfish on Strike Daniel J. Bernstein, Peter Birkner, Tanja Lange
2010/366 (PDF ) Oblivious RAM Revisited Benny Pinkas, Tzachy Reinman
2010/365 (PDF ) TASTY: Tool for Automating Secure Two-partY computations Wilko Henecka, Stefan Kögl, Ahmad-Reza Sadeghi, Thomas Schneider, Immo Wehrenberg
2010/364 (PDF ) A Compact FPGA Implementation of the SHA-3 Candidate ECHO Jean-Luc Beuchat, Eiji Okamoto, Teppei Yamazaki
2010/363 (PDF ) An Analysis of Affine Coordinates for Pairing Computation Kristin Lauter, Peter L. Montgomery, Michael Naehrig
2010/362 (PDF ) Construction of Balanced Boolean Functions with High Nonlinearity and Good Autocorrelation Properties Deng Tang, Weiguo Zhang, Xiaohu Tang
2010/361 (PDF ) On the Use of Financial Data as a Random Beacon Jeremy Clark, Urs Hengartner
2010/360 (PDF ) On the Security of Identity Based Threshold Unsigncryption Schemes S. Sharmila Deva Selvi, S. Sree Vivek, S. Priti, C. Pandu Rangan
2010/359 (PDF ) Identity Based Self Delegated Signature - Self Proxy Signatures S. Sharmila Deva Selvi, S. Sree Vivek, S. Gopinath, C. Pandu Rangan
2010/358 (PDF ) The Fiat--Shamir Transform for Group and Ring Signature Schemes M. -F. Lee, N. P. Smart, B. Warinschi
2010/356 (PDF ) Secure Connectivity Model In Wireless Sensor Network(WSN) Using 1st Order Reed Muller Codes Pinaki Sarkar, Amrita Saha, Morshed Udan Chowdhury
2010/355 (PDF ) Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE Bozhan Su, Wenling Wu, Shuang Wu, Le Dong
2010/354 (PDF ) High-Speed Software Implementation of the Optimal Ate Pairing over Barreto-Naehrig Curves Jean-Luc Beuchat, Jorge Enrique González Díaz, Shigeo Mitsunari, Eiji Okamoto, Francisco Rodríguez-Henríquez, Tadanori Teruya
2010/353 (PDF ) Cryptographic Pairings Based on Elliptic Nets Naoki Ogura, Naoki Kanayama, Shigenori Uchiyama, Eiji Okamoto
2010/352 (PDF ) A Digital Signature Using Multivariate Functions on Quaternion Ring Masahiro Yagisawa
2010/351 (PDF ) Decentralizing Attribute-Based Encryption Allison Lewko, Brent Waters
2010/350 (PDF ) A Security Enhancement and Proof for Authentication and Key Agreement (AKA) Vladimir Kolesnikov
2010/349 (PDF ) Improved Algebraic Cryptanalysis of QUAD, Bivium and Trivium via Graph Partitioning on Equation Systems Kenneth Koon-Ho Wong, Gregory V. Bard
2010/348 (PDF ) Lattice-theoretic Characterization of Secret Sharing Representable Connected Matroids A. N. Alekseychuk
2010/347 (PDF ) Time-Specific Encryption Kenneth G. Paterson, Elizabeth A. Quaglia
2010/346 (PDF ) Efficient Generalized Signcryption Schemes Prashant Kushwah, Sunder Lal
2010/345 (PDF ) Robust RFID Authentication Protocol with Formal Proof and Its Feasibility Miyako Ohkubo, Shin'ichiro Matsuo, Yoshikazu Hanatani, Kazuo Sakiyama, Kazuo Ohta
2010/344 (PDF ) Generating more Kawazoe-Takahashi Genus 2 Pairing-friendly Hyperelliptic Curves. Ezekiel J Kachisa
2010/343 (PDF ) Identity Based Public Verifiable Signcryption Scheme S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
2010/342 (PDF ) Fixed Argument Pairings Craig Costello, Douglas Stebila
2010/341 (PDF ) A New Class of Public Key Cryptosystems Constructed Based on Error-Correcting Codes, Using K(III) Scheme Masao Kasahara
2010/340 (PDF ) A secure Deniable Authentication Protocol based on Bilinear Diffie-Hellman Algorithm Jayaprakash Kar, Banshidhar Majhi
2010/339 (PDF ) A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on $\Sigma$-Protocols Jose Bacelar Almeida, Endre Bangerter, Manuel Barbosa, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider
2010/338 (PDF ) Efficient SIMD arithmetic modulo a Mersenne number Joppe W. Bos, Thorsten Kleinjung, Arjen K. Lenstra, Peter L. Montgomery
2010/337 (PDF ) Practical-Titled Attack on AES-128 Using Chosen-Text Relations Vincent Rijmen
2010/336 (PDF ) Efficient Differential Fault Analysis for AES Shigeto Gomisawa, Yang Li, Junko Takahashi, Toshinori Fukunaga, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta
2010/335 (PDF ) Analysis of Efficient Techniques for Fast Elliptic Curve Cryptography on x86-64 based Processors Patrick Longa, Catherine Gebotys
2010/334 (PDF ) Security Proof of AugPAKE SeongHan Shin, Kazukuni Kobara, Hideki Imai
2010/332 (PDF ) Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Aurelien Francillon, Boris Danev, Srdjan Capkun
2010/331 (PDF ) A Distinguisher for High Rate McEliece Cryptosystems Jean-Charles Faugère, Valérie Gauthier, Ayoub Otmani, Ludovic Perret, Jean-Pierre Tillich
2010/330 (PDF ) Distributed Rational Consensus Amjed Shareef
2010/329 (PDF ) On the Security of Pseudorandomized Information-Theoretically Secure Schemes Koji Nuida, Goichiro Hanaoka
2010/328 (PDF ) Signatures for Multi-source Network Coding László Czap, István Vajda
2010/327 (PDF ) Efficiency-Improved Fully Simulatable Adaptive OT under the DDH Assumption Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong
2010/326 (PDF ) Privacy-Preserving Multi-Objective Evolutionary Algorithms Daniel Funke, Florian Kerschbaum
2010/325 (PDF ) Effect of the Dependent Paths in Linear Hull Zhenli Dai, Meiqin Wang, Yue Sun
2010/324 (PDF ) Applications of SAT Solvers to AES key Recovery from Decayed Key Schedule Images Abdel Alim Kamal, Amr M. Youssef
2010/323 (PDF ) Security Analysis of SIMD Charles Bouillaguet, Pierre-Alain Fouque, Gaëtan Leurent
2010/322 (PDF ) Improved Single-Key Attacks on 8-round AES Orr Dunkelman, Nathan Keller, Adi Shamir
2010/321 (PDF ) Subspace Distinguisher for 5/8 Rounds of the ECHO-256 Hash Function Martin Schläffer
2010/319 (PDF ) On the Security of a Bidirectional Proxy Re-Encryption Scheme from PKC 2010 Jian Weng, Yunlei Zhao
2010/318 (PDF ) Multiparty Computation for Dishonest Majority: from Passive to Active Security at Low Cost Ivan Damgård, Claudio Orlandi
2010/317 (PDF ) A Note On Gottesman-Chuang Quantum Signature Scheme Zhengjun Cao
2010/316 (PDF ) A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm Hassan Jameel Asghar, Josef Pieprzyk, Huaxiong Wang
2010/315 (PDF ) Efficient Techniques for High-Speed Elliptic Curve Cryptography Patrick Longa, Catherine Gebotys
2010/314 (PDF ) Weaknesses of a dynamic ID-based remote user authentication scheme He Debiao, Chen Jianhua, Hu Jin
2010/313 (PDF ) Fast Exhaustive Search for Polynomial Systems in $F_2$ Charles Bouillaguet, Chen-Mou Cheng, Tony (Tung) Chou, Ruben Niederhagen, Adi Shamir, Bo-Yin Yang
2010/312 (PDF ) Security weakness of two authenticated key exchange protocols from pairings Qingfeng Cheng, Chuangui Ma
2010/311 (PDF ) Combining leak--resistant arithmetic for elliptic curves defined over $\F_p$ and RNS representation J. C. Bajard, S. Duquesne, M. Ercegovac
2010/309 (PDF ) Co-Z Addition Formulae and Binary Ladders on Elliptic Curves Raveen R. Goundar, Marc Joye, Atsuko Miyaji
2010/308 (PDF ) Attacking M&M Collective Signature Scheme Michal Rjaško, Martin Stanek
2010/307 (PDF ) Impossible Differential Cryptanalysis of SPN Ciphers Ruilin Li, Bing Sun, Chao Li
2010/306 (PDF ) On security of a remote user authentication scheme without using smart cards He Debiao, Chen Jianhua, Hu Jin
2010/305 (PDF ) On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing Marten van Dijk, Ari Juels
2010/304 (PDF ) Cryptanalysis of the Compression Function of SIMD Hongbo Yu, Xiaoyun Wang
2010/303 (PDF ) Universally Composable Symbolic Analysis of Diffie-Hellman based Key Exchange Ran Canetti, Sebastian Gajek
2010/302 (PDF ) Using the Inhomogeneous Simultaneous Approximation Problem for Cryptographic Design Frederik Armknecht, Carsten Elsner, Martin Schmidt
2010/301 (PDF ) On generalized Feistel networks Viet Tung Hoang, Phillip Rogaway
2010/300 (PDF ) Optimal Average Joint Hamming Weight and Minimal Weight Conversion of d Integers Vorapong Suppakitpaisarn, Masato Edahiro, Hiroshi Imai
2010/299 (PDF ) Faster Fully Homomorphic Encryption Damien Stehle, Ron Steinfeld
2010/298 (PDF ) On the Indifferentiability of the Grøstl Hash Function Elena Andreeva, Bart Mennink, Bart Preneel
2010/297 (PDF ) Correlation-Enhanced Power Analysis Collision Attack Amir Moradi, Oliver Mischke, Thomas Eisenbarth
2010/296 (PDF ) Hash-based Multivariate Public Key Cryptosystems WANG Hou-Zhen, ZHANG Huan-Guo
2010/295 (PDF ) Ideal Key Derivation and Encryption in Simulation-based Security Ralf Kuesters, Max Tuengerthal
2010/294 (PDF ) Computing genus 2 curves from invariants on the Hilbert moduli space Kristin Lauter, Tonghai Yang
2010/293 (PDF ) Security of balanced and unbalanced Feistel Schemes with Linear Non Equalities Jacques Patarin
2010/292 (PDF ) A Low-Area yet Performant FPGA Implementation of Shabal Jérémie Detrey, Pierrick Gaudry, Karim Khalfallah
2010/291 (PDF ) Cryptanalysis of an Exquisite Mutual Authentication Scheme with Key Agreement Using Smart Card He Debiao, Chen Jianhua, Hu Jin
2010/290 (PDF ) Intractable Problems in Cryptography Neal Koblitz, Alfred Menezes
2010/289 (PDF ) A Two-Party Protocol with Trusted Initializer for Computing the Inner Product Rafael Dowsley, Jeroen van de Graaf, Davidson Marques, Anderson C. A. Nascimento
2010/288 (PDF ) Lattice-based Identity-Based Broadcast Encryption Scheme Jin Wang, Jingguo Bi
2010/287 (PDF ) Introduction to Mirror Theory: Analysis of Systems of Linear Equalities and Linear Non Equalities for Cryptography Jacques Patarin
2010/286 (PDF ) On second-order nonlinearities of some $\mathcal{D}_0$ type bent functions Sugata Gangopadhyay, Brajesh Kumar Singh
2010/285 (PDF ) A SAT-based preimage analysis of reduced KECCAK hash functions Pawel Morawiecki, Marian Srebrny
2010/284 (PDF ) Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer Yehuda Lindell, Benny Pinkas
2010/283 (PDF ) Recursive Information Hiding in Visual Cryptography Sandeep Katta
2010/282 (PDF ) Pseudo-Linear Approximations for ARX Ciphers: With Application to Threefish Kerry A. McKay, Poorvi L. Vora
2010/281 (PDF ) Protocols for Reliable and Secure Message Transmission Ashish Choudhury
2010/280 (PDF ) Studies on Verifiable Secret Sharing, Byzantine Agreement and Multiparty Computation Arpita Patra
2010/279 (PDF ) On the Round Complexity of Covert Computation Vipul Goyal, Abhishek Jain
2010/278 (PDF ) Overcoming the Hole In The Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage Zvika Brakerski, Yael Tauman Kalai, Jonathan Katz, Vinod Vaikuntanathan
2010/276 (PDF ) Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
2010/275 (PDF ) Position-Based Quantum Cryptography: Impossibility and Constructions Harry Buhrman, Nishanth Chandran, Serge Fehr, Ran Gelles, Vipul Goyal, Rafail Ostrovsky, Christian Schaffner
2010/274 (PDF ) Online/Offline Identity-Based Signcryption Revisited Joseph K. Liu, Joonsang Baek, Jianying Zhou
2010/273 (PDF ) Symmetric States and their Structure: Improved Analysis of CubeHash Niels Ferguson, Stefan Lucks, Kerry A. McKay
2010/272 (PDF ) Virtual Secure Circuit: Porting Dual-Rail Pre-charge Technique into Software on Multicore Zhimin Chen, Patrick Schaumont
2010/271 (PDF ) Selecting Parameters for Secure McEliece-based Cryptosystems Robert Niebuhr, Mohammed Meziani, Stanislav Bulygin, Johannes Buchmann
2010/270 (PDF ) Factorization of RSA-180 S. A. Danilov, I. A. Popovyan
2010/269 (PDF ) LAB Form for Iterated Hash Functions Xigen Yao
2010/268 (PDF ) Key-Controlled Order-Preserving Encryption HU Mengke, GAO Juntao
2010/267 (PDF ) Two improved authenticated multiple key exchange protocols Feng LIU
2010/266 (PDF ) Multiparty Computation for Modulo Reduction without Bit-Decomposition and A Generalization to Bit-Decomposition Chao Ning, Qiuliang Xu
2010/265 (PDF ) CCA-Secure Unidirectional Proxy Re-Encryption in the Adaptive Corruption Model without Random Oracles Jian Weng, Minrong Chen, Yanjiang Yang, Robert H. Deng, Kefei Chen, Feng Bao
2010/264 (PDF ) Cryptographic Extraction and Key Derivation: The HKDF Scheme Hugo Krawczyk
2010/262 (PDF ) Cube Test Analysis of the Statistical Behavior of CubeHash and Skein Alan Kaminsky
2010/261 (PDF ) Links Between Theoretical and Effective Differential Probabilities: Experiments on PRESENT Céline Blondeau, Benoît Gérard
2010/260 (PDF ) On FPGA-based implementations of Gr\{o}stl Bernhard Jungk, Steffen Reith
2010/259 (PDF ) Bent functions at the minimal distance and algorithms of constructing linear codes for CDMA Andrey V. Pavlov
2010/258 (PDF ) On lower bounds of second-order nonlinearities of cubic bent functions constructed by concatenating Gold functions Ruchi Gode, Sugata Gangopadhyay
2010/257 (PDF ) Feasible Attack on the 13-round AES-256 Alex Biryukov, Dmitry Khovratovich
2010/255 (PDF ) Automorphism group of the set of all bent functions Natalia Tokareva
2010/254 (PDF ) Cryptanalysis of XXTEA Elias Yarrkov
2010/253 (PDF ) Separable Hash Functions Sarang Aravamuthan
2010/252 (PDF ) A supplement to Liu et al.'s certificateless signcryption scheme in the standard model Zhengping Jin, Qiaoyan Wen, Hua Zhang
2010/251 (PDF ) Modeling Attacks on Physical Unclonable Functions Ulrich Rührmair, Frank Sehnke, Jan Sölter, Gideon Dror, Srinivas Devadas, Jürgen Schmidhuber
2010/250 (PDF ) Collusion Free Protocol for Rational Secret Sharing Amjed Shareef
2010/249 (PDF ) Rational Secret Sharing without Broadcast Amjed Shareef
2010/248 (PDF ) Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others Alex Biryukov, Ivica Nikolić
2010/247 (PDF ) A New Joint Fingerprinting and Decryption Scheme based on a Lattice Problem Jia XU
2010/246 (PDF ) Quantifying Trust Mariusz Jakubowski, Ramarathnam Venkatesan, Yacov Yacobi
2010/245 (PDF ) Towards a Theory of Trust Based Collaborative Search Yacov Yacobi
2010/244 (PDF ) Authenticating Aggregate Range Queries over Dynamic Multidimensional Dataset Jia XU
2010/243 (PDF ) Construction of 1-Resilient Boolean Functions with Optimal Algebraic Immunity and Good Nonlinearity Senshan Pan, Xiaotong Fu, Weiguo Zhang
2010/242 (PDF ) Efficient Access Control of Sensitive Data Service in Outsourcing Scenarios Yang ZHANG, Jun-Liang CHEN
2010/241 (PDF ) Improved Delegation of Computation using Fully Homomorphic Encryption Kai-Min Chung, Yael Kalai, Salil Vadhan
2010/240 (PDF ) Weaknesses of a dynamic ID-based remote user authentication scheme He Debiao, Chen Jianhua, Hu Jin
2010/239 (PDF ) One-round and authenticated three-party multiple key exchange protocol from parings Feng LIU
2010/238 (PDF ) Collusion Free Protocol for Correlated Element Selection Problem Amjed Shareef, Akshay Agrawal, C. Pandu Rangan
2010/237 (PDF ) A New Security Model for Authenticated Key Agreement Augustin P. Sarr, Philippe Elbaz–Vincent, Jean–Claude Bajard
2010/236 (PDF ) Accountability: Definition and Relationship to Verifiability Ralf Kuesters, Tomasz Truderung, Andreas Vogt
2010/235 (PDF ) Attribute-based group key establishment Rainer Steinwandt, Adriana Suárez Corona
2010/234 (PDF ) Efficient provable data possession for hybrid clouds Yan Zhu, Huaixi Wang, Zexing Hu, Gail-Joon Ahn, Hongxin Hu, Stephen S. Yau
2010/233 (PDF ) Commuting Signatures and Verifiable Encryption and an Application to Non-Interactively Delegatable Credentials Georg Fuchsbauer
2010/232 (PDF ) On Representable Matroids and Ideal Secret Sharing Ching-Fang Hsu, Qi Cheng
2010/231 (PDF ) Throughput-Optimal Routing in Unreliable Networks Paul Bunn, Rafail Ostrovsky
2010/230 (PDF ) A calculus for game-based security proofs David Nowak, Yu Zhang
2010/229 (PDF ) Concurrent composition in the bounded quantum storage model Dominique Unruh
2010/228 (PDF ) Practical NFC Peer-to-Peer Relay Attack using Mobile Phones Lishoy Francis, Gerhard Hancke, Keith Mayes, Konstantinos Markantonakis
2010/227 (PDF ) A Security Weakness in Composite-Order Pairing-Based Protocols with Imbedding Degree $k>2$ Neal Koblitz
2010/226 (PDF ) Circular and Leakage Resilient Public-Key Encryption Under Subgroup Indistinguishability (or: Quadratic Residuosity Strikes Back) Zvika Brakerski, Shafi Goldwasser
2010/225 (PDF ) A Security Weakness in a Generic Construction of a Group Key Exchange Protocol Junghyun Nam
2010/224 (PDF ) Efficient Implementation of the Orlandi Protocol Extended Version Thomas P. Jakobsen, Marc X. Makkes, Janus Dam Nielsen
2010/223 (PDF ) Improved Differential Attacks for ECHO and Grostl Thomas Peyrin
2010/222 (PDF ) Some Observations on Indifferentiability Ewan Fleischmann, Michael Gorski, Stefan Lucks
2010/221 (PDF ) Solving Generalized Small Inverse Problems Noboru Kunihiro
2010/220 (PDF ) (If) Size Matters: Size-Hiding Private Set Intersection Giuseppe Ateniese, Emiliano De Cristofaro, Gene Tsudik
2010/219 (PDF ) Tracker: Security and Privacy for RFID-based Supply Chains Erik-Oliver Blass, Kaoutar Elkhiyaoui, Refik Molva
2010/217 (PDF ) Secure Code Update for Embedded Devices via Proofs of Secure Erasure Daniele Perito, Gene Tsudik
2010/216 (PDF ) Distinguishing Attacks on MAC/HMAC Based on A New Dedicated Compression Function Framework Zheng Yuan, Xiaoqiu Ren
2010/215 (PDF ) On the q-Strong Diffie-Hellman Problem Naoki Tanaka, Taiichi Saito
2010/214 (PDF ) How to Tell if Your Cloud Files Are Vulnerable to Drive Crashes Kevin D. Bowers, Marten van Dijk, Ari Juels, Alina Oprea, Ronald L. Rivest
2010/213 (PDF ) Composable Security Analysis of OS Services Ran Canetti, Suresh Chari, Shai Halevi, Birgit Pfitzmann, Arnab Roy, Michael Steiner, Wietse Venema
2010/212 (PDF ) Quantum Proofs of Knowledge Dominique Unruh
2010/211 (PDF ) Practical-time Attack on the Full MMB Block Cipher Keting Jia, Jiazhe Chen, Meiqin Wang, Xiaoyun Wang
2010/209 (PDF ) Identity-Based Authenticated Asymmetric Group Key Agreement Protocol Lei Zhang, Qianhong Wu, Bo Qin, Josep Domingo-Ferrer
2010/208 (PDF ) Efficient Implementation of Elliptic Curve Point Operations Using Binary Edwards Curves Richard Moloney, Aidan O'Mahony, Pierre Laurent
2010/207 (PDF ) Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares Koen Simoens, Roel Peeters, Bart Preneel
2010/206 (PDF ) Authentication protocols based on low-bandwidth unspoofable channels: a comparative survey Long Hoang Nguyen, Andrew William Roscoe
2010/205 (PDF ) On Protecting Cryptographic Keys Against Continual Leakage Ali Juma, Yevgeniy Vahlis
2010/204 (PDF ) Certificateless generalized signcryption Ji Huifang, Han Wenbao, Zhao Long
2010/203 (PDF ) Heraclitus: A LFSR-based Stream Cipher with Key Dependent Structure Bernard Colbert, Anthony H. Dekker, Lynn Margaret Batten
2010/202 (PDF ) Robust Combiner for Obfuscators Amir Herzberg, Haya Shulman
2010/200 (PDF ) Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs Markus Rückert, Michael Schneider, Dominique Schröder
2010/199 (PDF ) A Framework for Fully-Simulatable $t$-out-of-$n$ Oblivious Transfer Bing Zeng, Christophe Tartary, Chingfang Hsu
2010/198 (PDF ) The Rebound Attack and Subspace Distinguishers: Application to Whirlpool Mario Lamberger, Florian Mendel, Christian Rechberger, Vincent Rijmen, Martin Schläffer
2010/197 (PDF ) Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts Angelo De Caro, Vincenzo Iovino, Giuseppe Persiano
2010/196 (PDF ) Cryptography Against Continuous Memory Attacks Yevgeniy Dodis, Kristiyan Haralambiev, Adriana Lopez-Alt, Daniel Wichs
2010/195 (PDF ) On E-Vote Integrity in the Case of Malicious Voter Computers Sven Heiberg, Helger Lipmaa, Filip Van Laenen
2010/194 (PDF ) Identity-Based Online/Offline Key Encapsulation and Encryption Sherman S. M. Chow, Joseph K. Liu, Jianying Zhou
2010/193 (PDF ) Speeding Up The Widepipe: Secure and Fast Hashing Mridul Nandi, Souradyuti Paul
2010/192 (PDF ) Non-Transferable Proxy Re-Encryption Scheme for Data Dissemination Control Yi-Jun He, Tat Wing Chim, Lucas Chi Kwong Hui, Siu-Ming Yiu
2010/191 (PDF ) On Designated Verifier Signature Schemes Michal Rjaško, Martin Stanek
2010/190 (PDF ) J-PAKE: Authenticated Key Exchange Without PKI Feng Hao, Peter Ryan
2010/189 (PDF ) New generic algorithms for hard knapsacks Nick Howgrave-Graham, Antoine Joux
2010/188 (PDF ) Cryptographic Role-based Security Mechanisms based on Role-Key Hierarchy Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Huaixi Wang
2010/187 (PDF ) Certificateless Signcryption without Pairing Wenjian Xie, Zhang Zhang
2010/186 (PDF ) New software speed records for cryptographic pairings Michael Naehrig, Ruben Niederhagen, Peter Schwabe
2010/185 (PDF ) New Methods to Construct Golay Complementary Sequences Over the $QAM$ Constellation Wenping Ma, Chen Yang, Shaohui Sun
2010/183 (PDF ) Preventing Pollution Attacks in Multi-Source Network Coding Shweta Agrawal, Dan Boneh, Xavier Boyen, David Mandell Freeman
2010/182 (PDF ) A Simple BGN-type Cryptosystem from LWE Craig Gentry, Shai Halevi, Vinod Vaikuntanathan
2010/181 (PDF ) Cryptanalysis of a DoS-resistant ID-based password authentication He Debiao, Chen Jianhua, Hu Jin
2010/180 (PDF ) The World is Not Enough: Another Look on Second-Order DPA Francois-Xavier Standaert, Nicolas Veyrat-Charvillon, Elisabeth Oswald, Benedikt Gierlichs, Marcel Medwed, Markus Kasper, Stefan Mangard
2010/179 (PDF ) A Class of 1-Resilient Function with High Nonlinearity and Algebraic Immunity Ziran Tu, Yingpu Deng
2010/178 (PDF ) Identity Based Online/Offline Encryption Scheme Sharmila Deva Selvi S, Sree Vivek S, Pandu Rangan C
2010/177 (PDF ) On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields Robert Granger
2010/176 (PDF ) A Comparison of Cryptanalytic Tradeoff Algorithms Jin Hong, Sunghwan Moon
2010/175 (PDF ) Sanitizable signatures with strong transparency in the standard model Shivank Agrawal, Swarun Kumar, Amjed Shareef, C. Pandu Rangan
2010/174 (PDF ) A Reflection on the Security of Two-Party Key Establishment Protocols Qiang Tang
2010/173 (PDF ) Compact Implementations of BLAKE-32 and BLAKE-64 on FPGA Jean-Luc Beuchat, Eiji Okamoto, Teppei Yamazaki
2010/172 (PDF ) Chosen Ciphertext Secure Encryption over Semi-smooth Subgroup Qixiang Mei, Bao Li, Xianhui Lu, Dingding Jia
2010/171 (PDF ) On Foundation and Construction of Physical Unclonable Functions Jiang Wu, Maire O'Neill
2010/170 (PDF ) On a conjecture about binary strings distribution Jean-Pierre Flori, Hugues Randriambololona, Gérard Cohen, Sihem Mesnager
2010/169 (PDF ) Dismantling SecureMemory, CryptoMemory and CryptoRF Flavio D. Garcia, Peter van Rossum, Roel Verdult, Ronny Wichers Schreur
2010/168 (PDF ) A Meet-in-the-Middle Attack on ARIA Xuehai Tang, Bing Sun, Ruilin Li, Chao Li
2010/167 (PDF ) Evolutionary Cipher against Differential Power Attack Tang ming, Meng Qinshu, Zhang Huanguo, Gao Si, Dou Qin, Shen Fei, Li Du
2010/166 (PDF ) Fault Analysis Study of the Block Cipher FOX64 Ruilin Li, Jianxiong You, Bing Sun, Chao Li
2010/165 (PDF ) Comment on four two-party authentication protocols Yalin Chen, Jue-Sam Chou, Chun-Hui Huang
2010/164 (PDF ) Black-Box Constructions of Protocols for Secure Computation Iftach Haitner, Yuval Ishai, Eyal Kushilevitz, Yehuda Lindell, Erez Petrank
2010/163 (PDF ) Golay Complementary Sequences Over the QAM Constellation Wenping Ma, Chen Yang, Shaohui Sun
2010/162 (PDF ) 1024XKS - A High Security Software Oriented Block Cipher Revisited Dieter Schmidt
2010/161 (PDF ) Stange's Elliptic Nets and Coxeter Group F4 Daniel R. L. Brown
2010/160 (PDF ) A Flaw in The Internal State Recovery Attack on ALPHA-MAC Shengbao Wu, Mingsheng Wang, Zheng Yuan
2010/159 (PDF ) Identity-Based Encryption Secure against Selective Opening Attack Mihir Bellare, Brent Waters, Scott Yilek
2010/158 (PDF ) A variant of the F4 algorithm Antoine Joux, Vanessa Vitse
2010/157 (PDF ) Elliptic Curve Discrete Logarithm Problem over Small Degree Extension Fields. Application to the static Diffie-Hellman problem on $E(\F_{q^5})$ Antoine Joux, Vanessa Vitse
2010/156 (PDF ) Genus 2 Curves with Complex Multiplication Eyal Z. Goren, Kristin E. Lauter
2010/155 (PDF ) the upper bounds on differntial characteristics in block cipher SMS4 Zhang MeiLing, Liu JingMei, Wang XinMei
2010/154 (PDF ) Efficient Public-Key Cryptography in the Presence of Key Leakage Yevgeniy Dodis, Kristiyan Haralambiev, Adriana Lopez-Alt, Daniel Wichs
2010/153 (PDF ) Founding Cryptography on Tamper-Proof Hardware Tokens Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam Venkatesan, Akshay Wadia
2010/152 (PDF ) Secure and Fast Implementations of Two Involution Ciphers Billy Bob Brumley
2010/151 (PDF ) Ring signature with divided private key Stelian Flonta, Liviu-Cristian Miclea
2010/150 (PDF ) Black-Box Computational Zero-Knowledge Proofs, Revisited: The Simulation-Extraction Paradigm Mohammad Sadeq Dousti
2010/149 (PDF ) On Small Subgroup Non-confinement Attack Feng Hao
2010/148 (PDF ) Comments on five smart card based password authentication protocols Yalin Chen, Jue-Sam Chou, Chun-Hui Huang
2010/147 (PDF ) A New Framework for Password-Based Authenticated Key Exchange Adam Groce, Jonathan Katz
2010/146 (PDF ) Some Applications of Lattice Based Root Finding Techniques Santanu Sarkar, Subhamoy Maitra
2010/145 (PDF ) i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits Craig Gentry, Shai Halevi, Vinod Vaikuntanathan
2010/144 (PDF ) New Definitions and Separations for Circular Security David Cash, Matthew Green, Susan Hohenberger
2010/143 (PDF ) Small Scale Variants Of The Block Cipher PRESENT Gregor Leander
2010/142 (PDF ) Mean value formulas for twisted Edwards curves Dustin Moody
2010/140 (PDF ) Improved Agreeing-Gluing Algorithm Igor Semaev
2010/139 (PDF ) A New Class of Public Key Cryptosystems Constructed Based on Perfect Error-Correcting Codes Realizing Coding Rate of Exactly 1.0 Masao Kasahara
2010/138 (PDF ) On the Security of a Novel Remote User Authentication Scheme using Smart Card based on ECDLP Manoj Kumar
2010/137 (PDF ) Estimating the Security of Lattice-based Cryptosystems Markus Rückert, Michael Schneider
2010/136 (PDF ) On Robust Key Agreement Based on Public Key Authentication Feng Hao
2010/135 (PDF ) On The Broadcast and Validity-Checking Security of PKCS \#1 v1.5 Encryption Aurélie Bauer, Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Damien Vergnaud
2010/134 (PDF ) Barreto-Naehrig Curve With Fixed Coefficient - Efficiently Constructing Pairing-Friendly Curves - Masaaki Shirase
2010/133 (PDF ) Signing on Elements in Bilinear Groups for Modular Protocol Design Masayuki Abe, Kristiyan Haralambiev, Miyako Ohkubo
2010/132 (PDF ) On the claimed privacy of EC-RAC III Junfeng Fan, Jens Hermans, Frederik Vercauteren
2010/131 (PDF ) Multi-property-preserving Domain Extension Using Polynomial-based Modes of Operation Jooyoung Lee, John Steinberger
2010/130 (PDF ) Low Voltage Fault Attacks to AES and RSA on General Purpose Processors Alessandro Barenghi, Guido Bertoni, Luca Breveglieri, Mauro Pellicioli, Gerardo Pelosi
2010/129 (PDF ) Relation for Algebraic Attack on E0 combiner N. Rajesh Pillai, S. S. Bedi, Sanjay Kumar, Roopika Chaudhary
2010/126 (PDF ) On the Security of an Efficient Mobile Authentication Scheme for Wireless Networks Jian-zhu Lu, Jipeng Zhou
2010/125 (PDF ) Cryptographic Aspects of Real Hyperelliptic Curves M. J. Jacobson Jr., R. Scheidler, A. Stein
2010/124 (PDF ) A Hardware Wrapper for the SHA-3 Hash Algorithms Brian Baldwin, Andrew Byrne, Liang Lu, Mark Hamilton, Neil Hanley, Maire O'Neill, William P. Marnane
2010/123 (PDF ) Delaying Mismatched Field Multiplications in Pairing Computations Craig Costello, Colin Boyd, Juan Manuel Gonzalez Nieto, Kenneth Koon-Ho Wong
2010/122 (PDF ) Security of Encryption Schemes in Weakened Random Oracle Models Akinori Kawachi, Akira Numayama, Keisuke Tanaka, Keita Xagawa
2010/120 (PDF ) Universal One-Way Hash Functions and Average Case Complexity via Inaccessible Entropy Iftach Haitner, Thomas Holenstein, Omer Reingold, Salil Vadhan, Hoeteck Wee
2010/118 (PDF ) Proposal of a Signature Scheme based on STS Trapdoor Shigeo Tsujii, Masahito Gotaishi, Kohtaro Tadaki, Ryou Fujita
2010/117 (PDF ) Cryptographic Agility and its Relation to Circular Encryption Tolga Acar, Mira Belenkiy, Mihir Bellare, David Cash
2010/116 (PDF ) Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator M. Abdelaziz Elaabid, Sylvain Guilley
2010/115 (PDF ) A Security Evaluation of DNSSEC with NSEC3 Jason Bau, John C Mitchell
2010/114 (PDF ) The Discrete Logarithm Problem Modulo One: Cryptanalysing the Ariffin--Abu cryptosystem Simon R. Blackburn
2010/113 (PDF ) Cryptanalysis of Two Efficient HIBE Schemes in the Standard Model Xu An Wang, Xiaoyuan Yang
2010/112 (PDF ) CCA-Secure PRE Scheme without Random Oracles Jun Shao, Zhenfu Cao, Peng Liu
2010/111 (PDF ) On zero practical significance of “"Key recovery attack on full GOST block cipher with zero time and memory”" Vladimir Rudskoy
2010/110 (PDF ) Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption Allison Lewko, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima, Brent Waters
2010/109 (PDF ) Practical Adaptive Oblivious Transfer from Simple Assumptions Matthew Green, Susan Hohenberger
2010/108 (PDF ) Perfectly Secure Oblivious RAM Without Random Oracles Ivan Damgård, Sigurd Meldgaard, Jesper Buus Nielsen
2010/107 (PDF ) Adaptive Concurrent Non-Malleability with Bare Public-Keys Andrew C. Yao, Moti Yung, Yunlei Zhao
2010/106 (PDF ) Perfectly Secure Multiparty Computation and the Computational Overhead of Cryptography Ivan Damgård, Yuval Ishai, Mikkel Krøigaard
2010/105 (PDF ) Bias in the nonlinear filter generator output sequence Sui-Guan Teo, Leonie Simpson, Ed Dawson
2010/104 (PDF ) Avoiding Full Extension Field Arithmetic in Pairing Computations Craig Costello, Colin Boyd, Juan Manuel Gonzalez Nieto, Kenneth Koon-Ho Wong
2010/103 (PDF ) The Extended Access Control for Machine Readable Travel Documents Rafik Chaabouni, Serge Vaudenay
2010/102 (PDF ) Constructing Verifiable Random Functions with Large Input Spaces Susan Hohenberger, Brent Waters
2010/101 (PDF ) Fair Blind Signatures without Random Oracles Georg Fuchsbauer, Damien Vergnaud
2010/100 (PDF ) Correlated Product Security From Any One-Way Function and the New Notion of Decisional Correlated Product Security Brett Hemenway, Steve Lu, Rafail Ostrovsky
2010/099 (PDF ) On Homomorphic Encryption and Chosen-Ciphertext Security Brett Hemenway, Rafail Ostrovsky
2010/098 (PDF ) A Zero-One Law for Deterministic 2-Party Secure Computation Hemanta K. Maji, Manoj Prabhakaran, Mike Rosulek
2010/097 (PDF ) Parallel Enumeration of Shortest Lattice Vectors Özgür Dagdelen, Michael Schneider
2010/096 (PDF ) Secret Sharing Extensions based on the Chinese Remainder Theorem Kamer Kaya, Ali Aydın Selçuk
2010/095 (PDF ) Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR Kenneth G. Paterson, Gaven J. Watson
2010/094 (PDF ) A Random Number Generator Based on Isogenies Operations He Debiao, Chen Jianhua, Hu Jin
2010/093 (PDF ) New Impossible Differential Attacks on AES Zheng Yuan
2010/092 (PDF ) Security Weaknesses in Two Certificateless Signcryption Schemes S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
2010/091 (PDF ) Distinguishers for the Compression Function and Output Transformation of Hamsi-256 Jean-Philippe Aumasson, Emilia Käsper, Lars Ramkilde Knudsen, Krystian Matusiewicz, Rune Odegaard, Thomas Peyrin, Martin Schläffer
2010/090 (PDF ) Solving a 676-bit Discrete Logarithm Problem in GF(3^{6n}) Takuya Hayashi, Naoyuki Shinohara, Lihua Wang, Shin'ichiro Matsuo, Masaaki Shirase, Tsuyoshi Takagi
2010/089 (PDF ) Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography Vipul Goyal, Yuval Ishai, Mohammad Mahmoody, Amit Sahai
2010/088 (PDF ) An Efficient and Parallel Gaussian Sampler for Lattices Chris Peikert
2010/087 (PDF ) MQ^*-IP: An Identity-based Identification Scheme without Number-theoretic Assumptions Christopher Wolf, Bart Preneel
2010/086 (PDF ) A Framework for Efficient Signatures, Ring Signatures and Identity Based Encryption in the Standard Model Zvika Brakerski, Yael Tauman Kalai
2010/085 (PDF ) Pair-wise Cryptographic Models for Secure Data Exchange in P2P Database Management Systems Sk. Md. Mizanur Rahman, Mehedi Masud, Carlisle Adams, Khalil El-Khatib, Hussein Mouftah, Eiji Okamoto
2010/084 (PDF ) Attribute-based Authenticated Key Exchange M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto
2010/083 (PDF ) One Round Group Key Exchange with Forward Security in the Standard Model M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto
2010/082 (PDF ) Predicate-Based Key Exchange James Birkett, Douglas Stebila
2010/081 (PDF ) The Eris hybrid cipher Sandy Harris
2010/080 (PDF ) Secrecy-Oriented First-Order Logical Analysis of Cryptographic Protocols Gergei Bana, Koji Hasebe, Mitsuhiro Okada
2010/079 (PDF ) From Dust to Dawn: Practically Efficient Two-Party Secure Function Evaluation Protocols and their Modular Design Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
2010/078 (PDF ) Multiple Bytes Differential Fault Analysis on CLEFIA Xin-jie ZHAO, Tao WANG, Jing-zhe GAO
2010/077 (PDF ) ECC2K-130 on Cell CPUs Joppe W. Bos, Thorsten Kleinjung, Ruben Niederhagen, Peter Schwabe
2010/076 (PDF ) Private and Continual Release of Statistics T-H. Hubert Chan, Elaine Shi, Dawn Song
2010/075 (PDF ) A New Scheme for Zero Knowledge Proof based on Multivariate Quadratic Problem and Quaternion Algebra Mehdi Vasef
2010/074 (PDF ) Concurrent Knowledge Extraction in the Public-Key Model Andrew C. Yao, Moti Yung, Yunlei Zhao
2010/073 (PDF ) Related-Key Boomerang Attack on Block Cipher SQUARE Bonwook Koo, Yongjin Yeom, Junghwan Song
2010/072 (PDF ) Approximating Addition by XOR: how to go all the way Didier Alquié
2010/071 (PDF ) 2-round Substitution-Permutation and 3-round Feistel Networks have bad Algebraic Degree Didier Alquié
2010/070 (PDF ) Strongly Unforgeable Signatures and Hierarchical Identity-based Signatures from Lattices without Random Oracles Markus Rückert
2010/069 (PDF ) Type-II Optimal Polynomial Bases Daniel J. Bernstein, Tanja Lange
2010/068 (PDF ) Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead Rosario Gennaro, Hugo Krawczyk, Tal Rabin
2010/067 (PDF ) A Pairing-Based DAA Scheme Further Reducing TPM Resources Ernie Brickell, Jiangtao Li
2010/066 (PDF ) Some Observations on TWIS Block Cipher Bozhan Su, Wenling Wu, Lei Zhang, Yanjun Li
2010/065 (PDF ) An Anonymous ID-based Encryption Revisited Zhengjun Cao
2010/064 (PDF ) New Advances on Privacy-Preserving Policy Reconciliation Ulrike Meyer, Susanne Wetzel, Sotiris Ioannidis
2010/063 (PDF ) Differential Fault Analysis on SMS4 Using a Single Fault Ruilin Li, Bing Sun, Chao Li, Jianxiong You
2010/062 (PDF ) Differential Cryptanalysis of SMS4 Block Cipher Bozhan Su, Wenling Wu, Wentao Zhang
2010/061 (PDF ) Privacy-Preserving Matching Protocols for Attributes and Strings Pu Duan, Sanmin Liu, Weiqin Ma, Guofei Gu, Jyh-Charn Liu
2010/060 (PDF ) Insecure ``Provably Secure Network Coding'' and Homomorphic Authentication Schemes for Network Coding Yongge Wang
2010/059 (PDF ) A New Framework for RFID Privacy Robert H. Deng, Yingjiu Li, Andrew C. Yao, Moti Yung, Yunlei Zhao
2010/058 (PDF ) Solinas primes of small weight for fixed sizes José de Jesús Angel Angel, Guillermo Morales-Luna
2010/057 (PDF ) Message Recovery and Pseudo-Preimage Attacks on the Compression Function of Hamsi-256 Cagdas Calik, Meltem Sonmez Turan
2010/056 (PDF ) Improved Cache Trace Attack on AES and CLEFIA by Considering Cache Miss and S-box Misalignment Xin-jie ZHAO, Tao WANG
2010/055 (PDF ) Credential Authenticated Identification and Key Exchange Jan Camenisch, Nathalie Casati, Thomas Gross, Victor Shoup
2010/054 (PDF ) An Improved Timing Attack with Error Detection on RSA-CRT Cai-Sen CHEN, Tao Wang, Jun-Jian Tian
2010/053 (PDF ) Logical cryptoanalysis on the example of the cryptosystem DES A. D. Plotnikov
2010/051 (PDF ) A Principle for Cryptographic Protocols Beyond Security, Less Parameters Zhengjun Cao
2010/050 (PDF ) Authenticating Aggregate Range Queries over Multidimensional Dataset Jia XU, Ee-Chien CHANG
2010/049 (PDF ) On Symmetric Encryption and Point Obfuscation Ran Canetti, Yael Tauman Kalai, Mayank Varia, Daniel Wichs
2010/047 (PDF ) Lower Bounds for Straight Line Factoring Daniel R. L. Brown
2010/043 (PDF ) Differential and invertibility properties of BLAKE (full version) Jean-Philippe Aumasson, Jian Guo, Simon Knellwolf, Krystian Matusiewicz, Willi Meier
2010/042 (PDF ) A modified eCK model with stronger security for tripartite authenticated key exchange Qingfeng Cheng, Chuangui Ma, Fushan Wei
2010/041 (PDF ) The Effects of the Omission of Last Round's MixColumns on AES Orr Dunkelman, Nathan Keller
2010/040 (PDF ) Batch Groth-Sahai Olivier Blazy, Georg Fuchsbauer, Malika Izabachène, Amandine Jambert, Hervé Sibert, Damien Vergnaud
2010/039 (PDF ) On Exponential Sums, Nowton identities and Dickson Polynomials over Finite Fields Xiwang Cao, Lei Hu
2010/038 (PDF ) Fault Resistant RSA Signatures: Chinese Remaindering in Both Directions Arnaud Boscher, Helena Handschuh, Elena Trichina
2010/037 (PDF ) Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves Pierre-Alain Fouque, Mehdi Tibouchi
2010/035 (PDF ) Between Hashed DH and Computational DH: Compact Encryption from Weaker Assumption Goichiro Hanaoka, Kaoru Kurosawa
2010/034 (PDF ) On the order of the polynomial $x^p-x-a$ Xiwang Cao
2010/033 (PDF ) Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model Kristiyan Haralambiev, Tibor Jager, Eike Kiltz, Victor Shoup
2010/032 (PDF ) An Information Theoretic Perspective on the Differential Fault Analysis against AES Yang Li, Shigeto Gomisawa, Kazuo Sakiyama, Kazuo Ohta
2010/031 (PDF ) Class Invariants by the CRT Method Andreas Enge, Andrew V. Sutherland
2010/030 (PDF ) On the Complexity of the Herding Attack and Some Related Attacks on Hash Functions Simon R. Blackburn, Douglas R. Stinson, Jalaj Upadhyay
2010/029 (PDF ) On Achieving the "Best of Both Worlds" in Secure Multiparty Computation Yuval Ishai, Jonathan Katz, Eyal Kushilevitz, Yehuda Lindell, Erez Petrank
2010/028 (PDF ) A secure anonymous communication scheme in vehicular ad hoc networks from pairings Jue-Sam Chou, Yalin Chen
2010/027 (PDF ) A novel k-out-of-n Oblivious Transfer Protocols Based on Bilinear Pairings Yalin Chen, Jue-Sam Chou, Xian-Wu Hou
2010/026 (PDF ) Further Improved Differential Fault Analysis on Camellia by Exploring Fault Width and Depth Xin-jie Zhao, Tao Wang
2010/025 (PDF ) New Methodologies for Differential-Linear Cryptanalysis and Its Extensions Jiqiang Lu
2010/024 (PDF ) Authentication schemes from actions on graphs, groups, or rings Dima Grigoriev, Vladimir Shpilrain
2010/023 (PDF ) Differential Fault Analysis on AES with 192 and 256-Bit Keys Junko Takahashi, Toshinori Fukunaga
2010/022 (PDF ) Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu
2010/021 (PDF ) A note on ``Improved Fast Correlation Attacks on Stream Ciphers" Kitae Jeong, Yuseop Lee, Jaechul Sung, Seokhie Hong
2010/020 (PDF ) Number of Jacobi quartic curves over finite fields Rongquan Feng, Hongfeng Wu
2010/019 (PDF ) Related-Key Boomerang and Rectangle Attacks Jongsung Kim, Seokhie Hong, Bart Preneel, Eli Biham, Orr Dunkelman, Nathan Keller
2010/018 (PDF ) Scalability and Security Conflict for RFID Authentication Protocols Imran Erguler, Emin Anarim
2010/017 (PDF ) A new one-time signature scheme from syndrome decoding Paulo S. L. M. Barreto, Rafael Misoczki
2010/016 (PDF ) Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2 Jian Guo, San Ling, Christian Rechberger, Huaxiong Wang
2010/015 (PDF ) Towards Side-Channel Resistant Block Cipher Usage or Can We Encrypt Without Side-Channel Countermeasures? Jorge Guajardo, Bart Mennink
2010/014 (PDF ) A Unified Method for Improving PRF Bounds for a Class of Blockcipher based MACs Mridul Nandi
2010/013 (PDF ) A Practical-Time Attack on the A5/3 Cryptosystem Used in Third Generation GSM Telephony Orr Dunkelman, Nathan Keller, Adi Shamir
2010/012 (PDF ) Differential Cache Trace Attack Against CLEFIA Chester Rebeiro, Debdeep Mukhopadhyay
2010/010 (PDF ) Evaluation of Hardware Performance for the SHA-3 Candidates Using SASEBO-GII Kazuyuki Kobayashi, Jun Ikegami, Shin’ichiro Matsuo, Kazuo Sakiyama, Kazuo Ohta
2010/009 (PDF ) The Lower Bounds on the Second Order Nonlinearity of Cubic Boolean Functions Xuelian Li, Yupu Hu, Juntao Gao
2010/008 (PDF ) A DAA Scheme Requiring Less TPM Resources Liqun Chen
2010/007 (PDF ) Efficient Asynchronous Verifiable Secret Sharing and Multiparty Computation Arpita Patra, Ashish Choudhary, C. Pandu Rangan
2010/006 (PDF ) Factorization of a 768-bit RSA modulus Thorsten Kleinjung, Kazumaro Aoki, Jens Franke, Arjen Lenstra, Emmanuel Thomé, Joppe Bos, Pierrick Gaudry, Alexander Kruppa, Peter Montgomery, Dag Arne Osvik, Herman te Riele, Andrey Timofeev, Paul Zimmermann
2010/005 (PDF ) Skew-Frobenius map on twisted Edwards curve Mingqiang Wang, Xiaoyun Wang, Tao Zhan, Yuliang Zheng
2010/004 (PDF ) Halving on Binary Edwards Curves Qiping Lin, Fangguo Zhang
2010/003 (PDF ) Efficient Online/Offline Identity-Based Signature for Wireless Sensor Network Joseph K. Liu, Joonsang Baek, Jianying Zhou, Yanjiang Yang, Jun Wen Wong
2010/002 (PDF ) Practical ID-based Encryption for Wireless Sensor Network Cheng-Kang Chu, Joseph K. Liu, Jianying Zhou, Feng Bao, Robert H. Deng
2010/001 (PDF ) Transfinite Cryptography Jacques Patarin
2009/637 (PDF ) Efficient Characteristic Set Algorithms for Equation Solving in Finite Fields and Application in Analysis of Stream Ciphers Xiao-shan Gao, Zhenyu Huang
2009/636 (PDF ) Obtaining More Karatsuba-Like Formulae over The Binary Field Haining Fan, Ming Gu, Jiaguang Sun, Kwok-Yan Lam
2009/635 (PDF ) Flexible Quasi-Dyadic Code-Based Public-Key Encryption and Signature Kazukuni Kobara
2009/634 (PDF ) Attacks on Hash Functions based on Generalized Feistel - Application to Reduced-Round Lesamnta and SHAvite-3_{512} Charles Bouillaguet, Orr Dunkelman, Gaëtan Leurent, Pierre-Alain Fouque
2009/633 (PDF ) Traitor-Tracing on Binary Strings Michael J. Collins
2009/632 (PDF ) Cryptanalysis of Secure Message Transmission Protocols with Feedback Qiushi Yang, Yvo Desmedt
2009/631 (PDF ) Improvement of Das's Two-Factor Authentication Protocol in Wireless Sensor Networks DaeHun Nyang, Mun-Kyu Lee
2009/630 (PDF ) Information-Theoretically Secure Protocols and Security Under Composition Eyal Kushilevitz, Yehuda Lindell, Tal Rabin
2009/629 (PDF ) A Comparative Analysis of Delay Based PUF Implementations on FPGA Sergey Morozov, Abhranil Maiti, Patrick Schaumont
2009/628 (PDF ) Using Sphinx to Improve Onion Routing Circuit Construction Aniket Kate, Ian Goldberg
2009/627 (PDF ) A Unified Method for Finding Impossible Differentials of Block Cipher Structures Yiyuan Luo, Zhongming Wu, Xuejia Lai, Guang Gong
2009/626 (PDF ) Approximate Integer Common Divisor Problem relates to Implicit Factorization Santanu Sarkar, Subhamoy Maitra
2009/625 (PDF ) Cryptographic Accumulators for Authenticated Hash Tables Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos
2009/624 (PDF ) Security Analysis of the PACE Key-Agreement Protocol Jens Bender, Marc Fischlin, Dennis Kuegler
2009/623 (PDF ) Universally Constructing 12-th Degree Extension Field for Ate Pairing Masaaki Shirase
2009/622 (PDF ) A Strong Blind Signature Scheme over Braid Groups WEI Yun, XIONG Guo-Hua, BAO Wan-Su, ZHANG Xing-Kai
2009/621 (PDF ) On the Analysis of Cryptographic Assumptions in the Generic Ring Model Tibor Jager, Jörg Schwenk
2009/620 (PDF ) Security of ECQV-Certified ECDSA Against Passive Adversaries Daniel R. L. Brown, Matthew J. Campagna, Scott A. Vanstone
2009/619 (PDF ) A Family of Weak Keys in HFE (and the Corresponding Practical Key-Recovery) Charles Bouillaguet, Pierre-Alain Fouque, Antoine Joux, Joana Treger
2009/618 (PDF ) Data-Depend Hash Algorithm ZiJie Xu, Ke Xu
2009/617 (PDF ) An efficient ID- based directed signature scheme from bilinear pairings B. Umaprasada Rao, P. Vasudeva Reddy, T. Gowri
2009/616 (PDF ) Fully Homomorphic Encryption over the Integers Marten van Dijk, Craig Gentry, Shai Halevi, Vinod Vaikuntanathan
2009/615 (PDF ) Faster Pairing Computations on Curves with High-Degree Twists Craig Costello, Tanja Lange, Michael Naehrig
2009/614 (PDF ) Secure Multiparty AES (full paper) Ivan Damgård, Marcel Keller
2009/613 (PDF ) Classification of Elliptic/hyperelliptic Curves with Weak Coverings against GHS Attack without Isogeny Condition Tsutomu Iijima, Fumiyuki Momose, Jinhui Chao
2009/612 (PDF ) On the Impossibility of Batch Update for Cryptographic Accumulators Philippe Camacho, Alejandro Hevia
2009/611 (PDF ) Golden Fish: An Intelligent Stream Cipher Fuse Memory Modules Lan Luo, QiongHai Dai, ZhiGuang Qin, ChunXiang Xu
2009/610 (PDF ) Security Analysis of A Remote User Authentication Protocol by Liao and Wang Dang Nguyen Duc, Kwangjo Kim
2009/609 (PDF ) Grouping-Proof Protocol for RFID Tags: Security Definition and Scalable Construction Dang Nguyen Duc, Kwangjo Kim
2009/608 (PDF ) Non-Malleable Codes Stefan Dziembowski, Krzysztof Pietrzak, Daniel Wichs
2009/606 (PDF ) On a weakness of the Tu-Deng function and its repair Claude Carlet
2009/605 (PDF ) Solving the Shortest Lattice Vector Problem in Time 2^2.465n Xavier Pujol, Damien Stehle
2009/604 (PDF ) Composition of Zero-Knowledge Proofs with Efficient Provers Eleanor Birrell, Salil Vadhan
2009/603 (PDF ) An FPGA Technologies Area Examination of the SHA-3 Hash Candidate Implementations Brian Baldwin, William P. Marnane
2009/602 (PDF ) Secure Ranging With Message Temporal Integrity Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Srdjan Čapkun
2009/601 (PDF ) Parallel Shortest Lattice Vector Enumeration on Graphics Cards Jens Hermans, Michael Schneider, Johannes Buchmann, Frederik Vercauteren, Bart Preneel
2009/600 (PDF ) Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement D. Fiore, R. Gennaro, N. P. Smart
2009/599 (PDF ) Groth--Sahai proofs revisited E. Ghadafi, N. P. Smart, B. Warinschi
2009/598 (PDF ) On the Design and Implementation of an Efficient DAA Scheme L. Chen, D. Page, N. P. Smart
2009/597 (PDF ) Twisted Jacobi Intersections Curves Rongquan Feng, Menglong Nie, Hongfeng Wu
2009/596 (PDF ) Could SFLASH be repaired? Jintai Ding, Vivien Dubois, Bo-Yin Yang, Owen Chia-Hsin Chen, Chen-Mou Cheng
2009/595 (PDF ) Efficiency Limitations for $\Sigma$-Protocols for Group Homomorphisms Endre Bangerter, Jan Camenisch, Stephan Krenn
2009/594 (PDF ) Efficient Set Operations in the Presence of Malicious Adversaries Carmit Hazay, Kobbi Nissim
2009/593 (PDF ) Enabling Efficient Fuzzy Keyword Search over Encrypted Data in Cloud Computing Jin Li, Qian Wang, Cong Wang, Ning Cao, Kui Ren, Wenjing Lou
2009/592 (PDF ) From Passive to Covert Security at Low Cost Ivan Damgård, Martin Geisler, Jesper Buus Nielsen
2009/591 (PDF ) Embedded SFE: Offloading Server and Network using Hardware Tokens Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
2009/590 (PDF ) More Constructions of Lossy and Correlation-Secure Trapdoor Functions David Mandell Freeman, Oded Goldreich, Eike Kiltz, Alon Rosen, Gil Segev
2009/589 (PDF ) Information-set decoding for linear codes over Fq Christiane Peters
2009/588 (PDF ) Confidential Signatures and Deterministic Signcryption Alexander W. Dent, Marc Fischlin, Mark Manulis, Martijn Stam, Dominique Schroder
2009/587 (PDF ) Poly-Dragon: An efficient Multivariate Public Key Cryptosystem Rajesh P. Singh, A. Saikia, B. K. Sarma
2009/586 (PDF ) A mean value formula for elliptic curves Rongquan Feng, Hongfeng Wu
2009/585 (PDF ) An Improved Differential Fault Attack on Camellia ZHAO Xin-jie, WANG Tao
2009/584 (PDF ) Scan-based Attacks on Linear Feedback Shift Register Based Stream Ciphers Yu Liu, Kaijie Wu, Ramesh Karri
2009/583 (PDF ) Differential-Algebraic Algorithms for the Isomorphism of Polynomials Problem Charles Bouillaguet, Jean-Charles Faugère, Pierre-Alain Fouque, Ludovic Perret
2009/582 (PDF ) A Game-Based Definition of Coercion-Resistance and its Applications Ralf Kuesters, Tomasz Truderung, Andreas Vogt
2009/581 (PDF ) A Diagonal Fault Attack on the Advanced Encryption Standard Dhiman Saha, Debdeep Mukhopadhyay, Dipanwita RoyChowdhury
2009/580 (PDF ) A complete set of addition laws\\for incomplete Edwards curves Daniel J. Bernstein, Tanja Lange
2009/579 (PDF ) Privacy-Preserving Public Auditing for Secure Cloud Storage Cong Wang, Sherman S. -M. Chow, Qian Wang, Kui Ren, Wenjing Lou
2009/578 (PDF ) Efficient and Provably Secure Certificateless Signcryption from Bilinear Maps Wenjian Xie, Zhang Zhang
2009/577 (PDF ) On the nonlinearity profile of the Dillon function Claude Carlet
2009/576 (PDF ) Public-Key Cryptographic Primitives Provably as Secure as Subset Sum Vadim Lyubashevsky, Adriana Palacio, Gil Segev
2009/575 (PDF ) Differential Fault Analysis of the Advanced Encryption Standard using a Single Fault Michael Tunstall, Debdeep Mukhopadhyay
2009/574 (PDF ) Voting with unconditional privacy: CFSY for booth voting Jeroen van de Graaf
2009/573 (PDF ) New Addition Operation and Its Application for Scalar Multiplication on Hessian Curves over Prime Fields Leibo Li, Mingqiang Wang, Zhanjiang Xia
2009/571 (PDF ) Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes N. P. Smart, F. Vercauteren
2009/570 (PDF ) Achieving Oblivious Transfer Capacity of Generalized Erasure Channels in the Malicious Model Adriana C. B. Pinto, Rafael Dowsley, Kirill Morozov, Anderson C. A. Nascimento
2009/569 (PDF ) Secure Network Coding Over the Integers Rosario Gennaro, Jonathan Katz, Hugo Krawczyk, Tal Rabin
2009/568 (PDF ) Ephemeral key compromise attack on the IB-KA protocol Qingfeng Cheng, Chuangui Ma
2009/567 (PDF ) Properties of the Discrete Differential with Cryptographic Applications Daniel Smith-Tone
2009/566 (PDF ) New Cryptosystems From CSP-Based Self-Distributive Systems Licheng Wang, Lihua Wang, Zhenfu Cao, Eiji Okamoto, Jun Shao
2009/565 (PDF ) Faster Squaring in the Cyclotomic Subgroup of Sixth Degree Extensions Robert Granger, Michael Scott
2009/564 (PDF ) Optimal pairing revisited Mingqiang Wang, Puwen Wei, Haifeng Zhang, Yuliang Zheng
2009/563 (PDF ) A Family of $p$-ary Binomial Bent Functions Dabin Zheng, Xiangyong Zeng, Lei Hu
2009/562 (PDF ) How to pair with a human Stefan Dziembowski
2009/561 (PDF ) Improvements on two password-based authentication protocols Yalin Chen, Jue-Sam Chou, Chun-Hui Huang
2009/560 (PDF ) On the Security Vulnerabilities of a Hash Based Strong Password Authentication Scheme Manoj Kumar
2009/559 (PDF ) New Integral Distinguisher for Rijndael-256 Yuechuan Wei, Bing Sun, Chao Li
2009/556 (PDF ) Constructing Tower Extensions for the implementation of Pairing-Based Cryptography Naomi Benger, Michael Scott
2009/554 (PDF ) ON A COMBINATORIAL CONJECTURE T. W. CUSICK, YUAN LI, PANTELIMON STANICA
2009/553 (PDF ) Cryptanalysis of a key exchange scheme based on block matrices Maria Isabel Gonzalez Vasco, Angel L. Perez del Pozo, Pedro Taborda Duarte
2009/552 (PDF ) Preimage Attacks on Reduced DHA-256 Jinmin Zhong, Xuejia Lai
2009/551 (PDF ) A Novel Design Method of Stream Ciphers Based on Table-Element Permutation Hongbo Zou
2009/550 (PDF ) How to Construct Cryptosystems and Hash Functions in Weakened Random Oracle Models Yusuke Naito, Lei Wang, Kazuo Ohta
2009/549 (PDF ) Making Collusion-Secure Codes (More) Robust against Bit Erasure Koji Nuida
2009/548 (PDF ) A NOTE ON YAO'S THEOREM ABOUT PSEUDORANDOM GENERATORS Stéphane BALLET, Robert ROLLAND
2009/547 (PDF ) Non-Interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers Rosario Gennaro, Craig Gentry, Bryan Parno
2009/546 (PDF ) Construction of A New Class of Linear Multivariate Public Key Cryptosystem, K(I)SE(1)PKC Masao Kasahara
2009/545 (PDF ) Fuzzy extractors for continuous distributions Ileana Buhan, Jeroen Doumen, Pieter Hartel
2009/544 (PDF ) Connections between Quaternary and Binary Bent Functions Patrick Solé, Natalia Tokareva
2009/542 (PDF ) Analysis of Intermediate Field Systems Olivier Billet, Jacques Patarin, Yannick Seurin
2009/541 (PDF ) Breaking ECC2K-130 Daniel V. Bailey, Lejla Batina, Daniel J. Bernstein, Peter Birkner, Joppe W. Bos, Hsieh-Chung Chen, Chen-Mou Cheng, Gauthier van Damme, Giacomo de Meulenaer, Luis Julian Dominguez Perez, Junfeng Fan, Tim Güneysu, Frank Gurkaynak, Thorsten Kleinjung, Tanja Lange, Nele Mentens, Ruben Niederhagen, Christof Paar, Francesco Regazzoni, Peter Schwabe, Leif Uhsadel, Anthony Van Herrewege, Bo-Yin Yang
2009/540 (PDF ) Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups David Mandell Freeman
2009/539 (PDF ) Covering Radius of Two-dimensional Lattices Yupeng Jiang, Yingpu Deng, Yanbin Pan
2009/538 (PDF ) Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications Johann Großschädl, Elisabeth Oswald, Dan Page, Michael Tunstall
2009/537 (PDF ) Cryptanalysis of two knapsack public-key cryptosystems Jingguo Bi, Xianmeng Meng, Lidong Han
2009/533 (PDF ) Finding composite order ordinary elliptic curves using the Cocks-Pinch method D. Boneh, K. Rubin, A. Silverberg
2009/532 (PDF ) Building Efficient Fully Collusion-Resilient Traitor Tracing and Revocation Schemes Sanjam Garg, Abishek Kumarasubramanian, Amit Sahai, Brent Waters
2009/531 (PDF ) Super-Sbox Cryptanalysis: Improved Attacks for AES-like permutations Henri Gilbert, Thomas Peyrin
2009/530 (PDF ) A New Proposal Against the Main of Generic Attacks Xigen. Yao
2009/529 (PDF ) Oblivious Transfer with Access Control Jan Camenisch, Maria Dubovitskaya, Gregory Neven
2009/528 (PDF ) New Fault Attack on Elliptic Curve Scalar Multiplication Alexey Chilikov, Oleg Taraskin
2009/527 (PDF ) An Efficient Adaptive-Deniable-Concurrent Non-malleable Commitment Scheme Seiko Arita
2009/526 (PDF ) Improved Related-Key Boomerang Attacks on Round-Reduced Threefish-512 Jiazhe Chen, Keting Jia
2009/525 (PDF ) On Quantifying the Resistance of Concrete Hash Functions to Generic Multi-Collision Attacks Somindu C. Ramanna, Palash Sarkar
2009/524 (PDF ) Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions Petros Mol, Scott Yilek
2009/523 (PDF ) Differential Addition in generalized Edwards Coordinates Benjamin Justus, Daniel Loebenberger
2009/522 (PDF ) Isogenies of Elliptic Curves: A Computational Approach Daniel Shumow
2009/521 (PDF ) An Efficient Secure Oblivious Transfer Hung-Min Sun, Yalin Chen, Jue-Sam Chou
2009/520 (PDF ) Universally Composable Incoercibility Dominique Unruh, Jörn Müller-Quade
2009/519 (PDF ) Secure Message Transmission with Small Public Discussion Juan Garay, Clint Givens, Rafail Ostrovsky
2009/518 (PDF ) Efficient Strong Designated Verifier Signature Schemes without Random Oracles or Delegatability Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo
2009/517 (PDF ) New Constructions of Convertible Undeniable Signature Schemes without Random Oracles Qiong Huang, Duncan S. Wong
2009/516 (PDF ) Lightweight Cryptography - Cryptographic Engineering for a Pervasive World Axel Poschmann
2009/515 (PDF ) Blake-Wilson, Johnson and Menezes Protocol Revisited Hai Huang, Zhenfu Cao
2009/514 (PDF ) Generic One Round Group Key Exchange in the Standard Model M. Choudary Gorantla, Colin Boyd, Juan Manuel Gonzalez Nieto, Mark Manulis
2009/513 (PDF ) On the round complexity of black-box constructions of commitments secure against selective opening attacks David Xiao
2009/512 (PDF ) Public-Key Encryption in the Bounded-Retrieval Model Joel Alwen, Yevgeniy Dodis, Moni Naor, Gil Segev, Shabsi Walfish, Daniel Wichs
2009/511 (PDF ) Bounded Key-Dependent Message Security Boaz Barak, Iftach Haitner, Dennis Hofheinz, Yuval Ishai
2009/510 (PDF ) High-Speed Hardware Implementations of BLAKE, Blue Midnight Wish, CubeHash, ECHO, Fugue, Grøstl, Hamsi, JH, Keccak, Luffa, Shabal, SHAvite-3, SIMD, and Skein Stefan Tillich, Martin Feldhofer, Mario Kirschbaum, Thomas Plos, Jörn-Marc Schmidt, Alexander Szekely
2009/509 (PDF ) Practical Key Recovery Attacks On Two McEliece Variants Valerie Gauthier Umana, Gregor Leander
2009/508 (PDF ) On the Efficiency of Classical and Quantum Oblivious Transfer Reductions Severin Winkler, Juerg Wullschleger
2009/507 (PDF ) Efficient Privacy-Preserving Face Recognition Ahmad-Reza Sadeghi, Thomas Schneider, Immo Wehrenberg
2009/506 (PDF ) An Investigation of the Enhanced Target Collision Resistance Property for Hash Functions Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu
2009/505 (PDF ) Authenticated Key Exchange Protocols with Enhanced Freshness Properties Hai Huang, Zhenfu Cao
2009/504 (PDF ) Insecure ``Provable Secure Network Coding'' Yongge Wang
2009/503 (PDF ) Fault Attacks Against EMV Signatures Jean-Sebastien Coron, David Naccache, Mehdi Tibouchi
2009/502 (PDF ) On second order nonlinearities of cubic monomial Boolean functions Ruchi Gode, Sugata Gangopadhyay
2009/501 (PDF ) Fast Implementations of AES on Various Platforms Joppe W. Bos, Dag Arne Osvik, Deian Stefan
2009/500 (PDF ) Key Recovery Attack on QuiSci Nils Reimers
2009/499 (PDF ) Underlying Assumptions and Designated Verifier Signatures Chifumi Sato, Takeshi Okamoto, Eiji Okamoto
2009/498 (PDF ) NTRU based group oriented signature Chunbo Ma, Jun Ao
2009/497 (PDF ) Cube Attack on Courtois Toy Cipher Piotr Mroczkowski, Janusz Szmidt
2009/496 (PDF ) Anonymous Fuzzy Identity-based Encryption for Similarity Search Ye Zhang, Nikos Mamoulis, David W. Cheung, S. M. Yiu, W. K. Wong
2009/495 (PDF ) Security Weakness in Two Authenticated Key Exchange Protocols Qingfeng Cheng, Chuangui Ma
2009/494 (PDF ) A Framework for Universally Composable Non-Committing Blind Signatures Masayuki Abe, Miyako Ohkubo
2009/493 (PDF ) Remarks on Some Quantum Cryptographic Schemes Zhengjun Cao
2009/492 (PDF ) Efficient Statistical Asynchronous Verifiable Secret Sharing and Multiparty Computation with Optimal Resilience Arpita Patra, Ashish Choudhary, C. Pandu Rangan
2009/491 (PDF ) Practical Private Set Intersection Protocols with Linear Computational and Bandwidth Complexity Emiliano De Cristofaro, Gene Tsudik
2009/490 (PDF ) Cryptanalysis of Multiple-Server Password-Authenticated Key Sang-Gon Lee
2009/489 (PDF ) Impossible Boomerang Attack for Block Cipher Structures Jiali Choy, Huihui Yap
2009/488 (PDF ) Little Dragon Two: An efficient Multivariate Public Key Cryptosystem Rajesh P Singh, A. Saikia, B. K. Sarma
2009/487 (PDF ) Error Decodable Secret Sharing and One-Round Perfectly Secure Message Transmission for General Adversary Structures Keith M. Martin, Maura B. Paterson, Douglas R. Stinson
2009/486 (PDF ) Efficient Pseudorandom Functions From the Decisional Linear Assumption and Weaker Variants Allison Lewko, Brent Waters
2009/485 (PDF ) Black-Box Circular-Secure Encryption Beyond Affine Functions Zvika Brakerski, Shafi Goldwasser, Yael Kalai
2009/484 (PDF ) New Pseudo-Near-Collision Attack on Reduced-Round of Hamsi-256 Meiqin Wang, Xiaoyun Wang, Keting Jia, Wei Wang
2009/483 (PDF ) On the Security of UOV Jean-Charles Faugère, Ludovic Perret
2009/482 (PDF ) New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts Allison Lewko, Brent Waters
2009/481 (PDF ) PPS: Privacy Preserving Statistics using RFID Tags Erik-Oliver Blass, Kaoutar Elkhiyaoui, Refik Molva
2009/480 (PDF ) On Cryptographic Protocols Employing Asymmetric Pairings -- The Role of $\Psi$ Revisited Sanjit Chatterjee, Alfred Menezes
2009/479 (PDF ) Preimage Attacks on 41-Step SHA-256 and 46-Step SHA-512 Yu Sasaki, Lei Wang, Kazumaro Aoki
2009/478 (PDF ) Pseudo-cryptanalysis of the Original Blue Midnight Wish Søren S. Thomsen
2009/477 (PDF ) Preimages for Step-Reduced SHA-2 Jian Guo, Krystian Matusiewicz
2009/476 (PDF ) On the Security of PAS (Predicate-based Authentication Service) Shujun Li, Hassan Jameel Asghar, Josef Pieprzyk, Ahmad-Reza Sadeghi, Roland Schmitz, Huaxiong Wang
2009/475 (PDF ) Double-Exponentiation in Factor-4 Groups and its Applications Koray Karabina
2009/474 (PDF ) Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine Scott Yilek
2009/473 (PDF ) A Simple Power Analysis Attack on the Serpent Key Schedule Kevin J. Compton, Brian Timm, Joel VanLaven
2009/472 (PDF ) Cryptanalysis of a Message Recognition Protocol by Mashatan and Stinson Madeline Gonzalez, Rainer Steinwandt
2009/471 (PDF ) Improving the Berlekamp algorithm for binomials \boldmath$x^{n} - a$ Ryuichi Harasawa, Yutaka Sueyoshi, Aichi Kudo, Liang Cui
2009/470 (PDF ) On The Communication Complexity of Perfectly Secure Message Transmission in Directed Networks Arpita Patra, Ashish Choudhary, C. Pandu Rangan
2009/469 (PDF ) Additive Combinatorics and Discrete Logarithm Based Range Protocols Rafik Chaabouni, Helger Lipmaa, abhi shelat
2009/468 (PDF ) Password Based Key Exchange with Hidden Elliptic Curve Public Parameters Julien Bringer, Herve Chabanne, Thomas Icart
2009/466 (PDF ) The Certicom Challenges ECC2-X Daniel V. Bailey, Brian Baldwin, Lejla Batina, Daniel J. Bernstein, Peter Birkner, Joppe W. Bos, Gauthier van Damme, Giacomo de Meulenaer, Junfeng Fan, Tim Güneysu, Frank Gurkaynak, Thorsten Kleinjung, Tanja Lange, Nele Mentens, Christof Paar, Francesco Regazzoni, Peter Schwabe, Leif Uhsadel
2009/465 (PDF ) Readers Behaving Badly: Reader Revocation in PKI-Based RFID Systems Rishab Nithyanand, Gene Tsudik, Ersin Uzun
2009/464 (PDF ) On Key Authentic Degree of Cryptosystem WANG Yong, WANG Huangdeng
2009/463 (PDF ) On Linear Cryptanalysis with Many Linear Approximations Benoit Gérard, Jean-Pierre Tillich
2009/462 (PDF ) Certificateless KEM and Hybrid Signcryption Schemes Revisited S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
2009/461 (PDF ) A Framework for Non-Interactive Instance-Dependent Commitment Schemes (NIC) Bruce Kapron, Lior Malka, Venkatesh Srinivasan
2009/460 (PDF ) Asymptotic enumeration of correlation-immune boolean functions E. Rodney Canfield, Zhicheng Gao, Catherine Greenhill, Brendan D. McKay, Robert W. Robinson
2009/459 (PDF ) Efficient Oblivious Polynomial Evaluation with Simulation-Based Security Carmit Hazay, Yehuda Lindell
2009/458 (PDF ) Security Analysis and Design of Proxy Signature Schemes over Braid Groups Wei Yun, Xiong Guo-hua, Zhang Xing-kai, Bao Wan-su
2009/457 (PDF ) A remark on the computation of cube roots in finite fields Nozomu Nishihara, Ryuichi Harasawa, Yutaka Sueyoshi, Aichi Kudo
2009/455 (PDF ) Identity-Based Hybrid Signcryption Fagen Li, Masaaki Shirase, Tsuyoshi Takagi
2009/454 (PDF ) An Efficient Convertible Undeniable Signature Scheme with Delegatable Verification Jacob C. N. Schuldt, Kanta Matsuura
2009/453 (PDF ) A Note on Linear Approximations of BLUE MIDNIGHT WISH Cryptographic Hash Function Vlastimil Klima, Petr Susil
2009/452 (PDF ) Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes Christian Wieschebrink
2009/451 (PDF ) Efficient Certificateless KEM in the Standard Model Georg Lippold, Colin Boyd, Juan González Nieto
2009/450 (PDF ) On Hierarchical Threshold Secret Sharing Ali Aydin Selcuk, Kerem Kaskaloglu, Ferruh Ozbudak
2009/449 (PDF ) One for All - All for One: Unifying Standard DPA Attacks Stefan Mangard, Elisabeth Oswald, Francois-Xavier Standaert
2009/448 (PDF ) Precise Bounded-Concurrent Zero-Knowledge in Almost Constant Rounds Ning Ding, Dawu Gu, Bart Preneel
2009/447 (PDF ) ROSSLER NONLINEAR DYNAMICAL MACHINE FOR CRYPTOGRAPHY APPLICATIONS Sunil Pandey, Praveen Kaushik, Dr. S. C. Shrivastava
2009/446 (PDF ) Ntr¹u-like Public Key Cryptosystems beyond Dedekind Domain Up to Alternative Algebra Ehsan Malekian, Ali Zakerolhosseini
2009/445 (PDF ) Computing Hilbert class polynomials with the Chinese Remainder Theorem Andrew V. Sutherland
2009/444 (PDF ) Secure and Efficient HB-CM Entity Authentication Protocol Zhijun Li, Guang Gong, Zhiguang Qin
2009/443 (PDF ) Rebound Attack on the Full LANE Compression Function Krystian Matusiewicz, Maria Naya-Plasencia, Ivica Nikolic, Yu Sasaki, Martin Schläffer
2009/442 (PDF ) Fuzzy Privacy Preserving Peer-to-Peer Reputation Management Rishab Nithyanand, Karthik Raman
2009/441 (PDF ) An Efficient Two-Party Identity-Based Key Exchange Protocol based on ECDLP Jayaprakash Kar, Banshidhar Majhi
2009/440 (PDF ) A Multivariate Signature Scheme with an almost cyclic public key Albrecht Petzoldt, Johannes Buchmann
2009/439 (PDF ) A Fast Mental Poker Protocol Tzer-jen Wei, Lih-Chung Wang
2009/438 (PDF ) Improved Cryptanalysis of Skein Jean-Philippe Aumasson, Cagdas Calik, Willi Meier, Onur Ozen, Raphael C. -W. Phan, Kerem Varici
2009/437 (PDF ) On the Relations Between Diffie-Hellman and ID-Based Key Agreement from Pairings Shengbao Wang
2009/436 (PDF ) On the Connection between Signcryption and One-pass Key Establishment M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto
2009/435 (PDF ) Efficient Confirmer Signatures from the ``Signature of a Commitment'' Paradigm Laila El Aimani
2009/434 (PDF ) Tight Bounds for Protocols with Hybrid Security Matthias Fitzi, Dominik Raub
2009/433 (PDF ) Communication Optimal Multi-Valued Asynchronous Byzantine Agreement with Optimal Resilience Arpita Patra, C. Pandu Rangan
2009/431 (PDF ) On the Design of Trivium Yun Tian, Gongliang Chen, Jianhua Li
2009/430 (PDF ) One-time-password-authenticated key exchange Kenneth G. Paterson, Douglas Stebila
2009/429 (PDF ) Precise Time and Space Simulatable Zero-Knowledge Ning Ding, Dawu Gu
2009/428 (PDF ) Efficiently from Semi-honest to Malicious OT via OLFE Jürg Wullschleger
2009/427 (PDF ) Efficient Verifiable Escrow and Fair Exchange with Trusted Hardware Stephen R. Tate, Roopa Vishwanathan
2009/426 (PDF ) Cheating Detection and Cheater Identification in CRT-based Secret Sharing Schemes Daniel Pasaila, Vlad Alexa, Sorin Iftene
2009/425 (PDF ) Cryptanalysis and Security Enhancement on the Generation of Mu-Varadharajan Electronic Voting Protocol Vahid Jahandideh, Amir S. Mortazavi, Yaser Baseri, Javad Mohajeri
2009/424 (PDF ) Double Voter Perceptible Blind Signature Based Electronic Voting Protocol Yaser Baseri, Amir S. Mortazavi, Maryam Rajabzadeh Asaar, Mohsen Pourpouneh, Javad Mohajeri
2009/423 (PDF ) Utilizing postponed ephemeral and pseudo-static keys in tripartite and identity-based key agreement protocols Atsushi Fujioka, Koutarou Suzuki, Berkant Ustaoglu
2009/422 (PDF ) Attacks on {RFID}-Based Electronic Voting Systems Yossef Oren, Avishai Wool
2009/421 (PDF ) How to Construct Identity-Based Signatures without the Key Escrow Problem Tsz Hon Yuen, Willy Susilo, Yi Mu
2009/420 (PDF ) Higher-order Masking and Shuffling for Software Implementations of Block Ciphers Matthieu Rivain, Emmanuel Prouff, Julien Doget
2009/419 (PDF ) An Efficient Method for Random Delay Generation in Embedded Software Jean-Sébastien Coron, Ilya Kizhvatov
2009/418 (PDF ) Subtleties in the Definition of IND-CCA: When and How Should Challenge-Decryption be Disallowed? Mihir Bellare, Dennis Hofheinz, Eike Kiltz
2009/417 (PDF ) More Differential Paths of TIB3 Harry Wiggins, Philip Hawkes, Gregory G. Rose, Cameron McDonald
2009/416 (PDF ) KronCrypt - A New Symmetric Cryptosystem Based on Kronecker's Approximation Theorem Carsten Elsner, Martin Schmidt
2009/415 (PDF ) Attacks Against Permute-Transform-Xor Compression Functions and Spectral Hash Ethan Heilman
2009/414 (PDF ) Security Bounds for the Design of Code-based Cryptosystems Matthieu Finiasz, Nicolas Sendrier
2009/413 (PDF ) Three Improved Algorithms for Multi-path Key Establishment in Sensor Networks Using Protocols for Secure Message Transmission Jiang Wu, Douglas R. Stinson
2009/412 (PDF ) Distinguishing Attacks on Stream Ciphers Based on Arrays of Pseudo-random Words Nathan Keller, Stephen D. Miller
2009/411 (PDF ) Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
2009/410 (PDF ) Authenticated Broadcast with a Partially Compromised Public-Key Infrastructure S. Dov Gordon, Jonathan Katz, Ranjit Kumaresan, Arkady Yerukhimovich
2009/409 (PDF ) A Tree Based Recursive Scheme for Space Efficient Secret Sharing Abhishek Parakh, Subhash Kak
2009/408 (PDF ) A Secure and Efficient Authenticated Diffie–Hellman Protocol Augustin P. Sarr, Philippe Elbaz–Vincent, Jean–Claude Bajard
2009/407 (PDF ) Single Block Attacks and Statistical Tests on CubeHash Benjamin Bloom, Alan Kaminsky
2009/406 (PDF ) On-line Non-transferable Signatures Revisited Jacob C. N. Schuldt, Kanta Matsuura
2009/405 (PDF ) Generic Attacks on Misty Schemes -5 rounds is not enough- Valerie Nachef, Jacques Patarin, Joana Treger
2009/403 (PDF ) On Generic Constructions of Designated Confirmer Signatures (The ``Encryption of a Signature'' Paradigm Revisited) Laila El Aimani
2009/402 (PDF ) AIDA Breaks BIVIUM (A&B) in 1 Minute Dual Core CPU Time Michael Vielhaber
2009/401 (PDF ) Longest Common Subsequence as Private Search Mark Gondree, Payman Mohassel
2009/400 (PDF ) Identity-Based Chameleon Hash Scheme Without Key Exposure Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Kwangjo Kim
2009/399 (PDF ) Leakage-Resilient Storage Francesco Davì, Stefan Dziembowski, Daniele Venturi
2009/398 (PDF ) Fast Architectures for the $\eta_T$ Pairing over Small-Characteristic Supersingular Elliptic Curves Jean-Luc Beuchat, Jérémie Detrey, Nicolas Estibals, Eiji Okamoto, Francisco Rodríguez-Henríquez
2009/397 (PDF ) Linear Cryptanalysis of Reduced-Round PRESENT Joo Yeon Cho
2009/396 (PDF ) Computational Indistinguishability Amplification: Tight Product Theorems for System Composition Ueli Maurer, Stefano Tessaro
2009/395 (PDF ) First CPIR Protocol with Data-Dependent Computation Helger Lipmaa
2009/394 (PDF ) Provably Secure Convertible Undeniable Signatures with Unambiguity Le Trieu Phong, Kaoru Kurosawa, Wakaha Ogata
2009/393 (PDF ) Permutation Polynomials modulo $p^n$} Rajesh P Singh, Soumen Maity
2009/392 (PDF ) Computational Soundness for Key Exchange Protocols with Symmetric Encryption Ralf Kuesters, Max Tuengerthal
2009/391 (PDF ) Threshold Decryption and Zero-Knowledge Proofs for Lattice-Based Cryptosystems Rikke Bendlin, Ivan Damgård
2009/390 (PDF ) Sub-linear Size Pairing-based Non-interactive Zero-Knowledge Arguments Jens Groth
2009/389 (PDF ) On the Security of 1024-bit RSA and 160-bit Elliptic Curve Cryptography Joppe W. Bos, Marcelo E. Kaihara, Thorsten Kleinjung, Arjen K. Lenstra, Peter L. Montgomery
2009/387 (PDF ) Securing Plastic Money Using an RFID Based Protocol Stack Rishab Nithyanand
2009/386 (PDF ) QTRU: A Lattice Attack Resistant Version of NTRU Ehsan Malekian, Ali Zakerolhosseini, Atefeh Mashatan
2009/385 (PDF ) Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions Brent Waters
2009/384 (PDF ) Practical Attacks on NESHA-256 Orr Dunkelman, Tor E. Bjørstad
2009/383 (PDF ) A Registration Scheme to Allocate a Unique Identification Number Manoj Kumar
2009/382 (PDF ) Linearization Framework for Collision Attacks: Application to CubeHash and MD6 Eric Brier, Shahram Khazaei, Willi Meier, Thomas Peyrin
2009/380 (PDF ) Untraceable Tags based on Mild Assumptions Carlo Blundo, Angelo De Caro, Giuseppe Persiano
2009/379 (PDF ) Protecting Circuits from Computationally Bounded and Noisy Leakage Sebastian Faust, Tal Rabin, Leonid Reyzin, Eran Tromer, Vinod Vaikuntanathan
2009/378 (PDF ) Detectable correlations in Edon-R Peter Novotney, Niels Ferguson
2009/377 (PDF ) Chosen-Ciphertext Secure RSA-type Cryptosystems Benoit Chevallier-Mames, Marc Joye
2009/376 (PDF ) Cryptanalysis of the Tillich-Zémor hash function Markus Grassl, Ivana Ilic, Spyros Magliveras, Rainer Steinwandt
2009/375 (PDF ) Forgotten Secret Recovering Scheme and Fuzzy Vault Scheme Constructed Based on Systematic Error-Correcting Codes Masao KASAHARA
2009/374 (PDF ) Key Recovery Attacks of Practical Complexity on AES Variants With Up To 10 Rounds Alex Biryukov, Orr Dunkelman, Nathan Keller, Dmitry Khovratovich, Adi Shamir
2009/373 (PDF ) Utility Dependence in Correct and Fair Rational Secret Sharing Gilad Asharov, Yehuda Lindell
2009/372 (PDF ) More on Key Wrapping Rosario Gennaro, Shai Halevi
2009/371 (PDF ) Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption Rakesh Bobba, Himanshu Khurana, Manoj Prabhakaran
2009/370 (PDF ) A study of pairing computation for elliptic curves with embedding degree 15 Nadia El Mrabet, Nicolas Guillermin, Sorina Ionica
2009/369 (PDF ) Quantum readout of Physical Unclonable Functions: Remote authentication without trusted readers and authenticated Quantum Key Exchange without initial shared secrets Boris Skoric
2009/368 (PDF ) A Simulation-Based Treatment of Authenticated Message Exchange Klaas Ole Kuertz, Henning Schnoor, Thomas Wilke
2009/367 (PDF ) Non-delegatable Identity-based Designated Verifier Signature Qiong Huang, Willy Susilo, Duncan S. Wong
2009/366 (PDF ) Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer Yehuda Lindell, Hila Zarosim
2009/365 (PDF ) Space Efficient Secret Sharing: A Recursive Approach Abhishek Parakh, Subhash Kak
2009/364 (PDF ) Position Based Cryptography Nishanth Chandran, Vipul Goyal, Ryan Moriarty, Rafail Ostrovsky
2009/363 (PDF ) Some Lattices Attacks on DSA and ECDSA Dimitrios Poulakis
2009/362 (PDF ) Toward a Generic Construction of Convertible Undeniable Signatures from Pairing-Based Signatures Laila El Aimani
2009/361 (PDF ) On the Security of a Proxy Blind Signature Scheme over Braid Groups Manoj Kumar
2009/360 (PDF ) Cryptanalysis of a Generalized Unbalanced Feistel Network Structure Ruilin Li, Bing Sun, Chao Li, Longjiang Qu
2009/359 (PDF ) Bonsai Trees (or, Arboriculture in Lattice-Based Cryptography) Chris Peikert
2009/358 (PDF ) MAC Precomputation with Applications to Secure Memory Juan A. Garay, Vladimir Kolesnikov, Rae McLellan
2009/357 (PDF ) Impossible Differential Cryptanalysis of FOX Zhongming Wu, Xuejia Lai, Bo Zhu, Yiyuan Luo
2009/356 (PDF ) A Domain Extender for the Ideal Cipher Jean-Sebastien Coron, Yevgeniy Dodis, Avradip Mandal, Yannick Seurin
2009/355 (PDF ) Asynchronous Distributed Private-Key Generators for Identity-Based Cryptography Aniket Kate, Ian Goldberg
2009/354 (PDF ) Cache Timing Attacks on Camellia Block Cipher ZHAO Xin-jie, WANG Tao, ZHENG Yuan-yuan
2009/353 (PDF ) Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman protocols (extended version) Berkant Ustaoglu
2009/352 (PDF ) On the Duality of Probing and Fault Attacks Berndt M. Gammel, Stefan Mangard
2009/351 (PDF ) How to Delegate a Lattice Basis David Cash, Dennis Hofheinz, Eike Kiltz
2009/350 (PDF ) Game Theoretic Resistance to Denial of Service Attacks Using Hidden Difficulty Puzzles Harikrishna Narasimhan, Venkatanathan Varadarajan, C. Pandu Rangan
2009/349 (PDF ) Compact Hardware Implementations of the SHA-3 Candidates ARIRANG, BLAKE, Grøstl, and Skein Stefan Tillich, Martin Feldhofer, Wolfgang Issovits, Thomas Kern, Hermann Kureck, Michael Mühlberghuber, Georg Neubauer, Andreas Reiter, Armin Köfler, Mathias Mayrhofer
2009/348 (PDF ) A provably secure really source hiding designated verifier signature scheme based on random oracle model Huang-Ta Huang, Jue-Sam Chou
2009/347 (PDF ) An Efficient Concurrent Repetition Theorem Douglas Wikström
2009/346 (PDF ) Security Analysis of the GF-NLFSR Structure and Four-Cell Block Cipher Wenling Wu, Lei Zhang, Liting Zhang, Wentao Zhang
2009/345 (PDF ) Anonymous ID Based Signcryption Scheme for Multiple Receivers Sunder Lal, Prashant Kushwah
2009/344 (PDF ) Comments on Shao-Cao's Unidirectional Proxy Re-Encryption Scheme from PKC 2009 Xi Zhang, Min-Rong Chen, Xia Li
2009/343 (PDF ) Partitioning Multivariate Polynomial Equations via Vertex Separators for Algebraic Cryptanalysis and Mathematical Applications Kenneth Koon-Ho Wong, Gregory V. Bard, Robert H. Lewis
2009/342 (PDF ) FPGA Implementations of SHA-3 Candidates:CubeHash, Grøstl, L{\sc ane}, Shabal and Spectral Hash Brian Baldwin, Andrew Byrne, Mark Hamilton, Neil Hanley, Robert P. McEvoy, Weibo Pan, William P. Marnane
2009/341 (PDF ) Leakage Resilient Cryptography in Practice Francois-Xavier Standaert, Olivier Pereira, Yu Yu, Jean-Jacques Quisquater, Moti Yung, Elisabeth Oswald
2009/340 (PDF ) Efficient Indifferentiable Hashing into Ordinary Elliptic Curves Eric Brier, Jean-Sebastien Coron, Thomas Icart, David Madore, Hugues Randriam, Mehdi Tibouchi
2009/339 (PDF ) A Novel ID-based Electronic Cash System from Pairings Jue-Sam Chou, Yalin Chen, Ming-Hsun Cho, Hung-Min Sun
2009/338 (PDF ) Security weaknesses in two multi-server password based authentication protocols Jue-Sam Chou, Chun-Hui Huang, Cheng-Chung Ding
2009/337 (PDF ) A New Lattice-Based Cryptosystem Mixed with a Knapsack Yanbin Pan, Yingpu Deng, Yupeng Jiang, Ziran Tu
2009/336 (PDF ) Partial Signatures and their Applications Mihir Bellare, Shanshan Duan
2009/335 (PDF ) Related-Key Rectangle Attack of the Full 80-Round HAS-160 Encryption Mode Ewan Fleischmann, Michael Gorski, Stefan Lucks
2009/334 (PDF ) Attacking Reduced Rounds of the ARIA Block Cipher Ewan Fleischmann, Michael Gorski, Stefan Lucks
2009/333 (PDF ) Hard Fault Analysis of Trivium Yupu Hu, Fengrong Zhang, Yiwei Zhang
2009/332 (PDF ) Untraceable RFID protocols are not trivially composable: Attacks on the revision of EC-RAC Ton van Deursen, Sasa Radomirovic
2009/331 (PDF ) Security Notions and Generic Constructions for Client Puzzles L. Chen, P. Morrissey, N. P. Smart, B. Warinschi
2009/328 (PDF ) Flowchart description of security primitives for Controlled Physical Unclonable Functions Boris Skoric, Marc X. Makkes
2009/327 (PDF ) Simple Adaptive Oblivious Transfer Without Random Oracle Kaoru Kurosawa, Ryo Nojima
2009/326 (PDF ) The Application of Polynomials over the Field of Two Elements to a Problem in Intellectual Property Gregory V. Bard
2009/325 (PDF ) Characterizing Padding Rules of MD Hash Functions Preserving Collision Security Mridul Nandi
2009/324 (PDF ) Group-Oriented Fair Exchange of Signatures Qiong Huang, Duncan S. Wong, Willy Susilo
2009/323 (PDF ) Factoring Unbalanced Moduli with Known Bits Eric Brier, David Naccache, Mehdi Tibouchi
2009/322 (PDF ) Certifying Assembly with Formal Cryptographic Proofs: the Case of BBS Reynald Affeldt, David Nowak, Kiyoshi Yamada
2009/321 (PDF ) Tweakable Enciphering Schemes From Stream Ciphers With IV Palash Sarkar
2009/320 (PDF ) Automorphic Signatures in Bilinear Groups and an Application to Round-Optimal Blind Signatures Georg Fuchsbauer
2009/319 (PDF ) Comments and Improvements on Chameleon Hashing Without Key Exposure Based on Factoring Xiaofeng Chen, Haibo Tian, Fangguo Zhang
2009/318 (PDF ) The Fermat factorization method revisited Robert ERRA, Christophe GRENIER
2009/317 (PDF ) Related-key Cryptanalysis of the Full AES-192 and AES-256 Alex Biryukov, Dmitry Khovratovich
2009/316 (PDF ) An Efficient Password Security of Key Exchange Protocol based on ECDLP Jayaprakash Kar, Banshidhar Majhi
2009/315 (PDF ) Breaking RSA-based PIN Encryption with thirty ciphertext validity queries N. P. Smart
2009/314 (PDF ) Secure Two-Party Computation is Practical B. Pinkas, T. Schneider, N. P. Smart, S. Williams
2009/313 (PDF ) Identity Based Group Signatures from Hierarchical Identity-Based Encryption Nigel P. Smart, Bogdan Warinschi
2009/312 (PDF ) Jacobi Quartic Curves Revisited Huseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson
2009/311 (PDF ) Multi Party Distributed Private Matching, Set Disjointness and Cardinality Set Intersection with Information Theoretic Security Sathya Narayanan G, Aishwarya T, Anugrah Agrawal, Arpita Patra, Ashish Choudhary, Pandu Rangan C
2009/310 (PDF ) RFID distance bounding protocol with mixed challenges to prevent relay attacks Chong Hee Kim, Gildas Avoine
2009/309 (PDF ) Fault Attacks on RSA Signatures with Partially Unknown Messages Jean-Sebastien Coron, Antoine Joux, Ilya Kizhvatov, David Naccache, Pascal Paillier
2009/308 (PDF ) A note on the Certificateless Multi-receiver Signcryption Scheme S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
2009/307 (PDF ) Anonymous Signatures Revisited Vishal Saraswat, Aaram Yun
2009/306 (PDF ) Authentic Time-Stamps for Archival Storage Alina Oprea, Kevin D. Bowers
2009/305 (PDF ) Improved generic algorithms for 3-collisions Antoine Joux, Stefan Lucks
2009/304 (PDF ) Factor-4 and 6 Compression of Cyclotomic Subgroups Koray Karabina
2009/303 (PDF ) Key extraction from general non-discrete signals E. Verbitskiy, P. Tuyls, C. Obi, B. Schoenmakers, B. Skoric
2009/302 (PDF ) Cryptanalysis of ESSENCE Maria Naya-Plasencia, Andrea Röck, Jean-Philippe Aumasson, Yann Laigle-Chapuy, Gaëtan Leurent, Willi Meier, Thomas Peyrin
2009/301 (PDF ) A Probabilistic Secret Sharing Scheme for a Compartmented Access Structure Yuyin Yu, Mingsheng Wang
2009/300 (PDF ) Universally Composable Contributory Group Key Exchange M. Choudary Gorantla, Colin Boyd, Juan Manuel Gonzàlez Nieto
2009/299 (PDF ) On the security of oscillator-based random number generators Mathieu Baudet, David Lubicz, Julien Micolod, André Tassiaux
2009/298 (PDF ) Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction Without Pairing S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
2009/296 (PDF ) Perfectly Balanced Functions in Symbolic Dynamics O. A. Logachev, A. A. Salnikov, S. V. Smyshlyaev, V. V. Yashchenko
2009/295 (PDF ) Defending Against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems Shucheng Yu, Kui Ren, Wenjing Lou, Jin Li
2009/294 (PDF ) Low Latency High Bandwidth Anonymous Overlay Network with Anonymous Routing Roman Schlegel, Duncan S. Wong
2009/293 (PDF ) Enhancing Attribute-based Encryption with Attribute Hierarchy Jin Li, Qian Wang, Cong Wang, Kui Ren
2009/292 (PDF ) Implementing Wagner's generalized birthday attack against the SHA-3 round-1 candidate FSB Daniel J. Bernstein, Tanja Lange, Ruben Niederhagen, Christiane Peters, Peter Schwabe
2009/291 (PDF ) Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto
2009/290 (PDF ) Security Analysis of Aggregate signature and Batch verification signature schemes S. Sharmila Deva Selvi, S. Sree Vivek, J. Shriram, S. Kalaivani, C. Pandu Rangan
2009/289 (PDF ) Analysis of the End-by-Hop Protocol for Secure Aggregation in Sensor Networks Erik Zenner
2009/288 (PDF ) Efficient Key Exchange with Tight Security Reduction Jiang Wu, Berkant Ustaoglu
2009/287 (PDF ) Generic Attacks on Alternating Unbalanced Feistel Schemes Valerie Nachef
2009/286 (PDF ) On Privacy Losses in the Trusted Agent Model (Abstract) Paulo Mateus, Serge Vaudenay
2009/285 (PDF ) Efficient Public Key Encryption Based on Ideal Lattices Damien Stehlé, Ron Steinfeld, Keisuke Tanaka, Keita Xagawa
2009/284 (PDF ) Privacy-aware Attribute-based Encryption with User Accountability Jin Li, Kui Ren, Bo Zhu, Zhiguo Wan
2009/283 (PDF ) Short and Stateless Signatures from the RSA Assumption Susan Hohenberger, Brent Waters
2009/282 (PDF ) Leakage-Resilient Signatures Sebastian Faust, Eike Kiltz, Krzysztof Pietrzak, Guy Rothblum
2009/281 (PDF ) Enabling Public Verifiability and Data Dynamics for Storage Security Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou
2009/280 (PDF ) Universally Anonymous IBE based on the Quadratic Residuosity Assumption Giuseppe Ateniese, Paolo Gasti
2009/279 (PDF ) Algebraic Side-Channel Attacks Mathieu Renauld, Francois-Xavier Standaert
2009/278 (PDF ) Towards Electrical, Integrated Implementations of SIMPL Systems Ulrich Rührmair, Qingqing Chen, Paolo Lugli, Ulf Schlichtmann, Martin Stutzmann, György Csaba
2009/277 (PDF ) On the Foundations of Physical Unclonable Functions Ulrich Rührmair, Jan Sölter, Frank Sehnke
2009/276 (PDF ) Multi-core Implementation of the Tate Pairing over Supersingular Elliptic Curves Jean-Luc Beuchat, Emmanuel López-Trejo, Luis Martínez-Ramos, Shigeo Mitsunari, Francisco Rodríguez-Henríquez
2009/275 (PDF ) Algebraic Attacks specialized to \(\mathbb{F}_2\) (Diplomarbeit) Thomas Dullien
2009/274 (PDF ) A Collision-resistance Hash Function DIHA2 Xigen. Yao
2009/273 (PDF ) Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data Rafael Dowsley, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai, Anderson C. A. Nascimento
2009/272 (PDF ) A Conjecture on Binary String and Its Applications on Constructing Boolean Functions of Optimal Algebraic Immunity Ziran Tu, Yingpu Deng
2009/271 (PDF ) Reducing the Ciphertext Size of Dolev-Dwork-Naor like Public Key Cryptosystems Rafael Dowsley, Goichiro Hanaoka, Hideki Imai, Anderson C. A. Nascimento
2009/270 (PDF ) Information-Theoretically Secure Oblivious Polynomial Evaluation in the Commodity-Based Model Rafael Tonicelli, Rafael Dowsley, Goichiro Hanaoka, Hideki Imai, Jörn Müller-Quade, Akira Otsuka, Anderson C. A. Nascimento
2009/269 (PDF ) Side-channel attacks based on linear approximations Thomas Roche, Cédric Tavernier
2009/267 (PDF ) Simulation based security in the applied pi calculus Stéphanie Delaune, Steve Kremer, Olivier Pereira
2009/266 (PDF ) Pseudorandomness Analysis of the Lai-Massey Scheme Yiyuan Luo, Xuejia Lai, Zheng Gong, Zhongming Wu
2009/265 (PDF ) Revisiting the Indifferentiability of PGV Hash Functions Yiyuan Luo, Zheng Gong, Ming Duan, Bo Zhu, Xuejia Lai
2009/264 (PDF ) Proposal of PPS Multivariate Public Key Cryptosystems Shigeo Tsujii, Kohtaro Tadaki, Masahito Gotaishi, Ryo Fujita, Masao Kasahara
2009/263 (PDF ) General Error Decodable Secret Sharing Scheme and Its Application Kaoru Kurosawa
2009/262 (PDF ) Computationally Secure Two-Round Authenticated Message Exchange Klaas Ole Kuertz, Henning Schnoor, Thomas Wilke
2009/261 (PDF ) Security of Cyclic Double Block Length Hash Functions including Abreast-DM Ewan Fleischmann, Michael Gorski, Stefan Lucks
2009/260 (PDF ) A Study on RAM Requirements of Various SHA-3 Candidates on Low-cost 8-bit CPUs Kota Ideguchi, Toru Owada, Hirotaka Yoshida
2009/258 (PDF ) FACTORIZATION WITH GENUS 2 CURVES Romain COSSET
2009/257 (PDF ) FORMAT CONTROLLING ENCRYPTION USING DATATYPE PRESERVING ENCRYPTION Ulf T. Mattsson
2009/256 (PDF ) Multiple Linear Cryptanalysis of Reduced-Round SMS4 Block Cipher Zhiqiang Liu, Dawu Gu, Jing Zhang
2009/255 (PDF ) SIMPL Systems: On a Public Key Variant of Physical Unclonable Functions Ulrich Rührmair
2009/254 (PDF ) Improvement of One Quantum Encryption Scheme Zhengjun Cao
2009/253 (PDF ) Formally and Practically Relating the CK, CK-HMQV, and eCK Security Models for Authenticated Key Exchange Cas J. F. Cremers
2009/252 (PDF ) Sparse Boolean equations and circuit lattices Igor Semaev
2009/251 (PDF ) Format-Preserving Encryption Mihir Bellare, Thomas Ristenpart, Phillip Rogaway, Till Stegers
2009/249 (PDF ) Symbolic Encryption with Pseudorandom Keys Daniele Micciancio
2009/248 (PDF ) Cryptanalysis of the MST_3 Public Key Cryptosystem Simon R. Blackburn, Carlos Cid, Ciaran Mullan
2009/247 (PDF ) On the Necessary and Sufficient Assumptions for UC Computation Ivan Damgård, Jesper Buus Nielsen, Claudio Orlandi
2009/246 (PDF ) On-Chip Electric Waves: An Analog Circuit Approach to Physical Uncloneable Functions György Csaba, Xueming Ju, Qingqing Chen, Wolfgang Porod, Jürgen Schmidhuber, Ulf Schlichtmann, Paolo Lugli, Ulrich Rührmair
2009/245 (PDF ) Cryptanalysis of the Birational Permutation Signature Scheme over a Non-commutative Ring Naoki Ogura, Shigenori Uchiyama
2009/244 (PDF ) Tardos Fingerprinting Codes in the Combined Digit Model Boris Skoric, Stefan Katzenbeisser, Hans Georg Schaathun, Mehmet U. Celik
2009/243 (PDF ) Faster Pairings on Special Weierstrass Curves Craig Costello, Huseyin Hisil, Colin Boyd, Juan Manuel Gonzalez Nieto, Kenneth Koon-Ho Wong
2009/242 (PDF ) Examples of differential multicollisions for 13 and 14 rounds of AES-256 Alex Biryukov, Dmitry Khovratovich, Ivica Nikolić
2009/241 (PDF ) Distinguisher and Related-Key Attack on the Full AES-256 (Extended Version) Alex Biryukov, Dmitry Khovratovich, Ivica Nikolić
2009/240 (PDF ) Group Testing and Batch Verification Gregory M. Zaverucha, Douglas R. Stinson
2009/239 (PDF ) Protecting the NOEKEON Cipher Against SCARE Attacks in FPGAs by using Dynamic Implementations Julien Bringer, Herve Chabanne, Jean-Luc Danger
2009/238 (PDF ) Attacks on Round-Reduced BLAKE LI Ji, XU Liangyu
2009/237 (PDF ) Remarks on One Arbitrated Quantum-signature Scheme Zhengjun Cao
2009/236 (PDF ) Elliptic curves with weak coverings over cubic extensions of finite fields with odd characteristics Fumiyuki Momose, Jinhui Chao
2009/235 (PDF ) Breaking and Fixing of an Identity Based Multi-Signcryption Scheme S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
2009/234 (PDF ) On the Randomness and Regularity of Reduced EDON-$\mathcal{R}$ Compression Function Rune Steinsmo Ødegård, Danilo Gligoroski
2009/233 (PDF ) A strategy for recovering roots of bivariate polynomials modulo a prime Paula Bustillo, Domingo Gomez, Jaime Gutierrez, Alvar Ibeas
2009/232 (PDF ) MeshHash2 Björn Fay
2009/231 (PDF ) Practical DPA Attacks on MDPL Elke De Mulder, Benedikt Gierlichs, Bart Preneel, Ingrid Verbauwhede
2009/230 (PDF ) Adaptively Secure Broadcast Martin Hirt, Vassilis Zikas
2009/229 (PDF ) Hardware Implementations of a Variant of the Zémor-Tillich Hash Function: Can a Provably Secure Hash Function be very efficient ? Giacomo de Meulenaer, Christophe Petit, Jean-Jacques Quisquater
2009/228 (PDF ) Revisiting Higher-Order DPA Attacks: Multivariate Mutual Information Analysis Benedikt Gierlichs, Lejla Batina, Bart Preneel, Ingrid Verbauwhede
2009/227 (PDF ) Computational soundness, co-induction, and encryption cycles Daniele Micciancio
2009/226 (PDF ) How to Hash into Elliptic Curves Thomas Icart
2009/225 (PDF ) The Security of Abreast-DM in the Ideal Cipher Model Jooyoung Lee, Daesung Kwon
2009/224 (PDF ) Pseudo-Cryptanalysis of Luffa Keting Jia, Yvo Desmedt, Lidong Han, Xiaoyun Wang
2009/223 (PDF ) How To Find Weak Input Differences For MD5 Collision Attacks Tao Xie, Dengguo Feng
2009/222 (PDF ) PET SNAKE: A Special Purpose Architecture to Implement an Algebraic Attack in Hardware Willi Geiselmann, Kenneth Matheis, Rainer Steinwandt
2009/221 (PDF ) Boneh-Boyen signatures and the Strong Diffie-Hellman problem David Jao, Kayo Yoshida
2009/220 (PDF ) Signature Schemes with Bounded Leakage Resilience Jonathan Katz
2009/219 (PDF ) Strongly Secure Certificateless Key Agreement Georg Lippold, Colin Boyd, Juan González Nieto
2009/218 (PDF ) Efficient FPGA Implementations of High-Dimensional Cube Testers on the Stream Cipher Grain-128 Jean-Philippe Aumasson, Itai Dinur, Luca Henzen, Willi Meier, Adi Shamir
2009/217 (PDF ) Pseudo-Random Functions and Parallelizable Modes of Operations of a Block Cipher Palash Sarkar
2009/216 (PDF ) Tweakable Enciphering Schemes Using Only the Encryption Function of a Block Cipher Palash Sarkar
2009/215 (PDF ) A Simple and Generic Construction of Authenticated Encryption With Associated Data Palash Sarkar
2009/214 (PDF ) An Optimally Fair Coin Toss Tal Moran, Moni Naor, Gil Segev
2009/213 (PDF ) Elliptic Curves in Montgomery Form with B=1 and Their Low Order Torsion Richard Moloney, Gary McGuire, Michael Markowitz
2009/211 (PDF ) Bringing Zero-Knowledge Proofs of Knowledge to Practice Endre Bangerter, Stefania Barzan, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider, Joe-Kai Tsay
2009/210 (PDF ) Sufficient conditions for sound tree and sequential hashing modes Guido Bertoni, Joan Daemen, Michael Peeters, Gilles Van Assche
2009/209 (PDF ) On Directed Transitive Signature Jia Xu, Ee-Chien Chang, Jianying Zhou
2009/208 (PDF ) PUBLIC KEY CRYPTOGRAPHY USING PERMUTATION P-POLYNOMIALS OVER FINITE FIELDS Rajesh P Singh, B. K. Sarma, A. Saikia
2009/206 (PDF ) On Optimized FPGA Implementations of the SHA-3 Candidate Groestl Bernhard Jungk, Steffen Reith, Juergen Apfelbeck
2009/205 (PDF ) Related Message Attacks to Public Key Encryption Schemes: Relations among Security Notions Maria Isabel Gonzalez Vasco, Angel L. Perez del Pozo
2009/204 (PDF ) GUC-Secure Join Operator in Distributed Relational Database TIAN Yuan
2009/203 (PDF ) Practical Cryptanalysis of ISO/IEC 9796-2 and EMV Signatures Jean-Sebastien Coron, David Naccache, Mehdi Tibouchi, Ralf-Philipp Weinmann
2009/202 (PDF ) A GENERALIZED FRAMEWORK FOR CRISP COMMITMENT SCHEMES Alawi A. Al-Saggaf, Acharya H. S.
2009/201 (PDF ) Enhanced Cryptanalysis of Substitution Cipher Chaining mode (SCC-128) Mohamed Abo El-Fotouh, Klaus Diepold
2009/200 (PDF ) A Survey on the Evolution of Cryptographic Protocols in ePassports Rishab Nithyanand
2009/199 (PDF ) Indifferentiability with Distinguishers: Why Shabal\Does Not Require Ideal Ciphers Emmanuel Bresson, Anne Canteaut, Benoit Chevallier-Mames, Christophe Clavier, Thomas Fuhr, Aline Gouget, Thomas Icart, Jean-Francois Misarsky, Maria Naya-Plasencia, Pascal Paillier, Thomas Pornin, Jean-Rene Reinhard, Celine Thuillet, Marion Videau
2009/197 (PDF ) Practical pseudo-collisions for hash functions ARIRANG-224/384 Jian Guo, Krystian Matusiewicz, Lars R. Knudsen, San Ling, Huaxiong Wang
2009/196 (PDF ) Analysis of one quantum bit string commitment Zhengjun Cao
2009/195 (PDF ) Secure Evaluation of Private Linear Branching Programs with Medical Applications Mauro Barni, Pierluigi Failla, Vladimir Kolesnikov, Riccardo Lazzeretti, Ahmad-Reza Sadeghi, Thomas Schneider
2009/194 (PDF ) Analysis and Enhance of Anonymous Signcryption Scheme Mingwu Zhang, Yusheng Zhong, Pengcheng Li, Bo Yang
2009/193 (PDF ) Generalization of Barreto et al ID based Signcryption Scheme Sunder Lal, Prashant Kushwah
2009/192 (PDF ) Linkability of Blind Signature Schemes over Braid Groups Manoj Kumar
2009/191 (PDF ) New logic minimization techniques with applications to cryptology. Joan Boyar, Rene Peralta
2009/190 (PDF ) The discrete logarithm problem in the group of non-singular circulant matrices Ayan Mahalanobis
2009/189 (PDF ) Efficient Unidirectional Proxy Re-Encryption Sherman S. M. Chow, Jian Weng, Yanjiang Yang, Robert H. Deng
2009/188 (PDF ) Breaking and Building of Group Inside Signature S. Sree Vivek, S. Sharmila Deva Selvi, S. Gopinath, C. Pandu Rangan
2009/187 (PDF ) Compact McEliece Keys from Goppa Codes Rafael Misoczki, Paulo S. L. M. Barreto
2009/186 (PDF ) Statistics of Random Permutations and the Cryptanalysis of Periodic Block Ciphers Nicolas T. Courtois, Gregory V. Bard, Shaun V. Ault
2009/185 (PDF ) All-or-Nothing Transforms as a Countermeasure to Differential Side-Channel Analysis Robert P. McEvoy, Michael Tunstall, Claire Whelan, Colin C. Murphy, William P. Marnane
2009/184 (PDF ) Cryptanalysis of Dynamic SHA(2) Jean-Philippe Aumasson, Orr Dunkelman, Sebastiaan Indesteege, Bart Preneel
2009/183 (PDF ) Proactive Linear Integer Secret Sharing Rune Thorbek
2009/182 (PDF ) Extended Substitution Cipher Chaining mode (ESCC) Mohamed Abo El-Fotouh, Klaus Diepold
2009/181 (PDF ) PSP: Private and Secure Payment with RFID Erik-Oliver Blass, Anil Kurmus, Refik Molva, Thorsten Strufe
2009/180 (PDF ) Collaborative, Privacy-Preserving Data Aggregation at Scale Haakon Ringberg, Benny Applebaum, Michael J. Freedman, Matthew Caesar, Jennifer Rexford
2009/179 (PDF ) Near-Collision Attack on the Compression Function of Dynamic SHA2 Hongbo Yu, Xiaoyun Wang
2009/178 (PDF ) Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure (Revised Version) Jiali Choy, Guanhan Chew, Khoongming Khoo, Huihui Yap
2009/177 (PDF ) Salvaging Merkle-Damgard for Practical Applications Yevgeniy Dodis, Thomas Ristenpart, Thomas Shrimpton
2009/176 (PDF ) A novel multi-server authentication protocol Yalin Chen, Chun-Hui Huang, Jue-Sam Chou
2009/175 (PDF ) Concrete Security for Entity Recognition: The Jane Doe Protocol (Full Paper) Stefan Lucks, Erik Zenner, Andre Weimerskirch, Dirk Westhoff
2009/174 (PDF ) Making the Diffie-Hellman Protocol Identity-Based Dario Fiore, Rosario Gennaro
2009/173 (PDF ) Fast Multibase Methods and Other Several Optimizations for Elliptic Curve Scalar Multiplication Patrick Longa, Catherine Gebotys
2009/172 (PDF ) A new Protocol for 1-2 Oblivious Transfer Bjoern Grohmann
2009/171 (PDF ) On the Theory and Practice of Personal Digital Signatures Ivan Damgård, Gert Læssøe Mikkelsen
2009/170 (PDF ) Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu
2009/169 (PDF ) Floating Fault analysis of Trivium under Weaker Assumptions Hu Yupu, Gao Juntao, Liu Qing
2009/168 (PDF ) A Second Pre-image Attack Against Elliptic Curve Only Hash (ECOH) Michael A. Halcrow, Niels Ferguson
2009/167 (PDF ) A new approach for FCSRs François Arnault, Thierry Berger, Cédric Lauradoux, Marine Minier, Benjamin Pousse
2009/166 (PDF ) I shall love you up to the death Valerie Nachef, Jacques Patarin
2009/165 (PDF ) Securing RSA against Fault Analysis by Double Addition Chain Exponentiation Matthieu Rivain
2009/164 (PDF ) CCA-Secure Proxy Re-Encryption without Pairings Jun Shao, Zhenfu Cao
2009/163 (PDF ) A New Key-Agreement-Protocol Bjoern Grohmann
2009/162 (PDF ) Certificateless Hybrid Signcryption Fagen Li, Masaaki Shirase, Tsuyoshi Takagi
2009/161 (PDF ) Built-in Determined Sub-key Correlation Power Analysis Yuichi Komano, Hideo Shimizu, Shinichi Kawamura
2009/160 (PDF ) Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model Joel Alwen, Yevgeniy Dodis, Daniel Wichs
2009/159 (PDF ) Hardware Implementation of the SHA-3 Candidate Skein Stefan Tillich
2009/158 (PDF ) Security Analysis of a Proxy Signature Scheme over Braid Groups Manoj Kumar
2009/157 (PDF ) Efficient Halving for Genus 3 Curves over Binary Fields Peter Birkner, Nicolas Thériault
2009/156 (PDF ) A Deterministic Approach of Merging of Blocks in Transversal Design based Key Predistribution Anupam Pattanayak, B. Majhi
2009/155 (PDF ) Faster Computation of the Tate Pairing Christophe Arene, Tanja Lange, Michael Naehrig, Christophe Ritzenthaler
2009/154 (PDF ) Algorithms to solve massively under-defined systems of multivariate quadratic equations Yasufumi Hashimoto
2009/153 (PDF ) A new bound for t−wise almost universal hash functions Long Hoang Nguyen, A. W. Roscoe
2009/151 (PDF ) Euclid's Algorithm, Guass' Elimination and Buchberger's Algorithm Shaohua Zhang
2009/150 (PDF ) Efficient group authentication protocols based on human interaction Long Hoang Nguyen, A. W. Roscoe
2009/149 (PDF ) Secure EPC Gen2 compliant Radio Frequency Identification Mike Burmester, Breno de Medeiros, Jorge Munilla, Alberto Peinado
2009/148 (PDF ) Secret Handshake: Strong Anonymity Definition and Construction Yutaka Kawai, Kazuki Yoneyama, Kazuo Ohta
2009/147 (PDF ) Preimage Attack on ARIRANG Deukjo Hong, Woo-Hwan Kim, Bonwook Koo
2009/146 (PDF ) Transferable Constant-Size Fair E-Cash Georg Fuchsbauer, David Pointcheval, Damien Vergnaud
2009/145 (PDF ) Security of Permutation-based Compression Function lp 231 Jooyoung Lee, Daesung Kwon
2009/144 (PDF ) On the security of Identity Based Ring Signcryption Schemes S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
2009/143 (PDF ) Multiple and Unlinkable Public Key Encryption without Certificates Soyoung Park, Sang-Ho Lee, Joohan Lee
2009/142 (PDF ) Chosen-ciphertext Secure Encryption from Hard Algebraic Set Systems Ronald Cramer, Dennis Hofheinz, Eike Kiltz
2009/141 (PDF ) Ideal Hierarchical Secret Sharing Schemes Oriol Farras, Carles Padro
2009/140 (PDF ) The Analysis of Galois Substitution Counter Mode (GSCM) Mohamed Abo El-Fotouh, Klaus Diepold
2009/139 (PDF ) Certificateless Group Oriented Signature Secure Against Key Replacement Attack Chunbo Ma, Jun Ao
2009/138 (PDF ) A Hybrid RFID Protocol against Tracking Attacks Jen-Chun Chang, Hsin-Lung Wu
2009/137 (PDF ) The Dark Side of Security by Obscurity and Cloning MiFare Classic Rail and Building Passes Anywhere, Anytime Nicolas T. Courtois
2009/136 (PDF ) How to Extract and Expand Randomness: A Summary and Explanation of Existing Results Yvonne Cliff, Colin Boyd, Juan Gonzalez Nieto
2009/135 (PDF ) Practical Key Recovery Attack against Secret-prefix Edon-R Gaëtan Leurent
2009/134 (PDF ) A First Order Recursive Construction of Boolean Function with Optimum Algebraic Immunity Yindong Chen, Peizhong Lu
2009/131 (PDF ) Key Predistribution Schemes in Distributed Wireless Sensor Network using Combinatorial Designs Revisited Anupam Pattanayak, B. Majhi
2009/130 (PDF ) Constructions of Even-variable Boolean Function with Optimum Algebraic Immunity Yindong Chen, Peizhong Lu
2009/129 (PDF ) Faster and Timing-Attack Resistant AES-GCM Emilia Kasper, Peter Schwabe
2009/128 (PDF ) Attacks on a Lightweight Cipher Based on a Multiple Recursive Generator Lu Xiao, Gregory G. Rose
2009/127 (PDF ) Side Channel Cube Attacks on Block Ciphers Itai Dinur, Adi Shamir
2009/126 (PDF ) Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems Siamak F Shahandashti, Reihaneh Safavi-Naini
2009/125 (PDF ) A Full Key Recovery Attack on HMAC-AURORA-512 Yu Sasaki
2009/124 (PDF ) Practical Secure Evaluation of Semi-Private Functions Annika Paus, Ahmad-Reza Sadeghi, Thomas Schneider
2009/123 (PDF ) On the Complexity of Integer Factorization N. A. Carella
2009/122 (PDF ) Hardware Accelerator for the Tate Pairing in Characteristic Three Based on Karatsuba-Ofman Multipliers Jean-Luc Beuchat, Jérémie Detrey, Nicolas Estibals, Eiji Okamoto, Francisco Rodríguez-Henríquez
2009/120 (PDF ) On the Complexity of Khovratovich et.al's Preimage Attack on Edon-R Danilo Gligoroski, Rune Steinsmo Ødegård
2009/119 (PDF ) A Continuous Fault Countermeasure for AES Providing a Constant Error Detection Rate Marcel Medwed
2009/118 (PDF ) A2BE: Accountable Attribute-Based Encryption for Abuse Free Access Control Jin Li, Kui Ren, Kwangjo Kim
2009/117 (PDF ) Changing probabilities of differentials and linear sums via isomorphisms of ciphers Alexander Rostovtsev
2009/116 (PDF ) Information Theoretically Secure Multi Party Set Intersection Re-Visited Arpita Patra, Ashish Choudhary, C. Pandu Rangan
2009/115 (PDF ) Scalable Compilers for Group Key Establishment : Two/Three Party to Group S. Sree Vivek, S. Sharmila Deva Selvi, Deepanshu Shukla, C. Pandu Rangan
2009/114 (PDF ) Weakness of Key Predistribution Scheme Proposed by J. Dong et al. Anupam Pattanayak, B. Majhi
2009/113 (PDF ) Attacks on AURORA-512 and the Double-Mix Merkle-Damgaard Transform Niels Ferguson, Stefan Lucks
2009/112 (PDF ) A 2nd-Preimage Attack on AURORA-512 Yu Sasaki
2009/111 (PDF ) Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate Marc Stevens, Alexander Sotirov, Jacob Appelbaum, Arjen Lenstra, David Molnar, Dag Arne Osvik, Benne de Weger
2009/110 (PDF ) On the Security of Stream Cipher CryptMT v3 Haina Zhang, Xiaoyun Wang
2009/109 (PDF ) Cryptanalysis of Stream Cipher Grain Family Haina Zhang, Xiaoyun Wang
2009/108 (PDF ) Further Results on Implicit Factoring in Polynomial Time Santanu Sarkar, Subhamoy Maitra
2009/107 (PDF ) Compact E-Cash and Simulatable VRFs Revisited Mira Belenkiy, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya
2009/106 (PDF ) A Collision Attack on AURORA-512 Yu Sasaki
2009/105 (PDF ) Public-Key Cryptosystems Resilient to Key Leakage Moni Naor, Gil Segev
2009/104 (PDF ) 1024 - A High Security Software Oriented Block Cipher Dieter Schmidt
2009/103 (PDF ) Constructing pairing-friendly hyperelliptic curves using Weil restriction David Mandell Freeman, Takakazu Satoh
2009/102 (PDF ) A Step Towards QC Blind Signatures Raphael Overbeck
2009/101 (PDF ) Encryption Schemes Secure under Selective Opening Attack Mihir Bellare, Scott Yilek
2009/100 (PDF ) Computing the endomorphism ring of an ordinary elliptic curve over a finite field Gaetan Bisson, Andrew V. Sutherland
2009/099 (PDF ) A Single Initialization Server for Multi-Party Cryptography Hugue Blier, Alain Tapp
2009/098 (PDF ) Attacking Cryptographic Schemes Based on "Perturbation Polynomials" Martin Albrecht, Craig Gentry, Shai Halevi, Jonathan Katz
2009/097 (PDF ) Identification of Multiple Invalid Signatures in Pairing-based Batched Signatures Brian J. Matt
2009/096 (PDF ) A note on the security of MST3 M. I. Gonzalez Vasco, A. L. Perez del Pozo, P. Taborda Duarte
2009/095 (PDF ) Enhanced Privacy ID from Bilinear Pairing Ernie Brickell, Jiangtao Li
2009/094 (PDF ) On the Lower Bounds of the Second Order Nonlinearity of some Boolean Functions Sugata Gangopadhyay, Sumanta Sarkar, Ruchi Telang
2009/093 (PDF ) Cascade Encryption Revisited Peter Gazi, Ueli Maurer
2009/092 (PDF ) Reducing RFID Reader Load with the Meet-in-the-Middle Strategy Jung Hee Cheon, Jeongdae Hong, Gene Tsudik
2009/091 (PDF ) Knapsack Cryptosystem on Elliptic Curves Koichiro Noro, Kunikatsu Kobayashi
2009/090 (PDF ) A Brief History of Provably-Secure Public-Key Encryption Alexander W. Dent
2009/089 (PDF ) A Provably Secure And Efficient Countermeasure Against Timing Attacks Boris Köpf, Markus Dürmuth
2009/088 (PDF ) Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security Brett Hemenway, Benoit Libert, Rafail Ostrovsky, Damien Vergnaud
2009/086 (PDF ) Point Compression for Koblitz Elliptic Curves P. N. J. Eagle, Steven D. Galbraith, John Ong
2009/085 (PDF ) UC-Secure Source Routing Protocol Tao Feng, Xian Guo, Jianfeng Ma, Xinghua Li
2009/084 (PDF ) Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters' IBE Scheme Mihir Bellare, Thomas Ristenpart
2009/083 (PDF ) Multi-authority attribute based encryption with honest-but-curious central authority Vladimir Bozovic, Daniel Socek, Rainer Steinwandt, Viktoria I. Villanyi
2009/082 (PDF ) The Case for Quantum Key Distribution Douglas Stebila, Michele Mosca, Norbert Lütkenhaus
2009/081 (PDF ) Ensuring Data Storage Security in Cloud Computing Cong Wang, Qian Wang, Kui Ren, Wenjing Lou
2009/080 (PDF ) CoSP: A General Framework For Computational Soundness Proofs Michael Backes, Dennis Hofheinz, Dominique Unruh
2009/079 (PDF ) From Dolev-Yao to Strong Adaptive Corruption: Analyzing Security in the Presence of Compromising Adversaries David Basin, Cas Cremers
2009/078 (PDF ) Attacks on the DECT authentication mechanisms Stefan Lucks, Andreas Schuler, Erik Tews, Ralf-Philipp Weinmann, Matthias Wenzel
2009/077 (PDF ) On the Security of Iterated Hashing based on Forgery-resistant Compression Functions Charles Bouillaguet, Orr Dunkelman, Pierre-Alain Fouque, Antoine Joux
2009/076 (PDF ) Construction of large families of pseudorandom subsets using elliptic curves Zhixiong Chen, Chenhuang Wu
2009/075 (PDF ) Security of Practical Cryptosystems Using Merkle-Damgard Hash Function in the Ideal Cipher Model Yusuke Naito, Kazuki Yoneyama, Lei Wang, Kazuo Ohta
2009/074 (PDF ) Computational Oblivious Transfer and Interactive Hashing Kirill Morozov, George Savvides
2009/073 (PDF ) Automatic Approach of Provable Security and its Application for OAEP+ GU Chun-Xiang, Guang Yan, ZHU Yue-Fei
2009/072 (PDF ) Implementing cryptographic pairings: a magma tutorial Luis J Dominguez Perez, Ezekiel J Kachisa, Michael Scott
2009/071 (PDF ) Secret sharing on trees: problem solved Laszlo Csirmaz, Gabor Tardos
2009/070 (PDF ) Low Complexity Cubing and Cube Root Computation over $\F_{3^m}$ in Polynomial Basis Omran Ahmadi, Francisco Rodríguez-Henriquez
2009/069 (PDF ) Optimistic Fair Exchange with Multiple Arbiters Alptekin Kupcu, Anna Lysyanskaya
2009/068 (PDF ) Overview of Turbo-Code Reconstruction Techniques Johann Barbier, Eric Filiol
2009/067 (PDF ) On fractional correlation immunity of majority functions Chuan-Kun Wu
2009/066 (PDF ) Adaptive Preimage Resistance and Permutation-based Hash Functions Jooyoung Lee, Je Hong Park
2009/065 (PDF ) Foundations of Non-Malleable Hash and One-Way Functions Alexandra Boldyreva, David Cash, Marc Fischlin, Bogdan Warinschi
2009/064 (PDF ) On the Data Complexity of Statistical Attacks Against Block Ciphers (full version) Céline Blondeau, Benoît Gérard
2009/063 (PDF ) CCZ-equivalence and Boolean functions Lilya Budaghyan, Claude Carlet
2009/062 (PDF ) On Deterministic Polynomial-Time Equivalence of Computing the CRT-RSA Secret Keys and Factoring Subhamoy Maitra, Santanu Sarkar
2009/061 (PDF ) Security Enhancement of Various MPKCs by 2-layer Nonlinear Piece In Hand Method Shigeo Tsujii, Kohtaro Tadaki, Ryou Fujita, Masahito Gotaishi, Toshinobu Kaneko
2009/060 (PDF ) Comparing Two Pairing-Based Aggregate Signature Schemes Sanjit Chatterjee, Darrel Hankerson, Edward Knapp, Alfred Menezes
2009/059 (PDF ) On the impossibility of graph secret sharing Laszlo Csirmaz
2009/058 (PDF ) On Generalization of Cheon's Algorithm Takakazu Satoh
2009/057 (PDF ) Anonymity in Shared Symmetric Key Primitives Gregory M. Zaverucha, Douglas R. Stinson
2009/056 (PDF ) Designing an ASIP for Cryptographic Pairings over Barreto-Naehrig Curves David Kammler, Diandian Zhang, Peter Schwabe, Hanno Scharwaechter, Markus Langenberg, Dominik Auras, Gerd Ascheid, Rainer Leupers, Rudolf Mathar, Heinrich Meyr
2009/055 (PDF ) Universally Composable Symmetric Encryption Ralf Kuesters, Max Tuengerthal
2009/054 (PDF ) On the Security of Tandem-DM Ewan Fleischmann, Michael Gorski, Stefan Lucks
2009/053 (PDF ) New commutative semifields defined by PN multinomials Lilya Budaghyan, Tor Helleseth
2009/052 (PDF ) ON THE SECURITY OF TWO RING SIGNCRYPTION SCHEMES S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan
2009/051 (PDF ) Enhanced Target Collision Resistant Hash Functions Revisited Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu
2009/050 (PDF ) On the Portability of Generalized Schnorr Proofs Jan Camenisch, Aggelos Kiayias, Moti Yung
2009/049 (PDF ) Extensions of the Cube Attack based on Low Degree Annihilators Aileen Zhang, Chu-Wee Lim, Khoongming Khoo, Wei Lei, Josef Pieprzyk
2009/048 (PDF ) A Trade-Off Between Collision Probability and Key Size in Universal Hashing Using Polynomials Palash Sarkar
2009/047 (PDF ) On Approximating Addition by Exclusive OR Palash Sarkar
2009/046 (PDF ) Traceability Codes Simon R. Blackburn, Tuvi Etzion, Siaw-Lynn Ng
2009/045 (PDF ) Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries Carmit Hazay, Yehuda Lindell
2009/044 (PDF ) Un-Trusted-HB: Security Vulnerabilities of Trusted-HB Dmitry Frumkin, Adi Shamir
2009/043 (PDF ) Image Encryption by Pixel Property Separation Karthik Chandrashekar Iyer, Aravinda Subramanya
2009/042 (PDF ) On CCZ-equivalence and its use in secondary constructions of bent functions Lilya Budaghyan, Claude Carlet
2009/041 (PDF ) Proofs of Retrievability via Hardness Amplification Yevgeniy Dodis, Salil Vadhan, Daniel Wichs
2009/040 (PDF ) How to Prove the Security of Practical Cryptosystems with Merkle-Damgård Hashing by Adopting Indifferentiability Yusuke Naito, Kazuki Yoneyama, Lei Wang, Kazuo Ohta
2009/039 (PDF ) Key Insulation and Intrusion Resilience Over a Public Channel Mihir Bellare, Shanshan Duan, Adriana Palacio
2009/038 (PDF ) On Algebraic Relations of Serpent S-Boxes Bhupendra Singh, Lexy Alexander, Sanjay Burman
2009/037 (PDF ) Common Modulus Attacks on Small Private Exponent RSA and Some Fast Variants (in Practice) M. Jason Hinek, Charles C. Y. Lam
2009/036 (PDF ) Constructions of Truly Practical Secure Protocols using Standard Smartcards Carmit Hazay, Yehuda Lindell
2009/035 (PDF ) Key-Exposure Free Chameleon Hashing and Signatures Based on Discrete Logarithm Systems Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Baodian Wei, Kwangjo Kim
2009/034 (PDF ) On a Conditional Collision Attack on NaSHA-512 S. Markovski, A. Mileva, V. Dimitrova, D. Gligoroski
2009/033 (PDF ) NESHA-256, NEw 256-bit Secure Hash Algorithm (Extended Abstract) Yaser Esmaeili Salehani, Amir Tabatabaei, Mohammad Reza Sohizadeh Abyaneh, Mehdi Mohammad Hassanzadeh
2009/032 (PDF ) A Fast Implementation of $\eta_T$ Pairing in Characteristic Three on Intel Core 2 Duo Processor MITSUNARI Shigeo
2009/031 (PDF ) Adaptively Secure Two-Party Computation with Erasures Yehuda Lindell
2009/030 (PDF ) An efficient fuzzy extractor for limited noise B. Skoric, P. Tuyls
2009/029 (PDF ) Nofish - A new stream cipher Marius Oliver Gheorghita
2009/028 (PDF ) Realizing Hash-and-Sign Signatures under Standard Assumptions Susan Hohenberger, Brent Waters
2009/027 (PDF ) Security of Verifiably Encrypted Signatures Markus Rückert, Dominique Schröder
2009/026 (PDF ) Collision Attacks on NaSHA-384/512 Zhimin Li, Licheng Wang, Daofeng Li, Yixian Yang
2009/025 (PDF ) Short Redactable Signatures Using Random Trees Ee-Chien Chang, Chee Liang Lim, Jia Xu
2009/024 (PDF ) On Second-Order Fault Analysis Resistance for CRT-RSA Implementations Emmanuelle Dottax, Christophe Giraud, Matthieu Rivain, Yannick Sierra
2009/023 (PDF ) Polynomial Runtime and Composability Dennis Hofheinz, Dominique Unruh, Jörn Müller-Quade
2009/022 (PDF ) Correctness of Li Generalization of RSA Cryptosystem Roman Popovych
2009/021 (PDF ) Comparing With RSA Julien Cathalo, David Naccache, Jean-Jacques Quisquater
2009/020 (PDF ) Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack Jiali Choy, Khoongming Khoo, Chuan-Wen Loe
2009/019 (PDF ) Communication-Efficient Private Protocols for Longest Common Subsequence Matthew Franklin, Mark Gondree, Payman Mohassel
2009/018 (PDF ) Huge 2ndpreimages and collisions of khichidi-1 prasanth Kumar Thandra, S. A. V. Satya Murty
2009/017 (PDF ) Anonymous signature scheme Chunbo Ma, Jun Ao
2009/016 (PDF ) Fast elliptic-curve cryptography on the Cell Broadband Engine Neil Costigan, Peter Schwabe
2009/015 (PDF ) Cube Attacks on Trivium S S Bedi, N Rajesh Pillai
2009/014 (PDF ) Key Predistribution Techniques for Grid-Based Wireless Sensor Networks Simon R. Blackburn, Tuvi Etzion, Keith M. Martin, Maura B. Paterson
2009/013 (PDF ) Comparison-Based Key Exchange and the Security of the Numeric Comparison Mode in Bluetooth v2.1 Yehuda Lindell
2009/012 (PDF ) Avoid Mask Re-use in Masked Galois Multipliers D. Canright
2009/011 (PDF ) A Very Compact "Perfectly Masked" S-Box for AES (corrected) D. Canright, Lejla Batina
2009/010 (PDF ) Optimal Multicast Group Communication Zhibin Zhou, Dijiang Huang
2009/009 (PDF ) Hybrid-Secure MPC: Trading Information-Theoretic Robustness for Computational Privacy Christoph Lucas, Dominik Raub, Ueli Maurer
2009/008 (PDF ) A note on Agrawal conjecture Roman Popovych
2009/007 (PDF ) Homomorphic Trapdoor Commitments to Group Elements Jens Groth
2009/006 (PDF ) Huge Multicollisions and Multipreimages of Hash Functions BLENDER-n Vlastimil Klima
2009/005 (PDF ) Impossible Differential Cryptanalysis of Pelican, MT-MAC-AES and PC-MAC-AES Wei Wang, Xiaoyun Wang, Guangwu Xu
2009/003 (PDF ) Separating two roles of hashing in one-way message authentication L. H. Nguyen, A. W. Roscoe
2009/002 (PDF ) Thermocommunication Julien Brouchier, Nora Dabbous, Tom Kean, Carol Marsh, David Naccache
2009/001 (PDF ) A Hardware Analysis of Twisted Edwards Curves for an Elliptic Curve Cryptosystem Brian Baldwin, Richard Moloney, Andrew Byrne, Gary McGuire, William P. Marnane
2008/545 (PDF ) Resolving the Simultaneous Resettability Conjecture and a New Non-Black-Box Simulation Strategy Vipul Goyal, Amit Sahai
2008/544 (PDF ) Comments on two multi-server authentication protocols Yalin Chen, Chun-Hui Huang, Jue-Sam Chou
2008/543 (PDF ) Odd-Char Multivariate Hidden Field Equations Chia-Hsin Owen Chen, Ming-Shing Chen, Jintai Ding, Fabian Werner, Bo-Yin Yang
2008/542 (PDF ) Distinguishing Attack and Second-Preimage Attack on the CBC-like MACs Keting Jia, Xiaoyun Wang, Zheng Yuan, Guangwu Xu
2008/541 (PDF ) Resettably-Sound Resettable Zero Knowledge Arguments for NP Yi Deng
2008/540 (PDF ) New Impossible Differential Attacks on AES Jiqiang Lu, Orr Dunkelman, Nathan Keller, Jongsung Kim
2008/539 (PDF ) An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials Jan Camenisch, Markulf Kohlweiss, Claudio Soriente
2008/538 (PDF ) Supporting Non-membership Proofs with Bilinear-map Accumulators Ivan Damgård, Nikos Triandopoulos
2008/537 (PDF ) A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol SeongHan Shin, Kazukuni Kobara, Hideki Imai
2008/536 (PDF ) Predicate Privacy in Encryption Systems Emily Shen, Elaine Shi, Brent Waters
2008/535 (PDF ) A Recursive Threshold Visual Cryptography Scheme Abhishek Parakh, Subhash Kak
2008/534 (PDF ) Somewhat Non-Committing Encryption and Efficient Adaptively Secure Oblivious Transfer Juan A. Garay, Daniel Wichs, Hong-Sheng Zhou
2008/533 (PDF ) Collusion-Free Multiparty Computation in the Mediated Model Jonathan Katz, Yehuda Lindell
2008/532 (PDF ) Semi-free start collision attack on Blender Xu Liangyu, Li Ji
2008/531 (PDF ) Collision Attack on the Waterfall Hash Function Scott Fluhrer
2008/530 (PDF ) Fast hashing to G2 on pairing friendly curves Michael Scott, Naomi Benger, Manuel Charlemagne, Luis J. Dominguez Perez, Ezekiel J. Kachisa
2008/529 (PDF ) A Hardware Interface for Hashing Algorithms Zhimin Chen, Sergey Morozov, Patrick Schaumont
2008/528 (PDF ) Encrypting Proofs on Pairings and Its Application to Anonymity for Signatures Georg Fuchsbauer, David Pointcheval
2008/527 (PDF ) Properties of Cryptographic Hash Functions Michal Rjaško
2008/526 (PDF ) Novel Precomputation Schemes for Elliptic Curve Cryptosystems Patrick Longa, Catherine Gebotys
2008/525 (PDF ) On The Diffie-Hellman Assumption R. Bhaskar, K. Chandrasekaran, S. Lokam, P. L. Montgomery, R. Venkatesan, Y. Yacobi
2008/524 (PDF ) Round-Optimal Zero-Knowledge Proofs of Knowledge for NP Li Hongda, Feng dengguo, Li Bao, Xue Haixia
2008/522 (PDF ) Twisted Edwards Curves Revisited Huseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson
2008/521 (PDF ) Generating Shorter Bases for Hard Random Lattices Joel Alwen, Chris Peikert
2008/520 (PDF ) Cryptanalysis of the Hash Function LUX-256 Shuang Wu, Dengguo Feng, Wenling Wu
2008/519 (PDF ) Collision attack on NaSHA-512 Li Ji, Xu Liangyu, Guan Xu
2008/517 (PDF ) Improving the Rules of the DPA Contest Francois-Xavier Standaert, Philippe Bulens, Giacomo de Meulenaer, Nicolas Veyrat-Charvillon
2008/516 (PDF ) Distinguishing and Forgery Attacks on Alred and Its AES-based Instance Alpha-MAC Zheng Yuan, Keting Jia, Wei Wang, Xiaoyun Wang
2008/515 (PDF ) Cryptanalysis of RadioGatun Thomas Fuhr, Thomas Peyrin
2008/514 (PDF ) Noncommutative Polly Cracker-type cryptosystems and chosen-ciphertext security Tapan Rai, Stanislav Bulygin
2008/513 (PDF ) Improved Cryptanalysis of SHAMATA-BC Adem Atalay, Orhun Kara, Ferhat Karakoç
2008/512 (PDF ) A new class of Bent functions in Polynomial Forms Sihem Mesnager
2008/511 (PDF ) Classification of the SHA-3 Candidates Ewan Fleischmann, Christian Forler, Michael Gorski
2008/510 (PDF ) Reconstructing RSA Private Keys from Random Key Bits Nadia Heninger, Hovav Shacham
2008/509 (PDF ) Chosen-Ciphertext Secure Proxy Re-Encryption without Pairings Jian Weng, Robert H. Deng, Shengli Liu, Kefei Chen, Junzuo Lai, Xuan Wang
2008/508 (PDF ) Some Formal Solutions in Side-channel Cryptanalysis - An Introduction Fabrice J. P. R. Pautot
2008/507 (PDF ) A non-delegatable identity-based strong designated verifier signature scheme Bin Wang
2008/506 (PDF ) Unconditionally Secure Message Transmission in Arbitrary Directed Synchronous Networks Tolerating Generalized Mixed Adversary Kannan Srinathan, Arpita Patra, Ashish Choudhary, C. Pandu Rangan
2008/505 (PDF ) --Withdrawn-- removed
2008/504 (PDF ) The $n^c$-Unique Shortest Vector Problem is Hard Vadim Lyubashevsky
2008/503 (PDF ) Non-Malleable Extractors and Symmetric Key Cryptography from Weak Secrets Yevgeniy Dodis, Daniel Wichs
2008/502 (PDF ) Extended Access Structures and Their Cryptographic Applications Vanesa Daza, Javier Herranz, Paz Morillo, Carla Rafols
2008/501 (PDF ) Some Observations on SHAMATA Ewan Fleischmann, Michael Gorski
2008/500 (PDF ) Strongly Secure Authenticated Key Exchange Protocol Based on Computational Diffie-Hellman Problem Hai Huang, Zhenfu Cao
2008/499 (PDF ) Some Observations on HC-128 Subhamoy Maitra, Goutam Paul, Shashwat Raizada
2008/498 (PDF ) Small Odd Prime Field Multivariate PKCs Anna Chen, Ming-Shing Chen, Tien-Ren Chen, Chen-Mou Cheng, Jintai Ding, Eric Kuo, Frost Li, Bo-Yin Yang
2008/497 (PDF ) On the Correctness of An Approach Against Side-channel attacks Peng Wang, Dengguo Feng, Wenling Wu, Liting Zhang
2008/496 (PDF ) Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs Debra L. Cook, Moti Yung, Angelos Keromytis
2008/495 (PDF ) Non-Malleable Obfuscation Ran Canetti, Mayank Varia
2008/494 (PDF ) Key Agreement from Close Secrets over Unsecured Channels Bhavana Kanukurthi, Leonid Reyzin
2008/493 (PDF ) Secure Parameters for SWIFFT Johannes Buchmann, Richard Lindner
2008/492 (PDF ) Modeling Computational Security in Long-Lived Systems, Version 2 Ran Canetti, Ling Cheung, Dilsun Kaynar, Nancy Lynch, Olivier Pereira
2008/491 (PDF ) A CM construction for curves of genus 2 with p-rank 1 Laura Hitt O'Connor, Gary McGuire, Michael Naehrig, Marco Streng
2008/490 (PDF ) On the final exponentiation for calculating pairings on ordinary elliptic curves Michael Scott, Naomi Benger, Manuel Charlemagne, Luis J. Dominguez Perez, Ezekiel J. Kachisa
2008/489 (PDF ) HAIL: A High-Availability and Integrity Layer for Cloud Storage Kevin D. Bowers, Ari Juels, Alina Oprea
2008/488 (PDF ) Efficient Rational Secret Sharing in Standard Communication Networks Georg Fuchsbauer, Jonathan Katz, David Naccache
2008/487 (PDF ) Secure Certificateless Public Key Encryption without Redundancy Yinxia Sun, Futai Zhang
2008/486 (PDF ) Inside the Hypercube Jean-Philippe Aumasson, Eric Brier, Willi Meier, María Naya-Plasencia, Thomas Peyrin
2008/484 (PDF ) Sharp lower bounds on the extractable randomness from non-uniform sources Boris Skoric, Chibuzo Obi, Evgeny Verbitskiy, Berry Schoenmakers
2008/483 (PDF ) Sharing DSS by the Chinese Remainder Theorem Kamer Kaya, Ali Aydın Selçuk
2008/482 (PDF ) The Generic Hardness of Subset Membership Problems under the Factoring Assumption Tibor Jager, Jörg Schwenk
2008/481 (PDF ) Public-Key Cryptosystems from the Worst-Case Shortest Vector Problem Chris Peikert
2008/480 (PDF ) ECM on Graphics Cards Daniel J. Bernstein, Tien-Ren Chen, Chen-Mou Cheng, Tanja Lange, Bo-Yin Yang
2008/479 (PDF ) Formal Proof of Relative Strengths of Security between ECK2007 Model and other Proof Models for Key Agreement Protocols Jinyue Xia, Jiandong Wang, Liming Fang, Yongjun Ren, Shizhu Bian
2008/478 (PDF ) Attribute-Based Encryption with Key Cloning Protection M. J. Hinek, S. Jiang, R. Safavi-Naini, S. F. Shahandashti
2008/477 (PDF ) On a New Formal Proof Model for RFID Location Privacy (Extended Version) Ton van Deursen, Sasa Radomirovic
2008/476 (PDF ) The $F_f$-Family of Protocols for RFID-Privacy and Authentication Erik-Oliver Blass, Anil Kurmus, Refik Molva, Guevara Noubir, Abdullatif Shikfa
2008/475 (PDF ) Sphinx: A Compact and Provably Secure Mix Format George Danezis, Ian Goldberg
2008/474 (PDF ) Access Controls for Oblivious and Anonymous Systems Scott Coull, Matthew Green, Susan Hohenberger
2008/473 (PDF ) Exploring Cipherspace: Combining stream ciphers and block ciphers Sandy Harris
2008/472 (PDF ) Practical attacks against WEP and WPA Martin Beck, Erik Tews
2008/471 (PDF ) Automatic Generation of Sound Zero-Knowledge Protocols Endre Bangerter, Jan Camenisch, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider
2008/470 (PDF ) From Weaknesses to Secret Disclosure in a Recent Ultra-Lightweight RFID Authentication Protocol Paolo D'Arco, Alfredo De Santis
2008/469 (PDF ) Classification and Generation of Disturbance Vectors for Collision Attacks against SHA-1 Stephane Manuel
2008/468 (PDF ) A CCA2 Secure Variant of the McEliece Cryptosystem Nico Döttling, Rafael Dowsley, Jörn Müller-Quade, Anderson C. A. Nascimento
2008/467 (PDF ) Cryptanalysis of EnRUPT Dmitry Khovratovich, Ivica Nikolic
2008/466 (PDF ) Combined (identity-based) public key schemes Maria Isabel Gonzalez Vasco, Florian Hess, Rainer Steinwandt
2008/465 (PDF ) Secure Arithmetic Computation with No Honest Majority Yuval Ishai, Manoj Prabhakaran, Amit Sahai
2008/464 (PDF ) Vortex: A New Family of One Way Hash Functions based on Rijndael Rounds and Carry-less Multiplication Michael Kounavis, Shay Gueron
2008/463 (PDF ) Key-Private Proxy Re-Encryption Giuseppe Ateniese, Karyn Benson, Susan Hohenberger
2008/462 (PDF ) Unconditionally Secure Multiparty Set Intersection Re-Visited Arpita Patra, Ashish Choudhary, C. Pandu Rangan
2008/460 (PDF ) Various Security Analysis of a pfCM-MD Hash Domain Extension and Applications based on the Extension Donghoon Chang, Seokhie Hong, Jaechul Sung, Sangjin Lee
2008/459 (PDF ) A variant of Wiener's attack on RSA Andrej Dujella
2008/458 (PDF ) Complete Fairness in Multi-Party Computation Without an Honest Majority S. Dov Gordon, Jonathan Katz
2008/457 (PDF ) On the Composability of Statistically Secure Bit Commitments Rafael Dowsley, Jeroen van de Graaf, Jörn Müller-Quade, Anderson C. A. Nascimento
2008/456 (PDF ) The Diffie-Hellman problem and generalization of Verheul's theorem Dustin Moody
2008/455 (PDF ) New hash function designs Igor Semaev
2008/454 (PDF ) Complexity of Multiparty Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation Hemanta K. Maji, Manoj Prabhakaran, Mike Rosulek
2008/453 (PDF ) Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification Ahmad-Reza Sadeghi, Thomas Schneider
2008/451 (PDF ) Algebraic Cryptanalysis of MQQ Public Key Cryptosystem by MutantXL Mohamed Saied Emam Mohamed, Jintai Ding, Johannes Buchmann
2008/450 (PDF ) On the Security of Fully Collusion Resistant Traitor Tracing Schemes Yongdong WU, Robert H. Deng
2008/449 (PDF ) A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack Joonsang Baek, Willy Susilo, Joseph K. Liu, Jianying Zhou
2008/448 (PDF ) Authenticated Adversarial Routing Yair Amir, Paul Bunn, Rafail Ostrovsky
2008/447 (PDF ) Divisible On-line/Off-line Signatures Chong-zhi Gao, Baodian Wei, Dongqing Xie, Chunming Tang
2008/446 (PDF ) Secure Random Key Pre-Distribution Against Semi-Honest Adversaries Mike Burmester, Reihaneh Safavi-Naini, Gelareh Taban
2008/445 (PDF ) Cryptanalysis of the Improved Cellular Message Encryption Algorithm Thomas Chardin, Raphaël Marinier
2008/444 (PDF ) Elliptic divisibility sequences and the elliptic curve discrete logarithm problem Rachel Shipsey, Christine Swart
2008/443 (PDF ) Key differentiation attacks on stream ciphers Enes Pasalic
2008/442 (PDF ) Fast Arithmetic on ATmega128 for Elliptic Curve Cryptography Anton Kargl, Stefan Pyka, Hermann Seuschek
2008/441 (PDF ) How Risky is the Random-Oracle Model? Gaetan Leurent, Phong Q. Nguyen
2008/440 (PDF ) Robust Encryption Michel Abdalla, Mihir Bellare, Gregory Neven
2008/439 (PDF ) Linear equivalence between elliptic curves in Weierstrass and Hesse form Alexander Rostovtsev
2008/438 (PDF ) New Related-Key Boomerang Attacks on AES Michael Gorski, Stefan Lucks
2008/437 (PDF ) Divisibility, Smoothness and Cryptographic Applications David Naccache, Igor Shparlinski
2008/435 (PDF ) Obtaining and solving systems of equations in key variables only for the small variants of AES Stanislav Bulygin, Michael Brickenstein
2008/434 (PDF ) The computational SLR: a logic for reasoning about computational indistinguishability Yu Zhang
2008/433 (PDF ) On differences of quadratic residues Guillermo Morales-Luna
2008/432 (PDF ) Dynamic Provable Data Possession C. Chris Erway, Alptekin Kupcu, Charalampos Papamanthou, Roberto Tamassia
2008/431 (PDF ) Usable Optimistic Fair Exchange Alptekin Kupcu, Anna Lysyanskaya
2008/430 (PDF ) Cryptographic Protocol Composition via the Authentication Tests Joshua D. Guttman
2008/429 (PDF ) Public-Key Encryption with Efficient Amortized Updates Nishanth Chandran, Rafail Ostrovsky, William E. Skeith III
2008/428 (PDF ) Delegatable Anonymous Credentials Mira Belenkiy, Jan Camenisch, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Hovav Shacham
2008/427 (PDF ) LEGO for Two Party Secure Computation Jesper Buus Nielsen, Claudio Orlandi
2008/426 (PDF ) On Kasami Bent Functions Deepmala Sharma, Sugata Gangopadhyay
2008/425 (PDF ) Efficient Asynchronous Multiparty Computation with Optimal Resilience Arpita Patra, Ashish Choudhury, C. Pandu Rangan
2008/424 (PDF ) Asynchronous Byzantine Agreement with Optimal Resilience Arpita Patra, Ashish Choudhury, C. Pandu Rangan
2008/423 (PDF ) Searchable encryption with decryption in the standard model Dennis Hofheinz, Enav Weinreb
2008/422 (PDF ) A New Approach for Algebraically Homomorphic Encryption Frederik Armknecht, Ahmad-Reza Sadeghi
2008/421 (PDF ) Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme Kaoru Kurosawa, Kazuhiro Suzuki
2008/420 (PDF ) Oblivious Transfer from Weak Noisy Channels Jürg Wullschleger
2008/419 (PDF ) Parsing ambiguities in authentication and key establishment protocols Liqun Chen, Chris J. Mitchell
2008/418 (PDF ) Privacy-Enhancing First-Price Auctions Using Rational Cryptography Peter Bro Miltersen, Jesper Buus Nielsen, Nikos Triandopoulos
2008/417 (PDF ) On the security of pairing-friendly abelian varieties over non-prime fields Naomi Benger, Manuel Charlemagne, David Freeman
2008/416 (PDF ) Almost-Asynchronous MPC with Faulty Minority Zuzana Beerliova-Trubiniova, Martin Hirt, Jesper Buus Nielsen
2008/415 (PDF ) Asynchronous Multiparty Computation: Theory and Implementation Ivan Damgård, Martin Geisler, Mikkel Krøigaard, Jesper Buus Nielsen
2008/414 (PDF ) On the Number of Synchronous Rounds Required for Byzantine Agreement Matthias Fitzi, Jesper Buus Nielsen
2008/413 (PDF ) Password Mistyping in Two-Factor-Authenticated Key Exchange Vladimir Kolesnikov, Charles Rackoff
2008/412 (PDF ) Key Predistribution for Homogeneous Wireless Sensor Networks with Group Deployment of Nodes Keith M. Martin, Maura B. Paterson, Douglas R. Stinson
2008/411 (PDF ) Cryptanalysis of LU Decomposition-based Key Pre-distribution Scheme for Wireless Sensor Networks Bo Zhu, Yanfei Zheng, Yaowei Zhou, Kefei Chen
2008/410 (PDF ) On the Role of PKG for Proxy Re-encryption in Identity Based Setting Xu an Wang, Xiaoyuan Yang, Fagen Li
2008/409 (PDF ) A New $(k,n)$-Threshold Secret Sharing Scheme and Its Extension Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka
2008/408 (PDF ) The Enigmatique Toolkit Christopher Billings
2008/407 (PDF ) Indifferentiable Security Analysis of choppfMD, chopMD, a chopMDP, chopWPH, chopNI, chopEMD, chopCS, and chopESh Hash Domain Extensions Donghoon Chang, Jaechul Sung, Seokhie Hong, Sangjin Lee
2008/406 (PDF ) An asymptotically optimal RFID protocol against relay attacks Gildas Avoine, Aslan Tchamkerten
2008/405 (PDF ) Slid Pairs in Salsa20 and Trivium Deike Priemuth-Schmid, Alex Biryukov
2008/404 (PDF ) Pairing with Supersingular Trace Zero Varieties Revisited Emanuele Cesena
2008/403 (PDF ) SPICE Simulation of a "Provably Secure" True Random Number Generator Markus Dichtl, Bernd Meyer, Hermann Seuschek
2008/402 (PDF ) Algebraic Cryptanalysis of Curry and Flurry using Correlated Messages Jean-Charles Faugère, Ludovic Perret
2008/401 (PDF ) Two New Efficient CCA-Secure Online Ciphers: MHCBC and MCBC Mridul Nandi
2008/400 (PDF ) Comments on two password based protocols Yalin Chen, Hung-Min Sun, Chun-Hui Huang, Jue-Sam Chou
2008/399 (PDF ) Round Efficient Unconditionally Secure Multiparty Computation Protocol Arpita Patra, Ashish Choudhary, C. Pandu Rangan
2008/398 (PDF ) Generating genus two hyperelliptic curves over large characteristic finite fields Takakazu Satoh
2008/396 (PDF ) Analysis of RC4 and Proposal of Additional Layers for Better Security Margin Subhamoy Maitra, Goutam Paul
2008/395 (PDF ) New Applications of Differential Bounds of the SDS Structure Jiali Choy, Khoongming Khoo
2008/394 (PDF ) Attribute-Based Ring Signatures Jin Li, Kwangjo Kim
2008/393 (PDF ) How Far Must You See To Hear Reliably Pranav K Vasishta, Anuj Gupta, Prasant Gopal, Piyush Bansal, Rishabh Mukherjee, Poornima M, Kannan Srinathan, Kishore Kothapalli
2008/392 (PDF ) GUC-Secure Set-Intersection Computation TIAN Yuan, WANG Ying
2008/391 (PDF ) Could The 1-MSB Input Difference Be The Fastest Collision Attack For MD5 ? Tao Xie, FanBao Liu, DengGuo Feng
2008/390 (PDF ) Elliptic Curve Cryptography: The Serpentine Course of a Paradigm Shift Ann Hibner Koblitz, Neal Koblitz, Alfred Menezes
2008/389 (PDF ) Optimal Subset-Difference Broadcast Encryption with Free Riders Murat Ak, Kamer Kaya, Ali Aydin Selcuk
2008/388 (PDF ) Double-Base Number System for Multi-Scalar Multiplications Christophe Doche, David R. Kohel, Francesco Sica
2008/386 (PDF ) Shared Key Encryption by the State Machine with Two-Dimensional Random Look-up Table Michael Lifliand
2008/385 (PDF ) Cube Attacks on Tweakable Black Box Polynomials Itai Dinur, Adi Shamir
2008/384 (PDF ) Improving the Boneh-Franklin Traitor Tracing Scheme Pascal Junod, Alexandre Karlov, Arjen K. Lenstra
2008/383 (PDF ) Hierarchical Identity Based Encryption with Polynomially Many Levels Craig Gentry, Shai Halevi
2008/382 (PDF ) Authenticated Wireless Roaming via Tunnels: Making Mobile Guests Feel at Home Mark Manulis, Damien Leroy, Francois Koeune, Olivier Bonaventure, Jean-Jacques Quisquater
2008/381 (PDF ) New AES software speed records Daniel J. Bernstein, Peter Schwabe
2008/380 (PDF ) Dynamic Threshold Cryptosystem without Group Manager Andreas Noack, Stefan Spitz
2008/379 (PDF ) A Characterization of Chameleon Hash Functions and New, Efficient Designs Mihir Bellare, Todor Ristov
2008/378 (PDF ) Additively Homomorphic Encryption with d-Operand Multiplications Carlos Aguilar Melchor, Philippe Gaborit, Javier Herranz
2008/377 (PDF ) TRIVIUM's output partially autocancels Michael Vielhaber
2008/376 (PDF ) Session-state Reveal is stronger than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange protocol Cas J. F. Cremers
2008/375 (PDF ) A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks Jan Camenisch, Nishanth Chandran, Victor Shoup
2008/374 (PDF ) Chosen Ciphertext Security with Optimal Ciphertext Overhead Masayuki Abe, Eike Kiltz, Tatsuaki Okamoto
2008/373 (PDF ) Analysis and Improvement of Authenticatable Ring Signcryption Scheme Fagen Li, Masaaki Shirase, Tsuyoshi Takagi
2008/372 (PDF ) Enumeration of Balanced Symmetric Functions over GF(p) Shaojing Fu, Chao Li, Longjiang Qu, Ping Li
2008/371 (PDF ) Unconditionally Reliable Message Transmission in Directed Hypergraphs Kannan Srinathan, Arpita Patra, Ashish Choudhary, C. Pandu Rangan
2008/370 (PDF ) Compartmented Threshold RSA Based on the Chinese Remainder Theorem Sorin Iftene, Stefan Ciobaca, Manuela Grindei
2008/369 (PDF ) New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers Shahram Khazaei, Willi Meier
2008/368 (PDF ) Side Channel Attack Resistant Implementation of Multi-Power RSA using Hensel Lifting Varad Kirtane, C. Pandu Rangan
2008/367 (PDF ) {Threshold Homomorphic Encryption in the Universally Composable Cryptographic Library Peeter Laud, Long Ngo
2008/366 (PDF ) Unique Shortest Vector Problem for max norm is NP-hard Than Quang Khoat, Nguyen Hong Tan
2008/365 (PDF ) Entropy Bounds for Traffic Confirmation Luke O'Connor
2008/364 (PDF ) Zcipher Algorithm Specification Ilya O Levin
2008/363 (PDF ) An argument for Hamiltonicity Vadym Fedyukovych
2008/362 (PDF ) The Cost of False Alarms in Hellman and Rainbow Tradeoffs Jin Hong
2008/360 (PDF ) An Approach to ensure Information Security through 252-Bit Integrated Encryption System (IES) Saurabh Dutta, Jyotsna Kumar mandal
2008/359 (PDF ) Argument of knowledge of a bounded error Vadym Fedyukovych
2008/358 (PDF ) History-Independent Cuckoo Hashing Moni Naor, Gil Segev, Udi Wieder
2008/357 (PDF ) A protocol for K-multiple substring matching Vadym Fedyukovych, Vitaliy Sharapov
2008/356 (PDF ) Using Commutative Encryption to Share a Secret Saied Hosseini Khayat
2008/355 (PDF ) An argument for rank metric Vadym Fedyukovych
2008/353 (PDF ) Weaknesses in HENKOS Stream Cipher Prasanth Kumar Thandra, S. A. V. Satya Murty, R Balasubramanian
2008/352 (PDF ) On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles Alexandra Boldyreva, Serge Fehr, Adam O'Neill
2008/351 (PDF ) Flaws in Some Self-Healing Key Distribution Schemes with Revocation Vanesa Daza, Javier Herranz, German Saez
2008/350 (PDF ) Higher Order Differential Cryptanalysis of Multivariate Hash Functions Yiyuan Luo, Xuejia Lai
2008/349 (PDF ) Time-Area Optimized Public-Key Engines: MQ-Cryptosystems as Replacement for Elliptic Curves? Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp, Christopher Wolf
2008/348 (PDF ) Iterative Probabilistic Reconstruction of RC4 Internal States Jovan Golic, Guglielmo Morgari
2008/347 (PDF ) Information Leakage in Optimal Anonymized and Diversified Data Chengfang Fang, Ee-Chien Chang
2008/346 (PDF ) Remote Integrity Check with Dishonest Storage Server Ee-Chien Chang, Jia Xu
2008/345 (PDF ) An Efficient Authenticated Key Exchange Protocol with a Tight Security Reduction Jooyoung Lee, Choon Sik Park
2008/344 (PDF ) Authenticated Key Exchange Secure under the Computational Diffie-Hellman Assumption Jooyoung Lee, Je Hong Park
2008/343 (PDF ) Efficient RFID authentication protocols based on pseudorandom sequence generators Jooyoung Lee, Yongjin Yeom
2008/342 (PDF ) Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme S. Sharmila Deva Selvi, S. Sree Vivek, Neha Jain, Pandu Rangan Chandrasekaran
2008/341 (PDF ) An Efficient Identity-Based Signcryption Scheme for Multiple Receivers S. Sharmila Deva Selvi, S. Sree Vivek, Rahul Srinivasan, Pandu Rangan Chandrasekaran
2008/339 (PDF ) High Performance Implementation of a Public Key Block Cipher - MQQ, for FPGA Platforms Mohamed El-Hadedy, Danilo Gligoroski, Svein J. Knapskog
2008/338 (PDF ) An improvement of discrete Tardos fingerprinting codes Koji Nuida, Satoshi Fujitsu, Manabu Hagiwara, Takashi Kitagawa, Hajime Watanabe, Kazuto Ogawa, Hideki Imai
2008/337 (PDF ) Modified Huang-Wang's Convertible Nominative Signature Scheme Wei Zhao, Dingfeng Ye
2008/336 (PDF ) New attacks on ISO key establishment protocols Anish Mathuria, G. Sriram
2008/335 (PDF ) Public Key Cryptography from Different Assumptions Boaz Barak, Avi Wigderson
2008/334 (PDF ) Analyzing the Galbraith-Lin-Scott Point Multiplication Method for Elliptic Curves over Binary Fields Darrel Hankerson, Koray Karabina, Alfred Menezes
2008/333 (PDF ) Explicit hard instances of the shortest vector problem Johannes Buchmann, Richard Lindner, Markus Rückert, Michael Schneider
2008/332 (PDF ) Efficient Key Distribution Schemes for Large Scale Mobile Computing Applications Mahalingam Ramkumar
2008/331 (PDF ) A Secure Remote User Authentication Scheme with Smart Cards Manoj Kumar
2008/329 (PDF ) SMS4 Encryption Algorithm for Wireless Networks Whitfield Diffie, George Ledin (translators)
2008/328 (PDF ) Attribute-Based Signatures: Achieving Attribute-Privacy and Collusion-Resistance Hemanta Maji, Manoj Prabhakaran, Mike Rosulek
2008/327 (PDF ) Blind HIBE and its Applications to Identity-Based Blind Signature and Blind Decryption Le Trieu Phong, Wakaha Ogata
2008/326 (PDF ) Two attacks on a sensor network key distribution scheme of Cheng and Agrawal M. B. Paterson, D. R. Stinson
2008/325 (PDF ) Revisit of Group-based Unidirectional Proxy Re-encryption Scheme Chunbo Ma, Jun Ao
2008/324 (PDF ) RSA-TBOS Signcryption with Proxy Re-encryption. Varad Kirtane, C. Pandu Rangan
2008/323 (PDF ) A new identity based proxy signature scheme Bin Wang
2008/322 (PDF ) Lattice-based Blind Signatures Markus Rückert
2008/321 (PDF ) A correction to ``Efficient and Secure Comparison for On-Line Auctions'' Ivan Damgård, Martin Geisler, Mikkel Krøigaard
2008/320 (PDF ) Public Key Block Cipher Based on Multivariate Quadratic Quasigroups Danilo Gligoroski, Smile Markovski, Svein J. Knapskog
2008/319 (PDF ) Yet Another Secure Distance-Bounding Protocol Ventzislav Nikov, Marc Vauclair
2008/318 (PDF ) Attacking and defending the McEliece cryptosystem Daniel J. Bernstein, Tanja Lange, Christiane Peters
2008/316 (PDF ) Signing a Linear Subspace: Signature Schemes for Network Coding Dan Boneh, David Freeman, Jonathan Katz, Brent Waters
2008/315 (PDF ) RSA Cryptanalysis with Increased Bounds on the Secret Exponent using Less Lattice Dimension Santanu Sarkar, Subhamoy Maitra, Sumanta Sarkar
2008/314 (PDF ) Scratch, Click & Vote: E2E voting over the Internet Miroslaw Kutylowski, Filip Zagorski
2008/313 (PDF ) A new almost perfect nonlinear function which is not quadratic Yves Edel, Alexander Pott
2008/312 (PDF ) Improved efficiency of Kiltz07-KEM Xianhui Lu, Xuejia Lai, Dake He
2008/311 (PDF ) Treatment of the Initial Value in Time-Memory-Data Tradeoff Attacks on Stream Ciphers Orr Dunkelman, Nathan Keller
2008/310 (PDF ) Attacks on RFID Protocols T. van Deursen, S. Radomirovic
2008/309 (PDF ) Revocation Systems with Very Small Private Keys Allison Lewko, Amit Sahai, Brent Waters
2008/308 (PDF ) Strongly-Resilient and Non-Interactive Hierarchical Key-Agreement in MANETs Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin, Steffen Reidt, Stephen D. Wolthusen
2008/307 (PDF ) Full Security:Fuzzy Identity Based Encryption Liming Fang, Jinyue Xia
2008/306 (PDF ) Combinatorial batch codes M. B. Paterson, D. R. Stinson, R. Wei
2008/305 (PDF ) Identity-Based Directed Signature Scheme from Bilinear Pairings Xun Sun, Jian-hua Li, Gong-liang Chen, Shu-tang Yang
2008/304 (PDF ) A New Randomness Extraction Paradigm for Hybrid Encryption Eike Kiltz, Krzysztof Pietrzak, Martijn Stam, Moti Yung
2008/303 (PDF ) Complete Fairness in Secure Two-Party Computation S. Dov Gordon, Carmit Hazay, Jonathan Katz, Yehuda Lindell
2008/302 (PDF ) Secure Biometric Authentication With Improved Accuracy M. Barbosa, S. Cauchie, T. Brouard, S. Melo de Sousa
2008/301 (PDF ) Accountability of Perfect Concurrent Signature Yunfeng Li, Dake He, Xianhui Lu
2008/300 (PDF ) Cheon's algorithm, pairing inversion and the discrete logarithm problem David J. Mireles Morales
2008/299 (PDF ) An analysis of the infrastructure in real function fields David J. Mireles Morales
2008/298 (PDF ) Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems Ryou Fujita, Kohtaro Tadaki, Shigeo Tsujii
2008/297 (PDF ) Attack on Kang et al.'s Identity-Based Strong Designated Verifier Signature Scheme Hongzhen Du, Qiaoyan Wen
2008/296 (PDF ) Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits Hung-Min Sun, Mu-En Wu, Ron Steinfeld, Jian Guo, Huaxiong Wang
2008/295 (PDF ) Foundations of Group Key Management – Framework, Security Model and a Generic Construction Naga Naresh Karuturi, Ragavendran Gopalakrishnan, Rahul Srinivasan, Pandu Rangan Chandrasekaran
2008/294 (PDF ) A New Message Recognition Protocol for Ad Hoc Pervasive Networks Atefeh Mashatan, Douglas R. Stinson
2008/293 (PDF ) Maximizing data survival in Unattended Wireless Sensor Networks against a focused mobile adversary Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, Gene Tsudik
2008/292 (PDF ) Another approach to pairing computation in Edwards coordinates Sorina Ionica, Antoine Joux
2008/291 (PDF ) How to Protect Yourself without Perfect Shredding Ran Canetti, Dror Eiger, Shafi Goldwasser, Dah-Yoh Lim
2008/290 (PDF ) Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization Brent Waters
2008/289 (PDF ) Sharemind: a framework for fast privacy-preserving computations Dan Bogdanov, Sven Laur, Jan Willemson
2008/288 (PDF ) How to Launch A Birthday Attack Against DES Zhengjun Cao
2008/287 (PDF ) Authenticated Byzantine Generals in Dual Failure Model Anuj Gupta, Prasant Gopal, Piyush Bansal, Kannan Srinathan
2008/286 (PDF ) One-Up Problem for (EC)DSA Daniel R. L. Brown
2008/285 (PDF ) Hybrid Binary-Ternary Joint Sparse Form and its Application in Elliptic Curve Cryptography Jithra Adikari, Vassil Dimitrov, Laurent Imbert
2008/284 (PDF ) Breaking the Akiyama-Goto cryptosystem P. Ivanov, J. F. Voloch
2008/283 (PDF ) Attacks on Singelee and Preneel's protocol Jorge Munilla, Alberto Peinado
2008/282 (PDF ) Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks Jihye Kim, Gene Tsudik
2008/281 (PDF ) Linear and Differential Cryptanalysis of Reduced SMS4 Block Cipher Taehyun Kim, Jongsung Kim, Seokhie Hong, Jaechul Sung
2008/280 (PDF ) FPGA and ASIC Implementations of the $\eta_T$ Pairing in Characteristic Three Jean-Luc Beuchat, Hiroshi Doi, Kaoru Fujita, Atsuo Inomata, Piseth Ith, Akira Kanaoka, Masayoshi Katouno, Masahiro Mambo, Eiji Okamoto, Takeshi Okamoto, Takaaki Shiga, Masaaki Shirase, Ryuji Soga, Tsuyoshi Takagi, Ananda Vithanage, Hiroyasu Yamamoto
2008/279 (PDF ) Delegating Capabilities in Predicate Encryption Systems Elaine Shi, Brent Waters
2008/278 (PDF ) An Improved Robust Fuzzy Extractor Bhavana Kanukurthi, Leonid Reyzin
2008/277 (PDF ) A strategy for any DAA Issuer and an additional verification by a Host Vadym Fedyukovych
2008/276 (PDF ) Signcryption with Proxy Re-encryption Chandrasekar S., Ambika K., Pandu Rangan C.
2008/275 (PDF ) Certificate-Based Signature Schemes without Pairings or Random Oracles Joseph K. Liu, Joonsang Baek, Willy Susilo, Jianying Zhou
2008/274 (PDF ) Twisted Ate Pairing on Hyperelliptic Curves and Applications Fangguo Zhang
2008/273 (PDF ) White-Box Cryptography: Formal Notions and (Im)possibility Results Amitabh Saxena, Brecht Wyseur, Bart Preneel
2008/272 (PDF ) A New Hash Family Obtained by Modifying the SHA-2 Family Somitra Kumar Sanadhya, Palash Sarkar
2008/271 (PDF ) A Combinatorial Analysis of Recent Attacks on Step Reduced SHA-2 Family Somitra Kumar Sanadhya, Palash Sarkar
2008/270 (PDF ) New Collision attacks Against Up To 24-step SHA-2 Somitra Kumar Sanadhya, Palash Sarkar
2008/269 (PDF ) Searching for Low Weight Codewords in Linear Binary Codes Somitra Kumar Sanadhya, Palash Sarkar
2008/268 (PDF ) Adaptive Security in Broadcast Encryption Systems Craig Gentry, Brent Waters
2008/267 (PDF ) Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles Mihir Bellare, Marc Fischlin, Adam O'Neill, Thomas Ristenpart
2008/266 (PDF ) Information-Theoretically Secure Voting Without an Honest Majority Anne Broadbent, Alain Tapp
2008/265 (PDF ) Efficient Hyperelliptic Arithmetic using Balanced Representation for Divisors Steven D. Galbraith, Michael Harrison, David J. Mireles Morales
2008/264 (PDF ) Secure Computability of Functions in the IT setting with Dishonest Majority and Applications to Long-Term Security Robin Künzler, Jörn Müller-Quade, Dominik Raub
2008/263 (PDF ) Slide Attacks on a Class of Hash Functions Michael Gorski, Stefan Lucks, Thomas Peyrin
2008/262 (PDF ) Statistically Reliable and Secure Message Transmission in Directed Networks Arpita Patra, Ashish Choudhury, C. Pandu Rangan
2008/261 (PDF ) The Hidden Root Problem F. Vercauteren
2008/260 (PDF ) Breaking RSA Generically is Equivalent to Factoring Divesh Aggarwal, Ueli Maurer
2008/259 (PDF ) 2-Adic Complexity of a Sequence Obtained from a Periodic Binary Sequence by Either Inserting or Deleting k Symbols within One Period ZHAO Lu, WEN Qiao-yan
2008/258 (PDF ) ON A CRYPTOGRAPHIC IDENTITY IN OSBORN LOOPS JAIYEOLA Temitope Gbolahan, ADENIRAN John Olushola
2008/257 (PDF ) ON MIDDLE UNIVERSAL $m$-INVERSE QUASIGROUPS AND THEIR APPLICATIONS TO CRYPTOGRAPHY JAIYEOLA Temitope Gbolahan
2008/256 (PDF ) ON MIDDLE UNIVERSAL WEAK AND CROSS INVERSE PROPERTY LOOPS WITH EQUAL LENGHT OF INVERES CYCLES JAIYEOLA Temitope Gbolahan
2008/255 (PDF ) Embedding in Two Least Significant Bits with Wet Paper Coding Xin Liao, Qiao-yan Wen
2008/254 (PDF ) An Efficient Identity-based Ring Signcryption Scheme Zhenchao ZHU, Yuqing ZHANG, Fengjiao WANG
2008/253 (PDF ) Multi-Recipient Signcryption for Secure Wireless Group Communication Yiliang Han, Xiaolin Gui, Xu'an Wang
2008/252 (PDF ) Provable Security of Digital Signatures in the Tamper-Proof Device Model Nick Varnovsky
2008/251 (PDF ) Universally Composable Security Analysis of TLS---Secure Sessions with Handshake and Record Layer Protocols Sebastian Gajek, Mark Manulis, Olivier Pereira, Ahmad-Reza Sadeghi, Jörg Schwenk
2008/250 (PDF ) Pairings on hyperelliptic curves with a real model Steven Galbraith, Xibin Lin, David Mireles
2008/248 (PDF ) Cryptanalysis of a client-to-client password-authenticated key agreement protocol Fengjiao Wang, Yuqing Zhang
2008/247 (PDF ) Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption (IBBSC) Scheme for Wireless Ad-hoc Networks S. Sharmila Deva Selvi, S. Sree Vivek, Naga Naresh Karuturi, Ragavendran Gopalakrishnan, Pandu Rangan Chandrasekaran
2008/246 (PDF ) The Random Oracle Model and the Ideal Cipher Model are Equivalent Jean-Sebastien Coron, Jacques Patarin, Yannick Seurin
2008/245 (PDF ) Cryptanalysis of an Authentication Scheme Using Truncated Polynomials Markus Grassl, Rainer Steinwandt
2008/244 (PDF ) New balanced Boolean functions satisfying all the main cryptographic criteria Claude Carlet, Keqin Feng
2008/243 (PDF ) On the economic payoff of forensic systems when used to trace Counterfeited Software and content Yacov Yacobi
2008/241 (PDF ) Practical Attacks on HB and HB+ Protocols Zbigniew Golebiewski, Krzysztof Majcher, Filip Zagorski, Marcin Zawada
2008/240 (PDF ) Leakage-Resilient Cryptography in the Standard Model Stefan Dziembowski, Krzysztof Pietrzak
2008/239 (PDF ) Recognition in Ad Hoc Pervasive Networks Atefeh Mashatan, Douglas R. Stinson
2008/238 (PDF ) On the Provable Security of Multi-Receiver Signcryption Schemes S. Sharmila Deva Selvi, S. Sree Vivek, Ragavendran Gopalakrishnan, Naga Naresh Karuturi, C. Pandu Rangan
2008/237 (PDF ) Local Affinity Based Inversion of Filter Generators O. A. Logachev, D. S. Nazarova
2008/236 (PDF ) A Modular Security Analysis of the TLS Handshake Protocol P. Morrissey, N. P. Smart, B. Warinschi
2008/235 (PDF ) Constant-Round Concurrent Non-Malleable Commitments and Decommitments Rafail Ostrovsky, Giuseppe Persiano, Ivan Visconti
2008/234 (PDF ) On the CCA1-Security of Elgamal and Damgård's Elgamal Helger Lipmaa
2008/232 (PDF ) Perfectly Secure Message Transmission Tolerating Mixed Adversary Arpita Patra, Ashish Choudhury, Ashwinkumar B. V, Kannan Srinathan, C. Pandu Rangan
2008/231 (PDF ) A Novel Probabilistic Passive Attack on the Protocols HB and HB+ Jose Carrijo, Rafael Tonicelli, Hideki Imai, Anderson C. A. Nascimento
2008/230 (PDF ) A New Collision Differential For MD5 With Its Full Differential Path Tao Xie, DengGuo Feng, FanBao Liu
2008/229 (PDF ) Identification and Privacy: Zero-Knowledge is not Enough Julien Bringer, Herve Chabanne, Thomas Icart
2008/228 (PDF ) Revisiting Wiener's Attack -- New Weak Keys in RSA Subhamoy Maitra, Santanu Sarkar
2008/227 (PDF ) New Impossible Differential Cryptanalysis of ARIA Ruilin Li, Bing Sun, Peng Zhang, Chao Li
2008/226 (PDF ) Proxy Key Re-encapsulation Mechanism for Group Communications Chunbo Ma, Jun Ao
2008/225 (PDF ) Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme S. Sharmila Deva Selvi, S. Sree Vivek, Ragavendran Gopalakrishnan, Naga Naresh Karuturi, C. Pandu Rangan
2008/224 (PDF ) An ID-based Authenticated Key Exchange Protocol Based on Bilinear Diffie-Hellman Problem Hai Huang, Zhenfu Cao
2008/223 (PDF ) On the Security of a Visual Cryptography Scheme for Color Images Bert W. Leung, Felix Y. Ng, Duncan S. Wong
2008/222 (PDF ) Encryption-On-Demand: Practical and Theoretical Considerations Gideon Samid
2008/221 (PDF ) Efficient Conversion of Secret-shared Values Between Different Fields Ivan Damgard, Rune Thorbek
2008/220 (PDF ) Essentially Optimal Universally Composable Oblivious Transfer Ivan Damgård, Jesper Buus Nielsen, Claudio Orlandi
2008/218 (PDF ) Efficient arithmetic on elliptic curves using a mixed Edwards-Montgomery representation Wouter Castryck, Steven Galbraith, Reza Rezaeian Farashahi
2008/217 (PDF ) Oracle-Assisted Static Diffie-Hellman Is Easier Than Discrete Logarithms Antoine Joux, Reynald Lercier, David Naccache, Emmanuel Thomé
2008/216 (PDF ) A New Multi-Linear Universal Hash Family Palash Sarkar
2008/215 (PDF ) On Implementation of GHS Attack against Elliptic Curve Cryptosystems over Cubic Extension Fields of Odd Characteristics Naoki Hashizume, Fumiyuki Momose, Jinhui Chao
2008/214 (PDF ) Multi-Factor Password-Authenticated Key Exchange Douglas Stebila, Poornaprajna Udupi, Sheueling Chang
2008/213 (PDF ) The Multireceiver Commitment Schemes Shuhong Wang
2008/212 (PDF ) Reducing the Complexity of the Weil Pairing Computation Chang-An Zhao, Fangguo Zhang, Dongqing Xie
2008/211 (PDF ) Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption Goichiro Hanaoka, Kaoru Kurosawa
2008/210 (PDF ) Complexity Analysis of a Fast Modular Multiexponentiation Algorithm Haimin Jin, Duncan S. Wong, Yinlong Xu
2008/209 (PDF ) Computing Bilinear Pairings on Elliptic Curves with Automorphisms Chang-An Zhao, Dongqing Xie, Fangguo Zhang, Jingwei Zhang, Bing-Long Chen
2008/208 (PDF ) Remarks on the Attack of Fouque et al. against the {\ell}IC Scheme Naoki Ogura, Shigenori Uchiyama
2008/207 (PDF ) Efficient Receipt-Free Ballot Casting Resistant to Covert Channels Ben Adida, C. Andrew Neff
2008/206 (PDF ) Partial Fairness in Secure Two-Party Computation Dov Gordon, Jonathan Katz
2008/205 (PDF ) On Software Parallel Implementation of Cryptographic Pairings Philipp Grabher, Johann Groszschaedl, Dan Page
2008/204 (PDF ) Cryptanalysis of the Cai-Cusick Lattice-based Public-key Cryptosystem Yanbin Pan, Yingpu Deng
2008/203 (PDF ) Privacy-Preserving Matching of DNA Profiles Fons Bruekers, Stefan Katzenbeisser, Klaus Kursawe, Pim Tuyls
2008/202 (PDF ) Polynomials for Ate Pairing and $\mathbf{Ate}_{i}$ Pairing Zhitu Su, Hui Li, JianFeng Ma
2008/201 (PDF ) How To Ensure Forward and Backward Untraceability of RFID Identification Schemes By Using A Robust PRBG J. Wu, D. R. Stinson
2008/200 (PDF ) On The Security of The ElGamal Encryption Scheme and Damgard’s Variant J. Wu, D. R. Stinson
2008/199 (PDF ) Simultaneous field divisions: an extension of Montgomery's trick David G. Harris
2008/198 (PDF ) Security needs in embedded systems Anoop MS
2008/197 (PDF ) Secure Multiparty Computation for Privacy-Preserving Data Mining Yehuda Lindell, Benny Pinkas
2008/196 (PDF ) A New Family of Perfect Nonlinear Binomials Zhengbang Zha, Gohar M. Kyureghyan, Xueli Wang
2008/195 (PDF ) An Efficient and Provably-Secure Identity-based Signcryption Scheme for Multiple PKGs Jin Zhengping, Zuo Huijuan, Du hongzhen, Wen Qiaoyan
2008/194 (PDF ) Endomorphisms for faster elliptic curve cryptography on a large class of curves Steven D. Galbraith, Xibin Lin, Michael Scott
2008/192 (PDF ) Investigating the DPA-Resistance Property of Charge Recovery Logics Amir Moradi, Mehrdad Khatir, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani
2008/190 (PDF ) User-Sure-and-Safe Key Retrieval Daniel R. L. Brown
2008/189 (PDF ) How to Build a Hash Function from any Collision-Resistant Function Thomas Ristenpart, Thomas Shrimpton
2008/188 (PDF ) Information Leakage of Flip-Flops in DPA-Resistant Logic Styles Amir Moradi, Thomas Eisenbarth, Axel Poschmann, Carsten Rolfes, Christof Paar, Mohammad T. Manzuri Shalmani, Mahmoud Salmasizadeh
2008/187 (PDF ) An Efficient and Provably Secure ID-Based Threshold Signcryption Scheme Fagen Li, Yong Yu
2008/186 (PDF ) Privacy-Preserving Audit and Extraction of Digital Contents Mehul A. Shah, Ram Swaminathan, Mary Baker
2008/185 (PDF ) A New Approach to Secure Logging Di Ma, Gene Tsudik
2008/184 (PDF ) On the Secure Obfuscation of Deterministic Finite Automata W. Erik Anderson
2008/183 (PDF ) Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5 Jean-Philippe Aumasson, Willi Meier, Florian Mendel
2008/182 (PDF ) Restricted Adaptive Oblivious Transfer Javier Herranz
2008/181 (PDF ) Proofs of Knowledge with Several Challenge Values Grzegorz Stachowiak
2008/180 (PDF ) Imaginary quadratic orders with given prime factor of class number Alexander Rostovtsev
2008/178 (PDF ) Optimal Discretization for High-Entropy Graphical Passwords Kemal Bicakci
2008/177 (PDF ) Algebraic Techniques in Differential Cryptanalysis Martin Albrecht, Carlos Cid
2008/176 (PDF ) New construction of Boolean functions with maximun algebraic immunity Wang yongjuan, Fan shuqin, Han wenbao
2008/175 (PDF ) Proofs of Retrievability: Theory and Implementation Kevin D. Bowers, Ari Juels, Alina Oprea
2008/174 (PDF ) Non-Linear Reduced Round Attacks Against SHA-2 Hash family Somitra Kumar Sanadhya, Palash Sarkar
2008/173 (PDF ) Full Cryptanalysis of LPS and Morgenstern Hash Function Christophe Petit, Kristin Lauter, Jean-Jacques Quisquater
2008/172 (PDF ) The Round Complexity of Verifiable Secret Sharing Revisited Arpita Patra, Ashish Choudhary, Tal Rabin, C. Pandu Rangan
2008/171 (PDF ) Binary Edwards Curves Daniel J. Bernstein, Tanja Lange, Reza Rezaeian Farashahi
2008/170 (PDF ) Cryptanalysing the Critical Group: Efficiently Solving Biggs's Discrete Logarithm Problem Simon R. Blackburn
2008/169 (PDF ) Understanding Phase Shifting Equivalent Keys and Exhaustive Search Côme Berbain, Aline Gouget, Hervé Sibert
2008/168 (PDF ) Possibility and impossibility results for selective decommitments Dennis Hofheinz
2008/167 (PDF ) Non-black-box Techniques Are Not Necessary for Constant Round Non-malleable Protocols Omkant Pandey
2008/166 (PDF ) Algebraic Attacks on the Crypto-1 Stream Cipher in MiFare Classic and Oyster Cards Nicolas T. Courtois, Karsten Nohl, Sean O'Neil
2008/165 (PDF ) Improved lower bound on the number of balanced symmetric functions over GF(p) Pinhui Ke
2008/164 (PDF ) On the (Im)Possibility of Key Dependent Encryption Iftach Haitner, Thomas Holenstein
2008/163 (PDF ) Universally Composable Adaptive Oblivious Transfer Matthew Green, Susan Hohenberger
2008/162 (PDF ) Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks Michael Backes, Boris Köpf
2008/161 (PDF ) Modular polynomials for genus 2 Reinier Broker, Kristin Lauter
2008/160 (PDF ) A Proxy Signature Scheme over Braid Groups Girraj Kumar Verma
2008/159 (PDF ) A non-interactive deniable authentication scheme based on designated verifier proofs Bin Wang
2008/158 (PDF ) DISH: Distributed Self-Healing in Unattended Sensor Networks Di Ma, Gene Tsudik
2008/157 (PDF ) Secure Online Elections in Practice Lucie Langer, Axel Schmidt, Johannes Buchmann
2008/156 (PDF ) On Black-Box Ring Extraction and Integer Factorization Kristina Altmann, Tibor Jager, Andy Rupp
2008/155 (PDF ) A Generalized Brezing-Weng Algorithm for Constructing Pairing-Friendly Ordinary Abelian Varieties David Freeman
2008/153 (PDF ) Redundant $\tau$-adic Expansions II: Non-Optimality and Chaotic Behaviour Clemens Heuberger
2008/152 (PDF ) Computational soundness of symbolic zero-knowledge proofs Michael Backes, Dominique Unruh
2008/150 (PDF ) Robust Combiners for Software Hardening Amir Herzberg, Haya Shulman
2008/149 (PDF ) Toy Factoring by Newton's Method Daniel R. L. Brown
2008/148 (PDF ) Redundant $\tau$-adic Expansions I: Non-Adjacent Digit Sets and their Applications to Scalar Multiplication Roberto M. Avanzi, Clemens Heuberger, Helmut Prodinger
2008/147 (PDF ) A Real-World Attack Breaking A5/1 within Hours Timo Gendrullis, Martin Novotny, Andy Rupp
2008/146 (PDF ) Dynamic SHA-2 Xu Zijie
2008/145 (PDF ) Fast Multiple Point Multiplication on Elliptic Curves over Prime and Binary Fields using the Double-Base Number System Jithra Adikari, Vassil S. Dimitrov, Pradeep K. Mishra
2008/143 (PDF ) Certificateless Signcryption M. Barbosa, P. Farshim
2008/142 (PDF ) Attacking Reduced Round SHA-256 Somitra Kumar Sanadhya, Palash Sarkar
2008/141 (PDF ) Unconditionally Reliable and Secure Message Transmission in Undirected Synchronous Networks: Possibility, Feasibility and Optimality Arpita Patra, Ashish Choudhury, C. Pandu Rangan, Kannan Srinathan
2008/140 (PDF ) Reducing Complexity Assumptions for Oblivious Transfer K. Y. Cheong, Takeshi Koshiba
2008/139 (PDF ) Chosen-Ciphertext Secure Fuzzy Identity-Based Key Encapsulation without ROM Liming Fang, Jiandong Wang, Yongjun Ren, Jinyue Xia, Shizhu Bian
2008/138 (PDF ) Oblivious Transfer Based on the McEliece Assumptions Rafael Dowsley, Jeroen van de Graaf, Jörn Müller-Quade, Anderson C. A. Nascimento
2008/137 (PDF ) More Discriminants with the Brezing-Weng Method Gaetan Bisson, Takakazu Satoh
2008/136 (PDF ) Constant-Size Dynamic $k$-TAA Man Ho Au, Willy Susilo, Yi Mu
2008/135 (PDF ) Unbalanced Digit Sets and the Closest Choice Strategy for Minimal Weight Integer Representations Clemens Heuberger, James A. Muir
2008/134 (PDF ) Efficient Lossy Trapdoor Functions based on the Composite Residuosity Assumption Alon Rosen, Gil Segev
2008/133 (PDF ) The arithmetic of characteristic 2 Kummer surfaces P. Gaudry, D. Lubicz
2008/132 (PDF ) A Framework for the Sound Specification of Cryptographic Tasks Juan A. Garay, Aggelos Kiayias, Hong-Sheng Zhou
2008/131 (PDF ) Collisions and other Non-Random Properties for Step-Reduced SHA-256 Sebastiaan Indesteege, Florian Mendel, Bart Preneel, Christian Rechberger
2008/130 (PDF ) Analysis of Step-Reduced SHA-256 Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
2008/129 (PDF ) Controlling access to personal data through Accredited Symmetrically Private Information Retrieval Mohamed Layouni
2008/128 (PDF ) A Chosen IV Attack Using Phase Shifting Equivalent Keys against DECIM v2 Hidehiko Nakagami, Ryoichi Teramura, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii
2008/127 (PDF ) A Pipelined Karatsuba-Ofman Multiplier over GF($3^{97}$) Amenable for Pairing Computation Nidia Cortez-Duarte, Francisco Rodríguez-Henríquez, Jean-Luc Beuchat, Eiji Okamoto
2008/126 (PDF ) Machine Learning Attacks Against the ASIRRA CAPTCHA Philippe Golle
2008/125 (PDF ) Pairing Lattices Florian Hess
2008/124 (PDF ) A Simple Derivation for the Frobenius Pseudoprime Test Daniel Loebenberger
2008/123 (PDF ) Secure Adiabatic Logic: a Low-Energy DPA-Resistant Logic Style Mehrdad Khatir, Amir Moradi
2008/122 (PDF ) TinyECCK: Efficient Elliptic Curve Cryptography Implementation over $GF(2^m)$ on 8-bit MICAz Mote Seog Chung Seo, Dong-Guk Han, Seokhie Hong
2008/121 (PDF ) New proofs for old modes Mark Wooding
2008/120 (PDF ) Public key encryption and encryption emulation attacks Denis Osin, Vladimir Shpilrain
2008/119 (PDF ) Linear Bandwidth Naccache-Stern Encryption Benoit Chevallier-Mames, David Naccache, Jacques Stern
2008/118 (PDF ) Setting Speed Records with the (Fractional) Multibase Non-Adjacent Form Method for Efficient Elliptic Curve Scalar Multiplication Patrick Longa, Catherine Gebotys
2008/117 (PDF ) Exponentiation in pairing-friendly groups using homomorphisms Steven D. Galbraith, Michael Scott
2008/116 (PDF ) Chosen-Ciphertext Security via Correlated Products Alon Rosen, Gil Segev
2008/115 (PDF ) A Comparison Between Hardware Accelerators for the Modified Tate Pairing over $\mathbb{F}_{2^m}$ and $\mathbb{F}_{3^m}$ Jean-Luc Beuchat, Nicolas Brisebarre, Jérémie Detrey, Eiji Okamoto, Francisco Rodríguez-Henríquez
2008/114 (PDF ) Scalable and Efficient Provable Data Possession Giuseppe Ateniese, Roberto Di Pietro, Luigi V. Mancini, Gene Tsudik
2008/113 (PDF ) Open Source Is Not Enough. Attacking the EC-package of Bouncycastle version 1.x_132 Daniel Mall, Qing Zhong
2008/112 (PDF ) Democratic Group Signatures with Threshold Traceability Dong Zheng, Xiangxue Li, Changshe Ma, Kefei Chen, Jianhua Li
2008/111 (PDF ) THE DESIGN OF BOOLEAN FUNCTIONS BY MODIFIED HILL CLIMBING METHOD Yuriy Izbenko, Vladislav Kovtun, Alexandr Kuznetsov
2008/109 (PDF ) Collisions for Round-Reduced LAKE Florian Mendel, Martin Schläffer
2008/108 (PDF ) New Differential-Algebraic Attacks and Reparametrization of Rainbow Jintai Ding, Bo-Yin Yang, Owen Chen, Ming-Shing Chen, Doug Cheng
2008/107 (PDF ) Private Branching Programs: On Communication-Efficient Cryptocomputing Helger Lipmaa
2008/106 (PDF ) Knapsack cryptosystems built on NP-hard instances Laurent Evain
2008/105 (PDF ) Cryptanalysis of White-Box Implementations W. Michiels, P. Gorissen, H. D. L. Hollmann
2008/104 (PDF ) Simplified Security Notions of Direct Anonymous Attestation and a Concrete Scheme from Pairings Ernie Brickell, Liqun Chen, Jiangtao Li
2008/102 (PDF ) Degradation and Amplification of Computational Hardness Shai Halevi, Tal Rabin
2008/100 (PDF ) Accelerating the Scalar Multiplication on Elliptic Curve Cryptosystems over Prime Fields Patrick Longa
2008/099 (PDF ) The Elliptic Curve Discrete Logarithm Problem and Equivalent Hard Problems for Elliptic Divisibility Sequences Kristin E. Lauter, Katherine E. Stange
2008/098 (PDF ) On Security Notions for Verifiable Encrypted Signature Xu-An Wang, Xiaoyuan Yang, Yiliang Han
2008/097 (PDF ) Fairness with an Honest Minority and a Rational Majority Shien Jin Ong, David Parkes, Alon Rosen, Salil Vadhan
2008/096 (PDF ) Optimal Pairings F. Vercauteren
2008/095 (PDF ) Strongly Unforgeable ID-based Signatures Without Random Oracles Chifumi Sato, Takeshi Okamoto, Eiji Okamoto
2008/094 (PDF ) Universally Composable Undeniable Signature Kaoru Kurosawa, Jun Furukawa
2008/093 (PDF ) New ID-based Fair Blind Signatures Girraj Kumar Verma
2008/092 (PDF ) An Efficient SPRP-secure Construction based on Pseudo Random Involution Mridul Nandi
2008/091 (PDF ) A Generic Method to Extend Message Space of a Strong Pseudorandom Permutation Mridul Nandi
2008/090 (PDF ) Improving upon HCTR and matching attacks for Hash-Counter-Hash approach Mridul Nandi
2008/089 (PDF ) An improved preimage attack on MD2 Søren S. Thomsen
2008/088 (PDF ) A Public Key Encryption In Standard Model Using Cramer-Shoup Paradigm Mahabir Prasad Jhanwar, Rana Barua
2008/087 (PDF ) Towards a Theory of White-Box Security Amir Herzberg, Haya Shulman, Amitabh Saxena, Bruno Crispo
2008/086 (PDF ) Efficient Perfectly Reliable and Secure Communication Tolerating Mobile Adversary Arpita Patra, Ashish Choudhary, Madhu Gayatri, C. Pandu Rangan
2008/085 (PDF ) All Pairings Are in a Group Chang-An Zhao, Fangguo Zhang, Jiwu Huang
2008/084 (PDF ) ID based generalized signcryption Sunder Lal, Prashant Kushwah
2008/083 (PDF ) On the Security of Chien's Ultralightweight RFID Authentication Protocol Hung-Min Sun, Wei-Chih Ting, King-Hang Wang
2008/082 (PDF ) Improving the Farnel, Threeballot, and Randell-Ryan Voting Schemes Roberto Araujo, Peter Y. A. Ryan
2008/081 (PDF ) Template Attacks on ECDSA Marcel Medwed, Elisabeth Oswald
2008/080 (PDF ) Pairing-Based Onion Routing with Improved Forward Secrecy Aniket Kate, Greg Zaverucha, Ian Goldberg
2008/079 (PDF ) Homomorphic Encryption with CCA Security Manoj Prabhakaran, Mike Rosulek
2008/078 (PDF ) A Short Proof of the PRP/PRF Switching Lemma Donghoon Chang, Mridul Nandi
2008/077 (PDF ) Nonlinear Piece In Hand Matrix Method for Enhancing Security of Multivariate Public Key Cryptosystems Shigeo Tsujii, Kohtaro Tadaki, Ryou Fujita
2008/076 (PDF ) Results from a Search for the Best Linear Approximation of a Block Cipher Kashif Ali, Howard M. Heys
2008/075 (PDF ) On the Strength of the Concatenated Hash Combiner when All the Hash Functions are Weak Jonathan J. Hoch, Adi Shamir
2008/074 (PDF ) On the Chikazawa-Inoue ID based key system Bae Eun Jung, Hee Jean Kim
2008/073 (PDF ) Compact Proofs of Retrievability Hovav Shacham, Brent Waters
2008/072 (PDF ) The SIP Security Enhanced by Using Pairing-assisted Massey-Omura Signcryption Alexandre M. Deusajute, Paulo S. L. M. Barreto
2008/071 (PDF ) Blockcipher Based Hashing Revisited Martijn Stam
2008/070 (PDF ) Generators of Jacobians of Genus Two Curves Christian Robenhagen Ravnshoj
2008/069 (PDF ) HENKOS Cryptanalysis-Related keys attack Marius Oliver Gheorghita
2008/068 (PDF ) Multiparty Computation Goes Live Peter Bogetoft, Dan Lund Christensen, Ivan Damgard, Martin Geisler, Thomas Jakobsen, Mikkel Krøigaard, Janus Dam Nielsen, Jesper Buus Nielsen, Kurt Nielsen, Jakob Pagter, Michael Schwartzbach, Tomas Toft
2008/067 (PDF ) The Twin Diffie-Hellman Problem and Applications David Cash, Eike Kiltz, Victor Shoup
2008/066 (PDF ) High Performance Architecture for Elliptic Curve Scalar Multiplication over GF(2^m) Junjie Jiang, Jing Chen, Jian Wang, Duncan S. Wong, Xiaotie Deng
2008/065 (PDF ) Infringing and Improving Password Security of a Three-Party Key Exchange Protocol Junghyun Nam
2008/064 (PDF ) Remarks on the NFS complexity Pavol Zajac
2008/063 (PDF ) Efficient Sequential Aggregate Signed Data Gregory Neven
2008/062 (PDF ) Computing Hilbert Class Polynomials Juliana Belding, Reinier Broker, Andreas Enge, Kristin Lauter
2008/061 (PDF ) Abelian varieties with prescribed embedding degree David Freeman, Peter Stevenhagen, Marco Streng
2008/060 (PDF ) Fast Algorithms for Arithmetic on Elliptic Curves Over Prime Fields Nicholas T. Sullivan
2008/059 (PDF ) Buying random votes is as hard as buying no-votes Stefan Popoveniuc, Jonathan Stanton
2008/058 (PDF ) Physical Cryptanalysis of KeeLoq Code Hopping Applications Thomas Eisenbarth, Timo Kasper, Amir Moradi, Christof Paar, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani
2008/057 (PDF ) Software Implementation of Genus-2 Hyperelliptic Curve Cryptosystems Over Prime Fields Vladislav Kovtun, Jan Pelzl, Alexandr Kuznetsov
2008/056 (PDF ) Fast explicit formulae for genus 2 hyperelliptic curves using projective coordinates (Updated) Vladislav Kovtun, Thomas Wollinger
2008/054 (PDF ) Variants of the Distinguished Point Method for Cryptanalytic Time Memory Trade-offs (Full version) Jin Hong, Kyung Chul Jeong, Eun Young Kwon, In-Sok Lee, Daegun Ma
2008/053 (PDF ) Breaking One-Round Key-Agreement Protocols in the Random Oracle Model Miroslava Sotakova
2008/052 (PDF ) New Multibase Non-Adjacent Form Scalar Multiplication and its Application to Elliptic Curve Cryptosystems (extended version) Patrick Longa, Ali Miri
2008/051 (PDF ) New Composite Operations and Precomputation Scheme for Elliptic Curve Cryptosystems over Prime Fields (full version) Patrick Longa, Ali Miri
2008/050 (PDF ) Multi-PKG ID based signcryption Sunder Lal, Prashant Kushwah
2008/049 (PDF ) An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries Yehuda Lindell, Benny Pinkas
2008/048 (PDF ) Improved Cryptanalysis of APOP-MD4 and NMAC-MD4 using New Differential Paths Donghoon Chang, Jaechul Sung, Seokhie Hong, Sangjin Lee
2008/047 (PDF ) Fair Traceable Multi-Group Signatures Vicente Benjumea, Seung Geol Choi, Javier Lopez, Moti Yung
2008/046 (PDF ) David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware Tal Moran, Gil Segev
2008/045 (PDF ) Threshold RSA for Dynamic and Ad-Hoc Groups Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin
2008/044 (PDF ) Unidirectional Key Distribution Across Time and Space with Applications to RFID Security Ari Juels, Ravikanth Pappu, Bryan Parno
2008/043 (PDF ) Cryptanalysis of CRUSH hash structure Nasour Bagheri, Majid Naderi, Babak Sadeghiyan
2008/042 (PDF ) Trusted-HB: a low-cost version of HB+ secure against Man-in-The-Middle attacks Julien Bringer, Herve Chabanne
2008/041 (PDF ) A New Proxy Identity-Based Signcryption Scheme for Partial Delegation of Signing Rights Hassan Elkamchouchi, Yasmine Abouelseoud
2008/040 (PDF ) Efficient and Generalized Pairing Computation on Abelian Varieties Eunjeong Lee, Hyang-Sook Lee, Cheol-Min Park
2008/039 (PDF ) New Results on Unconditionally Secure Multireceiver Manual Authentication Shuhong Wang, Reihaneh Safavi-Naini
2008/038 (PDF ) A New Blind Identity-Based Signature Scheme with Message Recovery Hassan Elkamchouchi, Yasmine Abouelseoud
2008/037 (PDF ) Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures Georg Fuchsbauer, David Pointcheval
2008/036 (PDF ) Generic Attacks on Feistel Schemes Jacques Patarin
2008/035 (PDF ) Efficient Fully-Simulatable Oblivious Transfer Yehuda Lindell
2008/034 (PDF ) Perfectly Hiding Commitment Scheme with Two-Round from Any One-Way Permutation Chunming Tang, Dingyi Pei, Zhuojun Liu, Zheng-an Yao, Mingsheng Wang
2008/033 (PDF ) Lower Bounds on Signatures From Symmetric Primitives Boaz Barak, Mohammad Mahmoody
2008/032 (PDF ) Merkle's Key Agreement Protocol is Optimal: An $O(n^2)$ Attack on any Key Agreement from Random Oracles Boaz Barak, Mohammad Mahmoody
2008/031 (PDF ) Authenticating with Attributes Dalia Khader
2008/030 (PDF ) Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors Ronald Cramer, Yevgeniy Dodis, Serge Fehr, Carles Padró, Daniel Wichs
2008/029 (PDF ) Non-Cyclic Subgroups of Jacobians of Genus Two Curves Christian Robenhagen Ravnshoj
2008/028 (PDF ) HB#: Increasing the Security and Efficiency of HB+ Henri Gilbert, Matthew J. B. Robshaw, Yannick Seurin
2008/027 (PDF ) Blind Signature Scheme over Braid Groups Girraj Kumar Verma
2008/026 (PDF ) Pairing-friendly Hyperelliptic Curves with Ordinary Jacobians of Type $y^2=x^5+ax$ Mitsuru Kawazoe, Tetsuya Takahashi
2008/025 (PDF ) Non-Cyclic Subgroups of Jacobians of Genus Two Curves with Complex Multiplication Christian Robenhagen Ravnshoj
2008/024 (PDF ) Identity Based Strong Bi-Designated Verifier Proxy Signature Schemes Sunder Lal, Vandani Verma
2008/023 (PDF ) General Certificateless Encryption and Timed-Release Encryption Sherman S. M. Chow, Volker Roth, Eleanor G. Rieffel
2008/022 (PDF ) Computing Almost Exact Probabilities of Differential Hash Collision Paths by Applying Appropriate Stochastic Methods M. Gebhardt, G. Illies, W. Schindler
2008/021 (PDF ) Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis Matthieu Rivain, Emmanuelle Dottax, Emmanuel Prouff
2008/020 (PDF ) CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption Eike Kiltz, Yevgeniy Vahlis
2008/019 (PDF ) Computing Pairings Using x-Coordinates Only Steven D. Galbraith, Xibin Lin
2008/018 (PDF ) Disjunctive Multi-Level Secret Sharing Mira Belenkiy
2008/017 (PDF ) New State Recovery Attack on RC4 Alexander Maximov, Dmitry Khovratovich
2008/016 (PDF ) ECM using Edwards curves Daniel J. Bernstein, Peter Birkner, Tanja Lange, Christiane Peters
2008/015 (PDF ) Practical Short Signature Batch Verification Anna Lisa Ferrara, Matthew Green, Susan Hohenberger, Michael Østergaard Pedersen
2008/014 (PDF ) Simulatable Adaptive Oblivious Transfer Jan Camenisch, Gregory Neven, abhi shelat
2008/013 (PDF ) Twisted Edwards Curves Daniel J. Bernstein, Peter Birkner, Marc Joye, Tanja Lange, Christiane Peters
2008/012 (PDF ) The Encrypted Elliptic Curve Hash Daniel R. L. Brown
2008/011 (PDF ) A simple generalization of the {E}l{G}amal cryptosystem to non-abelian groups II Ayan Mahalanobis
2008/010 (PDF ) A Proof of Security in $O(2^n)$ for the Xor of Two Random Permutations\\ -- Proof with the ``$H_{\sigma}$ technique''-- Jacques Patarin
2008/009 (PDF ) Generic Attacks for the Xor of k random permutations Jacques Patarin
2008/008 (PDF ) Factoring Polynomials for Constructing Pairing-friendly Elliptic Curves Zhitu su, Hui Li, Jianfeng Ma
2008/007 (PDF ) Efficient One-round Key Exchange in the Standard Model Colin Boyd, Yvonne Cliff, Juan M. Gonzalez Nieto, Kenneth G. Paterson
2008/006 (PDF ) Joint State Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation Ralf Kuesters, Max Tuengerthal
2008/005 (PDF ) Information Theoretic Evaluation of Side-Channel Resistant Logic Styles Francois Mace, Francois-Xavier Standaert, Jean-Jacques Quisquater
2008/004 (PDF ) Efficient Tweakable Enciphering Schemes from (Block-Wise) Universal Hash Functions Palash Sarkar
2008/003 (PDF ) On Collisions of Hash Functions Turbo SHA-2 Vlastimil Klima
2008/002 (PDF ) Fuzzy Identity Based Signature Piyi Yang, Zhenfu Cao, Xiaolei Dong
2008/001 (PDF ) Security Proof for the Improved Ryu-Yoon-Yoo Identity-Based Key Agreement Protocol Shengbao Wang, Zhenfu Cao, Kim-Kwang Raymond Choo, Lihua Wang
2007/482 (PDF ) TinyPBC: Pairings for Authenticated Identity-Based Non-Interactive Key Distribution in Sensor Networks Leonardo B. Oliveira, Michael Scott, Julio López, Ricardo Dahab
2007/480 (PDF ) Differential Fault Analysis on the AES Key Schedule Junko Takahashi, Toshinori Fukunaga
2007/479 (PDF ) An Efficient Identification Protocol and the Knowledge-of-Exponent Assumption J. Wu, D. R. Stinson
2007/478 (PDF ) Impossibility Results for Universal Composability in Public-Key Models and with Fixed Inputs Dafna Kidron, Yehuda Lindell
2007/477 (PDF ) Algebraic Side-Channel Collision Attacks on AES Andrey Bogdanov, Andrey Pyshkin
2007/476 (PDF ) Dynamic SHA Xu Zijie
2007/475 (PDF ) Obtaining Universally Composable Security: Towards the Bare Bones of Trust Ran Canetti
2007/474 (PDF ) Notes on the Wang et al. $2^{63}$ SHA-1 Differential Path Martin Cochran
2007/473 (PDF ) Authenticated Key Exchange and Key Encapsulation Without Random Oracles Tatsuaki Okamoto
2007/472 (PDF ) New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba Jean-Philippe Aumasson, Simon Fischer, Shahram Khazaei, Willi Meier, Christian Rechberger
2007/471 (PDF ) Attacks on the WEP protocol Erik Tews
2007/470 (PDF ) Faster Multi-Exponentiation through Caching: Accelerating (EC)DSA Signature Verification Bodo Möller, Andy Rupp
2007/469 (PDF ) ID-Based Group Password-Authenticated Key Exchange Xun Yi, Raylin Tso, Eiji Okamoto
2007/467 (PDF ) Interactive and Noninteractive Zero Knowledge are Equivalent in the Help Model André Chailloux, Dragos Florin Ciocan, Iordanis Kerenidis, Salil Vadhan
2007/466 (PDF ) Improved Impossible Differential Cryptanalysis of CLEFIA Wei Wang, Xiaoyun Wang
2007/465 (PDF ) A Synthetic Indifferentiability Analysis of Some Block-Cipher-Based Hash Functions Zheng Gong, Xuejia Lai, Kefei Chen
2007/464 (PDF ) Secure Computation Without Authentication Boaz Barak, Ran Canetti, Yehuda Lindell, Rafael Pass, Tal Rabin
2007/463 (PDF ) Efficient GF(3m) Multiplication Algorithm for eta T Pairing Gen Takahashi, Fumitaka Hoshino, Tetsutaro Kobayashi
2007/462 (PDF ) Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures Siamak F Shahandashti, Reihaneh Safavi-Naini
2007/461 (PDF ) Verifiable Attribute-based Encryption Qiang Tang, Dongyao Ji
2007/460 (PDF ) Guarantees for Customers of Incentive Anonymizing Networks Timothy Atkinson, Marius Silaghi
2007/459 (PDF ) Practical Anonymous Divisible E-Cash From Bounded Accumulators Man Ho Au, Willy Susilo, Yi Mu
2007/458 (PDF ) Saving Private Randomness in One-Way Functions and Pseudorandom Generators Nenad Dedic, Danny Harnik, Leonid Reyzin
2007/457 (PDF ) Comparing Implementation Efficiency of Ordinary and Squared Pairings Christine Abegail Antonio, Tanaka Satoru, Ken Nakamula
2007/455 (PDF ) Analysis and optimization of elliptic-curve single-scalar multiplication Daniel J. Bernstein, Tanja Lange
2007/454 (PDF ) Efficient Certificateless Signatures Suitable for Aggregation Rafael Castro, Ricardo Dahab
2007/453 (PDF ) On the Relations Between Non-Interactive Key Distribution, Identity-Based Encryption and Trapdoor Discrete Log Groups Kenneth G. Paterson, Sriramkrishnan Srinivasan
2007/452 (PDF ) Constructing Brezing-Weng pairing friendly elliptic curves using elements in the cyclotomic field Ezekiel J. Kachisa, Edward F. Schaefer, Michael Scott
2007/451 (PDF ) Precise Concurrent Zero Knowledge Omkant Pandey, Rafael Pass, Amit Sahai, Wei-Lung Dustin Tseng, Muthuramakrishnan Venkitasubramaniam
2007/450 (PDF ) Short Group Signature without Random Oracles Xiaohui Liang, Zhenfu Cao, Jun Shao, Huang Lin
2007/449 (PDF ) Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions Jacques Patarin, Valérie Nachef, Côme Berbain
2007/448 (PDF ) Generalized Correlation and Higher Order Nonlinearity for Probabilistic Algebraic Attacks Description Sergiy Pometun
2007/447 (PDF ) Weak adaptive chosen ciphertext secure hybrid encryption scheme Xianhui Lu, Xuejia Lai, Dake He, Guomin Li
2007/446 (PDF ) A Lattice-Based Computationally-Efficient Private Information Retrieval Protocol Carlos AGUILAR MELCHOR, Philippe GABORIT
2007/445 (PDF ) Proposal of a new efficient public key system for encryption and digital signatures Gerold Grünauer
2007/444 (PDF ) Tight bounds between algebraic immunity and nonlinearities of high orders Lobanov Mikhail
2007/443 (PDF ) Template Attacks with a Power Model Moulay Abdelaziz EL AABID, Sylvain GUILLEY, Philippe HOOGVORST
2007/442 (PDF ) Another Look at Non-Standard Discrete Log and Diffie-Hellman Problems Neal Koblitz, Alfred Menezes
2007/441 (PDF ) Faster Group Operations on Elliptic Curves Huseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson
2007/440 (PDF ) An Improved Remote User Authentication Scheme using Bilinear Pairings Sunder Lal, K. K. Goyal
2007/439 (PDF ) Multiparty Key Agreement Using Bilinear Map Nam-Su Jho, Myung-Hwan Kim, Do Won Hong, Byung-Gil Lee
2007/438 (PDF ) Ordered Multisignatures and Identity-Based Sequential Aggregate Signatures, with Applications to Secure Routing Alexandra Boldyreva, Craig Gentry, Adam O'Neill, Dae Hyun Yum
2007/437 (PDF ) Reconfigurable Hardware Implementations of Tweakable Enciphering Schemes Cuauhtemoc Mancillas-Lopez, Debrup Chakraborty, Francisco Rodriguez-Henriquez
2007/436 (PDF ) New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B Gautham Sekar, Souradyuti Paul, Bart Preneel
2007/435 (PDF ) Irreducibility to the One-More Evaluation Problems: More May Be Less Daniel R. L. Brown
2007/434 (PDF ) Computing the Ate Pairing on Elliptic Curves with Embedding Degree $k=9$ Xibin Lin, Chang-An Zhao, Fangguo Zhang, Yanming Wang
2007/433 (PDF ) An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol based on Merkle Trees Fabien Coelho
2007/432 (PDF ) Trapdoors for Hard Lattices and New Cryptographic Constructions Craig Gentry, Chris Peikert, Vinod Vaikuntanathan
2007/431 (PDF ) Notions of Efficiency in Simulation Paradigm Tzer-jen Wei
2007/430 (PDF ) Cryptanalysis of LASH Scott Contini, Krystian Matusiewicz, Josef Pieprzyk, Ron Steinfeld, Jian Guo, San Ling, Huaxiong Wang
2007/429 (PDF ) On compressible pairings and their computation Michael Naehrig, Paulo S. L. M. Barreto, Peter Schwabe
2007/428 (PDF ) Isogenies and the Discrete Logarithm Problem on Jacobians of Genus 3 Hyperelliptic Curves Benjamin Smith
2007/427 (PDF ) Idempotents in the Neighbourhood of Patterson-Wiedemann Functions having Walsh Spectra Zeros Sumanta Sarkar, Subhamoy Maitra
2007/426 (PDF ) Implementing Cryptographic Pairings over Curves of Embedding Degrees 8 and 10 Christine Abegail Antonio, Satoru Tanaka, Ken Nakamula
2007/425 (PDF ) On prime-order elliptic curves with embedding degrees k=3,4 and 6 Koray Karabina, Edlyn Teske
2007/424 (PDF ) When e-th Roots Become Easier Than Factoring Antoine Joux, David Naccache, Emmanuel Thomé
2007/423 (PDF ) Finding Low Weight Polynomial Multiples Using Lattices Laila El Aimani, Joachim von zur Gathen
2007/422 (PDF ) Structural Identity-Based Encryption Man Ho Au, Siu-Ming Yiu
2007/421 (PDF ) The role of help in Classical and Quantum Zero-Knowledge André Chailloux, Iordanis Kerenidis
2007/420 (PDF ) A Critical Analysis and Improvement of AACS Drive-Host Authentication Jiayuan Sui, Douglas R. Stinson
2007/419 (PDF ) Cryptanalysis of the Random Number Generator of the Windows Operating System Leo Dorrendorf, Zvi Gutterman, Benny Pinkas
2007/417 (PDF ) Algorithms and Arithmetic Operators for Computing the $\eta_T$ Pairing in Characteristic Three Jean-Luc Beuchat, Nicolas Brisebarre, Jérémie Detrey, Eiji Okamoto, Masaaki Shirase, Tsuyoshi Takagi
2007/416 (PDF ) Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function Donghoon Chang, Mridul Nandi, Jesang Lee, Jaechul Sung, Seokhie Hong
2007/415 (PDF ) Cryptanalytic Flaws in Oh et al.'s ID-Based Authenticated Key Agreement Protocol Meng-Hui Lim, Sanggon Lee, Hoonjae Lee
2007/414 (PDF ) Optimizing double-base elliptic-curve single-scalar multiplication Daniel J. Bernstein, Peter Birkner, Tanja Lange, Christiane Peters
2007/413 (PDF ) Breaking ONE.FIVIUM by AIDA an Algebraic IV Differential Attack Michael Vielhaber
2007/412 (PDF ) Proposing a Master One-Way Function Gideon Samid
2007/411 (PDF ) Cryptanalysis on Improved One-round Lin-Li's Tripartite Key Agreement Protocol Meng-Hui Lim, Sanggon Lee, Hoonjae Lee
2007/410 (PDF ) Inverted Edwards coordinates Daniel J. Bernstein, Tanja Lange
2007/409 (PDF ) Building a Collision-Resistant Compression Function from Non-Compressing Primitives Thomas Shrimpton, Martijn Stam
2007/408 (PDF ) Differential Cryptanalysis of PRESENT Meiqin Wang
2007/406 (PDF ) Modeling Computational Security in Long-Lived Systems Ran Canetti, Ling Cheung, Dilsun Kaynar, Nancy Lynch, Olivier Pereira
2007/405 (PDF ) Secure PRNGs from Specialized Polynomial Maps over Any $F_q$ Michael Feng-Hao Liu, Chi-Jen Lu, Bo-Yin Yang, Jintai Ding
2007/404 (PDF ) Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products Jonathan Katz, Amit Sahai, Brent Waters
2007/403 (PDF ) Turbo SHA-2 Danilo Gligoroski, Svein Johan Knapskog
2007/402 (PDF ) Robust, Anonymous RFID Authentication with Constant Key-Lookup Mike Burmester, Breno de Medeiros, Rossana Motta
2007/401 (PDF ) Another Look at Automated Theorem-Proving Neal Koblitz
2007/400 (PDF ) REMARKS ON IBE SCHEME OF WANG AND CAO Sunder Lal, Priyam Sharma
2007/399 (PDF ) Ceremony Design and Analysis Carl Ellison
2007/397 (PDF ) On the security defects of an image encryption scheme Chengqing Li, Shujun Li, Muhammad Asim, Juana Nunez, Gonzalo Alvarez, Guanrong Chen
2007/396 (PDF ) Proxy Re-Signature Schemes without Random Oracles Jun Shao, Zhenfu Cao, Licheng Wang, Xiaohui Liang
2007/395 (PDF ) Second Preimage Attacks on Dithered Hash Functions Charles Bouillaguet, Pierre-Alain Fouque, Adi Shamir, Sebastien Zimmer
2007/394 (PDF ) Almost-everywhere Secure Computation Juan A. Garay, Rafail Ostrovsky
2007/393 (PDF ) Overlap-free Karatsuba-Ofman Polynomial Multiplication Algorithms Haining Fan, Jiaguang Sun, Ming Gu, Kwok-Yan Lam
2007/392 (PDF ) Efficient Computationally Private Information Retrieval From Anonymity or Trapdoor Groups Jonathan Trostle, Andy Parrish
2007/391 (PDF ) A novel public key crypto system based on semi-modules over quotient semi-rings Reza Ebrahimi Atani, Shahabaddin Ebrahimi Atani, Sattar Mirzakuchaki
2007/390 (PDF ) Implementing Cryptographic Pairings over Barreto-Naehrig Curves Augusto Jun Devegili, Michael Scott, Ricardo Dahab
2007/389 (PDF ) Interactive and Noninteractive Zero Knowledge Coincide in the Help Model Dragos Florin Ciocan, Salil Vadhan
2007/388 (PDF ) On Ciphertext Undetectability Peter Gazi, Martin Stanek
2007/386 (PDF ) (Convertible) Undeniable Signatures without Random Oracles Tsz Hon Yuen, Man Ho Au, Joseph K. Liu, Willy Susilo
2007/385 (PDF ) On the insecurity of interchanged use of OFB and CBC modes of operation Danilo Gligoroski
2007/384 (PDF ) Non-Interactive Anonymous Credentials Mira Belenkiy, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya
2007/383 (PDF ) Cryptanalysis on Improved Chou et al.'s ID-Based Deniable Authentication Protocol Meng-Hui Lim, Sanggon Lee, Hoonjae Lee
2007/382 (PDF ) Oblivious Transfer via McEliece's PKC and Permuted Kernels K. Kobara, K. Morozov, R. Overbeck
2007/381 (PDF ) Cryptanalysis of Two New Instances of TTM Cryptosystem Xuyun Nie, Xin Jiang, Lei Hu, Jintai Ding
2007/380 (PDF ) X-FCSR: a new software oriented stream cipher based upon FCSRs Francois Arnault, Thierry P. Berger, Cédric Lauradoux, Marine Minier
2007/379 (PDF ) On The Inequivalence Of Ness-Helleseth APN Functions Xiangyong Zeng, Lei Hu, Yang Yang, Wenfeng Jiang
2007/378 (PDF ) Algebraic Structure Defectoscopy Sean O'Neil
2007/376 (PDF ) An Efficient Range-Bounded Commitment Scheme Zhengjun Cao
2007/375 (PDF ) Further Musings on the Wang et al. MD5 Collision: Improvements and Corrections on the Work of Hawkes, Paddon, and Rose Gregory Hirshman
2007/374 (PDF ) On Factoring Arbitrary Integers with Known Bits Mathias Herrmann, Alexander May
2007/373 (PDF ) A Meet-in-the-Middle Collision Attack Against the New FORK-256 Markku-Juhani O. Saarinen
2007/372 (PDF ) On the Authentication of One Popular Signcryption Scheme Zhengjun Cao
2007/371 (PDF ) Group-oriented encryption secure against collude attack Chunbo Ma, Jun Ao, Jianhua Li
2007/370 (PDF ) FURTHER PROPERTIES OF SEVERAL CLASSES OF BOOLEAN FUNCTIONS WITH OPTIMUM ALGEBRAIC IMMUNITY Claude Carlet, Xiangyong Zeng, Chunlei Li, Lei Hu
2007/369 (PDF ) Universally Composable Multi-Party Computation with an Unreliable Common Reference String Vipul Goyal, Jonathan Katz
2007/368 (PDF ) Reducing Trust in the PKG in Identity Based Cryptosystems Vipul Goyal
2007/367 (PDF ) Cryptanalysis of Rational Multivariate Public Key Cryptosystems Jintai Ding, John Wagner
2007/366 (PDF ) Breaking the Symmetry: a Way to Resist the New Differential Attack Jintai Ding, Bo-Yin Yang, Chen-Mou Cheng, Owen Chen, Vivien Dubois
2007/365 (PDF ) Pairings on Jacobians of Hyperelliptic Curves Christian Robenhagen Ravnshoj
2007/364 (PDF ) A Proof of Security of a Mesh Security Architecture Doug Kuhlman, Ryan Moriarty, Tony Braskich, Steve Emeott, Mahesh Tripunitara
2007/363 (PDF ) Fuzzy Private Matching (Extended Abstract) Łukasz Chmielewski, Jaap-Henk Hoepman
2007/362 (PDF ) Statistical Testing for Disk Encryption Modes of Operations Mohamed Abo El-Fotouh, Klaus Diepold
2007/361 (PDF ) Proxy Re-encryption Systems for Identity-based Encryption Toshihiko Matsuo
2007/360 (PDF ) Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems Andy Rupp, Gregor Leander, Endre Bangerter, Ahmad-Reza Sadeghi, Alexander W. Dent
2007/359 (PDF ) Intrusion-Resilient Secret Sharing Stefan Dziembowski, Krzysztof Pietrzak
2007/358 (PDF ) Improving the Round Complexity of VSS in Point-to-Point Networks Jonathan Katz, Chiu-Yuen Koo, Ranjit Kumaresan
2007/357 (PDF ) A Note on Signature Standards Michael Braun, Anton Kargl
2007/356 (PDF ) A Block Cipher based PRNG Secure Against Side-Channel Key Recovery Christophe Petit, Francois-Xavier Standaert, Olivier Pereira, Tal G. Malkin, Moti Yung
2007/355 (PDF ) Secret sharing on the infinite ladder Laszlo Csirmaz
2007/354 (PDF ) Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures Cheng-Kang Chu, Wen-Guey Tzeng
2007/353 (PDF ) Multiparty Computation to Generate Secret Permutations Chris Studholme, Ian Blake
2007/352 (PDF ) New Local Collisions for the SHA-2 Hash Family Somitra Kumar Sanadhya, Palash Sarkar
2007/351 (PDF ) A Linear Lower Bound on the Communication Complexity of Single-Server Private Information Retrieval Iftach Haitner, Jonathan J. Hoch, Gil Segev
2007/350 (PDF ) On Tweaking Luby-Rackoff Blockciphers David Goldenberg, Susan Hohenberger, Moses Liskov, Elizabeth Crump Schwartz, Hakan Seyalioglu
2007/349 (PDF ) Statistically Hiding Sets Manoj Prabhakaran, Rui Xue
2007/348 (PDF ) A Framework for Efficient and Composable Oblivious Transfer Chris Peikert, Vinod Vaikuntanathan, Brent Waters
2007/347 (PDF ) Lai-Massey Scheme and Quasi-Feistel Networks Aaram Yun, Je Hong Park, Jooyoung Lee
2007/345 (PDF ) Analysis of Underlying Assumptions in NIST DRBGs Wilson Kan
2007/344 (PDF ) Security Analysis of WAPI Authentication and Key Exchange Protocol Liufei Wu, Yuqing Zhang, FengjiaoWang
2007/343 (PDF ) Updated standards for validating elliptic curves Laura Hitt
2007/342 (PDF ) A New Security Model for Cross-Realm C2C-PAKE Protocol Fengjiao Wang, Yuqing Zhang
2007/341 (PDF ) Multi-Party Indirect Indexing and Applications Matthew Franklin, Mark Gondree, Payman Mohassel
2007/340 (PDF ) Efficient Implementation of the Pairing on Mobilephones using BREW Motoi Yoshitomi, Tsuyoshi Takagi, Shinsaku Kiyomoto, Toshiaki Tanaka
2007/339 (PDF ) On the security of a class of image encryption schemes Chengqing Li, Guanrong Chen
2007/338 (PDF ) VHASH Security Wei Dai, Ted Krovetz
2007/337 (PDF ) Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication (Revised) W. Bamberger, O. Welter, S. Spitz, M. Marhöfer
2007/336 (PDF ) A Major Vulnerability in RSA Implementations due to MicroArchitectural Analysis Threat Onur Aciicmez, Werner Schindler
2007/335 (PDF ) Encryption Techniques for Secure Database Outsourcing Sergei Evdokimov, Oliver Guenther
2007/334 (PDF ) New Constructions for UC Secure Computation using Tamper-proof Hardware Nishanth Chandran, Vipul Goyal, Amit Sahai
2007/333 (PDF ) Towards Key-Dependent Message Security in the Standard Model Dennis Hofheinz, Dominique Unruh
2007/332 (PDF ) Universally Composable Multiparty Computation with Partially Isolated Parties Ivan Damgaard, Jesper Buus Nielsen, Daniel Wichs
2007/331 (PDF ) Isolated Proofs of Knowledge and Isolated Zero Knowledge Ivan Damgaard, Jesper Buus Nielsen, Daniel Wichs
2007/330 (PDF ) Remote Power Analysis of {RFID} Tags Yossi Oren
2007/329 (PDF ) A Tunable Broadcast Encryption Scheme David Lubicz, Thomas Sirvent
2007/328 (PDF ) A Tight High-Order Entropic Quantum Uncertainty Relation With Applications Ivan Damgaard, Serge Fehr, Renato Renner, Louis Salvail, Christian Schaffner
2007/327 (PDF ) Secure Identification and QKD in the Bounded-Quantum-Storage Model Ivan Damgaard, Serge Fehr, Louis Salvail, Christian Schaffner
2007/326 (PDF ) Efficient Password-based Authenticated Key Exchange without Public Information Jun Shao, Zhenfu Cao, Licheng Wang, Rongxing Lu
2007/325 (PDF ) Faster and Shorter Password-Authenticated Key Exchange Rosario Gennaro
2007/324 (PDF ) Towards provable security for route discovery protocols in mobile ad hoc networks Mike Burmester, Breno de Medeiros
2007/323 (PDF ) Attribute-Based Encryption with Non-Monotonic Access Structures Rafail Ostrovsky, Amit Sahai, Brent Waters
2007/322 (PDF ) Identifying Ideal Lattices Jintai Ding, Richard Lindner
2007/321 (PDF ) Balanced Boolean Functions with Nonlinearity > 2^{n-1} - 2^{(n-1)/2} Selcuk Kavut, Melek Diker Yucel
2007/320 (PDF ) On the Big Gap Between $|p|$ and $|q|$ in DSA Zhengjun Cao
2007/319 (PDF ) A New Security Definition for Public Key Encryption Schemes and Its Applications Guomin Yang, Duncan S. Wong, Qiong Huang, Xiaotie Deng
2007/318 (PDF ) On the complexity of side-channel attacks on AES-256 -- methodology and quantitative results on cache attacks Michael Neve, Kris Tiri
2007/317 (PDF ) Improving Upon the TET Mode of Operation Palash Sarkar
2007/316 (PDF ) SECURITY PROOF FOR SHENGBAO WANG’S IDENTITY-BASED ENCRYPTION SCHEME Sunder Lal, Priyam Sharma
2007/315 (PDF ) Security under Key-Dependent Inputs Shai Halevi, Hugo Krawczyk
2007/313 (PDF ) Perfect Forward Secure Identity-Based Authenticated Key Agreement Protocol in the Escrow Mode Shengbao Wang, Zhenfu Cao, Zhaohui Cheng, Kim-Kwang Raymond Choo
2007/312 (PDF ) Secure Similarity Search Hyun-A Park, Bum Han Kim, Dong Hoon Lee, Yon Dohn Chung, Justin Zhan
2007/311 (PDF ) A Refined Algorithm for the $\eta_T$ Pairing Calculation in Characteristic Three Jean-Luc Beuchat, Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto
2007/310 (PDF ) A Note on Point Multiplication on Supersingular Elliptic Curves over Ternary Fields Kwang Ho Kim
2007/309 (PDF ) Balanced Boolean Function on 13-variables having Nonlinearity strictly greater than the Bent Concatenation Bound Subhamoy Maitra
2007/308 (PDF ) Generalized Rotation Symmetric and Dihedral Symmetric Boolean Functions - 9 variable Boolean Functions with Nonlinearity 242 Selcuk Kavut, Melek Diker Yucel
2007/307 (PDF ) Locally Invertible Boolean Mappings Oleg A. Logachev
2007/306 (PDF ) Novel Approaches for Improving the Power Consumption Models in Correlation Analysis Thanh-Ha Le, Quoc-Thinh Nguyen-Vuong, Cécile Canovas, Jessy Clédière
2007/305 (PDF ) On Non-Randomness of the Permutation after RC4 Key Scheduling Goutam Paul, Subhamoy Maitra, Rohit Srivastava
2007/304 (PDF ) A Bound on the Size of Separating Hash Families Simon R. Blackburn, Tuvi Etzion, Douglas R. Stinson, Gregory M. Zaverucha
2007/303 (PDF ) A Forward Secure Remote User Authentication Scheme Manoj Kumar
2007/302 (PDF ) Compression Functions Suitable for the Multi-Property-Preserving Transform Hidenori Kuwakado, Masakatu Morii
2007/301 (PDF ) On Asymptotic Behavior of the Ratio Between the Numbers of Binary Primitive and Irreducible Polynomials Yuri Borissov, Moon Ho Lee, Svetla Nikova
2007/300 (PDF ) A Note on Automata-based Dynamic Convolutional Cryptosystems Renji Tao
2007/299 (PDF ) Optimizing Multiprecision Multiplication for Public Key Cryptography Michael Scott, Piotr Szczechowiak
2007/298 (PDF ) The Security of the Extended Codebook (XCB) Mode of Operation David A. McGrew, Scott R. Fluhrer
2007/297 (PDF ) Secret sharing on infinite graphs Laszlo Csirmaz
2007/296 (PDF ) Construction of Efficient and Secure Pairing Algorithm and its Application Doo Ho Choi, Dong-Guk Han, Howon Kim
2007/295 (PDF ) Linearization Attacks Against Syndrome Based Hashes Markku-Juhani O. Saarinen
2007/294 (PDF ) Improved Privacy of the Tree-Based Hash protocols using Physically Unclonable Function Julien Bringer, Herve Chabanne, Thomas Icart
2007/293 (PDF ) Fully Resilient Traitor Tracing Scheme using Key Update Eun Sun Yoo, Koutarou Suzuki, Myung-Hwan Kim
2007/292 (PDF ) Improved security analysis of OMAC Mridul Nandi
2007/291 (PDF ) Relations Among Notions of Plaintext Awareness James Birkett, Alexander W. Dent
2007/290 (PDF ) Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity on Odd Number of Variables Sumanta Sarkar, Subhamoy Maitra
2007/289 (PDF ) Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol Michael Backes, Matteo Maffei, Dominique Unruh
2007/288 (PDF ) Secure Hybrid Encryption from Weakened Key Encapsulation Dennis Hofheinz, Eike Kiltz
2007/287 (PDF ) The Effectiveness of Receipt-Based Attacks on ThreeBallot Kevin Henry, Douglas R. Stinson, Jiayuan Sui
2007/286 (PDF ) Faster addition and doubling on elliptic curves Daniel J. Bernstein, Tanja Lange
2007/285 (PDF ) Solving MRHS linear equations Håvard Raddum, Igor Semaev
2007/283 (PDF ) Provably Secure Framework for Information Aggregation is Sensor Networks Mark Manulis, Joerg Schwenk
2007/282 (PDF ) Analysis of countermeasures against access driven cache attacks on AES Johannes Blömer, Volker Krummel
2007/281 (PDF ) A Pollard-like pseudorandom number generator over EC Grzegorz Wojtenko
2007/280 (PDF ) On solving sparse algebraic equations over finite fields II Igor Semaev
2007/279 (PDF ) Lossy Trapdoor Functions and Their Applications Chris Peikert, Brent Waters
2007/278 (PDF ) A Framework for Iterative Hash Functions - HAIFA Eli Biham, Orr Dunkelman
2007/277 (PDF ) Cryptanalysis of a class of cryptographic hash functions Praveen Gauravaram, John Kelsey
2007/276 (PDF ) Prolific Codes with the Identifiable Parent Property Simon R. Blackburn, Tuvi Etzion, Siaw-Lynn Ng
2007/275 (PDF ) `Good' Pseudo-Random Binary Sequences from Elliptic Curves Zhixiong CHEN, Guozhen XIAO
2007/274 (PDF ) Group-based Proxy Re-encryption scheme Chunbo Ma, Jun Ao, Jianhua Li
2007/273 (PDF ) Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir without Random Oracles Mihir Bellare, Sarah Shoup
2007/272 (PDF ) Cryptanalysis of a Hash Function Proposed at ICISC 2006 Willi Geiselmann, Rainer Steinwandt
2007/271 (PDF ) Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms Mihir Bellare, Thomas Ristenpart
2007/270 (PDF ) Secret Ballot Elections with Unconditional Integrity David Chaum, Jeroen van de Graaf, Peter Y. A. Ryan, Poorvi L. Vora
2007/269 (PDF ) Voting with Unconditional Privacy by Merging Prêt-à-Voter and PunchScan Jeroen van de Graaf
2007/268 (PDF ) Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography Erik Dahmen, Katsuyuki Okeya, Daniel Schepers
2007/267 (PDF ) CRUST: Cryptographic Remote Untrusted Storage without Public Keys Erel Geron, Avishai Wool
2007/266 (PDF ) Filling the Gap between Voters and Cryptography in e-Voting Wei Han, Dong Zheng, Ke-fei Chen
2007/265 (PDF ) Which Languages Have 4-Round Zero-Knowledge Proofs? Jonathan Katz
2007/264 (PDF ) The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks Thomas Ristenpart, Scott Yilek
2007/262 (PDF ) Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model Yong Ho Hwang, Joseph K. Liu, Sherman S. M. Chow
2007/261 (PDF ) New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4 Subhamoy Maitra, Goutam Paul
2007/260 (PDF ) An Efficient One-move Nominative Signature Scheme Dennis Y. W. Liu, Qiong Huang, Duncan S. Wong
2007/259 (PDF ) Algebraic Immunity Hierarchy of Boolean Functions Ziran Tu, Yingpu Deng
2007/258 (PDF ) UICE: A High-Performance Cryptographic Module for SoC and RFID Applications Ulrich Kaiser
2007/257 (PDF ) A Forward-Secure Signature with Backward-Secure Detection Dai-Rui Lin, Chih-I Wang
2007/256 (PDF ) Aspects of Pairing Inversion S. D. Galbraith, F. Hess, F. Vercauteren
2007/253 (PDF ) Choosing the correct elliptic curve in the CM method K. Rubin, A. Silverberg
2007/252 (PDF ) A Verifiable Voting Protocol based on Farnel Roberto Araujo, Ricardo Felipe Custodio, Jeroen van de Graaf
2007/251 (PDF ) A Cryptographic Model for Branching Time Security Properties -- the Case of Contract Signing Protocols Vëronique Cortier, Ralf Kuesters, Bogdan Warinschi
2007/250 (PDF ) Efficient and Provably-Secure Certificateless Short Signature Scheme from Bilinear Pairings Hongzhen Du, Qiaoyan Wen
2007/249 (PDF ) Randomness Extraction via Delta-Biased Masking in the Presence of a Quantum Attacker Serge Fehr, Christian Schaffner
2007/248 (PDF ) 1. AES seems weak. 2. Linear time secure cryptography Warren D. Smith
2007/247 (PDF ) A Note on the Ate Pairing Chang-An Zhao, Fangguo Zhang, Jiwu Huang
2007/246 (PDF ) BEDA: Button-Enabled Device Pairing Claudio Soriente, Gene Tsudik, Ersin Uzun
2007/245 (PDF ) Incorporating Temporal Capabilities in Existing Key Management Schemes Mikhail J. Atallah, Marina Blanton, Keith B. Frikken
2007/244 (PDF ) A Note on the Relay Attacks on e-passports: The Case of Czech e-passports Martin Hlavac, Tomas Rosa
2007/242 (PDF ) Time-Memory-Data Trade-off Attack on Stream Ciphers based on Maiorana-McFarland Functions Khoongming Khoo, Guanhan Chew, Guang Gong, Hian-Kiat Lee
2007/241 (PDF ) Attribute Based Group Signature with Revocation Dalia Khader
2007/240 (PDF ) A Four-Component Framework for Designing and Analyzing Cryptographic Hash Algorithms George I. Davida, Jeremy A. Hansen
2007/239 (PDF ) Making Large Hash Functions From Small Compression Functions William R. Speirs, Ian Molloy
2007/238 (PDF ) Long-lived digital integrity using short-lived hash functions Stuart Haber
2007/237 (PDF ) Forward-secure Key Evolution in Wireless Sensor Networks Marek Klonowski, Mirosław Kutyłowski, Michał Ren, Katarzyna Rybarczyk
2007/236 (PDF ) Certificateless Ring Signatures Sherman S. M. Chow, Wun-She Yap
2007/235 (PDF ) Blind Identity-Based Encryption and Simulatable Oblivious Transfer Matthew Green, Susan Hohenberger
2007/234 (PDF ) Provable-Security Analysis of Authenticated Encryption in Kerberos Alexandra Boldyreva, Virendra Kumar
2007/233 (PDF ) On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography Michael Backes, Markus Duermuth, Ralf Kuesters
2007/231 (PDF ) Secure Two-Party k-Means Clustering Paul Bunn, Rafail Ostrovsky
2007/230 (PDF ) New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py Gautham Sekar, Souradyuti Paul, Bart Preneel
2007/229 (PDF ) Domain Extension of Public Random Functions: Beyond the Birthday Barrier Ueli Maurer, Stefano Tessaro
2007/228 (PDF ) AN OPTIMIZED HARDWARE ARCHITECTURE OF MONTGOMERY MULTIPLICATION ALGORITHM Miaoqing Huang, Kris Gaj, Soonhak Kwon, Tarek El-Ghazawi
2007/227 (PDF ) Related-Key Statistical Cryptanalysis Darakhshan J. Mir, Poorvi L. Vora
2007/226 (PDF ) Generalized mix functions and orthogonal equitable rectangles Douglas R. Stinson
2007/225 (PDF ) On the Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature Shengli Liu, Xiaofeng Chen, Fangguo Zhang
2007/224 (PDF ) A Novel Mutual Authentication Scheme Based on Quadratic Residues for RFID Systems Jue-Sam Chou, Guey-Chuen Lee, Chung-Ju Chan
2007/223 (PDF ) On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions John Black, Martin Cochran, Thomas Shrimpton
2007/222 (PDF ) Towards Security Limits in Side-Channel Attacks Francois-Xavier Standaert, Eric Peeters, Cedric Archambeau, Jean-Jacques Quisquater
2007/221 (PDF ) Generalized Key Delegation for Hierarchical Identity-Based Encryption Michel Abdalla, Eike Kiltz, Gregory Neven
2007/220 (PDF ) A New Provably Secure Authentication and Key Agreement Mechanism for SIP Using Certificateless Public-key Cryptography Fengjiao WANG, Yuqing ZHANG
2007/219 (PDF ) A New Provably Secure Authentication and Key Agreement Protocol for SIP Using ECC Liufei Wu, Yuqing Zhang, Fengjiao Wang
2007/218 (PDF ) Differential Cryptanalysis in Stream Ciphers Eli Biham, Orr Dunkelman
2007/217 (PDF ) Identity-Based Broadcast Encryption Ryuichi Sakai, Jun Furukawa
2007/216 (PDF ) Unlinkable Divisible Digital Cash without Trusted Third Party Pawel Pszona, Grzegorz Stachowiak
2007/215 (PDF ) Extending Oblivious Transfers Efficiently - How to get Robustness Almost for Free Jesper Buus Nielsen
2007/214 (PDF ) Matrix Power S-Box Construction Eligijus Sakalauskas, Kestutis Luksys
2007/213 (PDF ) Unlinkable Randomizable Signature and Its Application in Group Signature Sujing Zhou, Dongdai Lin
2007/212 (PDF ) The constructing of $3$-resilient Boolean functions of $9$ variables with nonlinearity $240$. Andrey Khalyavin
2007/211 (PDF ) Scalable Storage Scheme from Forward Key Rotation Chunbo Ma, Jun Ao, Jianhua Li
2007/209 (PDF ) Bilateral Unknown Key-Share Attacks in Key Agreement Protocols Liqun Chen, Qiang Tang
2007/208 (PDF ) RC4 State Information at Any Stage Reveals the Secret Key Goutam Paul, Subhamoy Maitra
2007/207 (PDF ) On an Improved Correlation Analysis of Stream Ciphers Using Muti-Output Boolean Functions and the Related Generalized Notion of Nonlinearity Claude Carlet, Khoongming Khoo, Chu-Wee Lim, Chuan-Wen Loe
2007/206 (PDF ) Automatic Search of Differential Path in MD4 Pierre-Alain Fouque, Gaetan Leurent, Phong Nguyen
2007/205 (PDF ) A kilobit special number field sieve factorization Kazumaro Aoki, Jens Franke, Thorsten Kleinjung, Arjen Lenstra, Dag Arne Osvik
2007/204 (PDF ) Dragon-MAC: Securing Wireless Sensor Networks with Authenticated Encryption Shu Yun Lim, Chuan Chin Pu, Hyo Taek Lim, Hoon Jae Lee
2007/203 (PDF ) Kipnis-Shamir's Attack on HFE Revisited Xin Jiang, Jintai Ding, Lei Hu
2007/202 (PDF ) Provable Data Possession at Untrusted Stores Giuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary Peterson, Dawn Song
2007/201 (PDF ) The BBG HIBE Has Limited Delegation Hovav Shacham
2007/200 (PDF ) ProSiBIR: Proactive Signer-Base Intrusion Resilient Signatures Philip Atzemoglou, Tal Malkin
2007/199 (PDF ) A Framework for Game-Based Security Proofs David Nowak
2007/198 (PDF ) Mutual Information Analysis -- A Universal Differential Side-Channel Attack Benedikt Gierlichs, Lejla Batina, Pim Tuyls
2007/197 (PDF ) On-Line Ciphers and the Hash-CBC Constructions Mihir Bellare, Alexandra Boldyreva, Lars Knudsen, Chanathip Namprempre
2007/195 (PDF ) Verifying Statistical Zero Knowledge with Approximate Implementations Ling Cheung, Sayan Mitra, Olivier Pereira
2007/194 (PDF ) Enhanced Privacy ID: A Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities Ernie Brickell, Jiangtao Li
2007/193 (PDF ) Some Identity Based Strong Bi-Designated Verifier Signature Schemes Sunder Lal, Vandani Verma
2007/192 (PDF ) Optimal Irreducible Polynomials for GF(2^m) Arithmetic Michael Scott
2007/191 (PDF ) Deniable Internet Key-Exchange Andrew C. C. Yao, Frances F. Yao, Yunlei Zhao, Bin Zhu
2007/190 (PDF ) Some General Results on Chosen-ciphertext Anonymity in Public-key Encryption Tian Yuan
2007/189 (PDF ) An Improved One-Round ID-Based Tripartite Authenticated Key Agreement Protocol Meng-Hui Lim, Sanggon Lee
2007/188 (PDF ) A Proof of Revised Yahalom Protocol in the Bellare and Rogaway (1993) Model Kim-Kwang Raymond Choo
2007/187 (PDF ) Executing Modular Exponentiation on a Graphics Accelerator Andrew Moss, Dan Page, Nigel Smart
2007/186 (PDF ) Fully Anonymous Group Signatures without Random Oracles Jens Groth
2007/185 (PDF ) New FORK-256 Deukjo Hong, Donghoon Chang, Jaechul Sung, Sangjin Lee, Seokhie Hong, Jesang Lee, Dukjae Moon, Sungtaek Chee
2007/184 (PDF ) Provable password-based tripartite key agreement protocol Chunbo Ma, Jun Ao, Jianhua Li
2007/183 (PDF ) Provably Secure Ciphertext Policy ABE Ling Cheung, Calvin Newport
2007/182 (PDF ) Optimistic Fair Exchange in a Multi-user Setting Yevgeniy Dodis, Pil Joong Lee, Dae Hyun Yum
2007/181 (PDF ) A New Method for Speeding Up Arithmetic on Elliptic Curves over Binary Fields Kwang Ho Kim, So In Kim
2007/180 (PDF ) A Novel Secure Session Key Generation using two-level architecture For Cluster-Based Ad Hoc Networks Based On ID-Based Bilinear Paring Jue-Sam Chou, Yalin Chen, Tsung-Heng Chen
2007/179 (PDF ) New Fast Algorithms for Arithmetic on Elliptic Curves over Fields of Characteristic Three Kwang Ho Kim, So In Kim, Ju Song Choe
2007/178 (PDF ) Utility Sampling for Trust Metrics in PKI Dakshi Agrawal, Charanjit Jutla
2007/177 (PDF ) Space-Efficient Identity Based Encryption Without Pairings Dan Boneh, Craig Gentry, Michael Hamburg
2007/176 (PDF ) Seven-Property-Preserving Iterated Hashing: ROX Elena Andreeva, Gregory Neven, Bart Preneel, Thomas Shrimpton
2007/175 (PDF ) Embedding Degree of Hyperelliptic Curves with Complex Multiplication Christian Robenhagen Ravnshoj
2007/174 (PDF ) Counting hyperelliptic curves that admit a Koblitz model Cevahir Demirkiran, Enric Nart
2007/173 (PDF ) Provable Secure Generalized Signcryption Xu An Wang, Xiaoyuan Yang, Yiliang Han
2007/172 (PDF ) Batch Verification of Short Signatures Jan Camenisch, Susan Hohenberger, Michael Østergaard Pedersen
2007/171 (PDF ) Chosen-Ciphertext Secure Proxy Re-Encryption Ran Canetti, Susan Hohenberger
2007/170 (PDF ) Clone Resistant Mutual Authentication for Low-Cost RFID Technology Stephane Lemieux, Adrian Tang
2007/169 (PDF ) On the Security of Protocols with Logarithmic Communication Complexity Michael Backes, Dominique Unruh
2007/168 (PDF ) Random Oracles and Auxiliary Input Dominique Unruh
2007/167 (PDF ) Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time (Version 2) Yi-Ru Liu, Wen-Guey Tzeng
2007/166 (PDF ) Enhancing Security of a Group Key Exchange Protocol for Users with Individual Passwords Junghyun Nam
2007/165 (PDF ) Inductive Proof Method for Computational Secrecy Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell
2007/164 (PDF ) Yet Another MicroArchitectural Attack: Exploiting I-cache Onur Aciicmez
2007/163 (PDF ) Secure Deniable Authenticated Key Establishment for Internet Protocols Meng-Hui Lim, Sanggon Lee, Youngho Park, Sangjae Moon
2007/162 (PDF ) Bingo Voting: Secure and coercion-free voting using a trusted random number generator Jens-Matthias Bohli, Joern Mueller-Quade, Stefan Roehrich
2007/161 (PDF ) Collusion-Resistant Group Key Management Using Attribute-Based Encryption Ling Cheung, Joseph A. Cooley, Roger Khazan, Calvin Newport
2007/160 (PDF ) Analysis of Collusion-Attack Free ID-Based Non-Interactive Key Sharing Muxiang Zhang
2007/159 (PDF ) Attribute Based Group Signatures Dalia Khader
2007/158 (PDF ) A Simple Security Analysis of Hash-CBC and a New Efficient One-Key Online Cipher Mridul Nandi
2007/157 (PDF ) ConSum v0: An Experimental Cipher David A. Madore
2007/156 (PDF ) Computational Semantics for Basic Protocol Logic - A Stochastic Approach Gergei Bana, Koji Hasebe, Mitsuhiro Okada
2007/155 (PDF ) Efficient Non-interactive Proof Systems for Bilinear Groups Jens Groth, Amit Sahai
2007/154 (PDF ) Edon--${\cal R}(256,384,512)$ -- an Efficient Implementation of Edon--${\cal R}$ Family of Cryptographic Hash Functions Danilo Gligoroski, Svein Johan Knapskog
2007/153 (PDF ) Cryptographic Hardness based on the Decoding of Reed-Solomon Codes Aggelos Kiayias, Moti Yung
2007/152 (PDF ) CTC2 and Fast Algebraic Attacks on Block Ciphers Revisited Nicolas T. Courtois
2007/151 (PDF ) Deterministic History-Independent Strategies for Storing Information on Write-Once Memories Tal Moran, Moni Naor, Gil Segev
2007/150 (PDF ) Generators of Jacobians of Hyperelliptic Curves Christian Robenhagen Ravnshoj
2007/149 (PDF ) Towards Generating Secure Keys for Braid Cryptography Ki Hyoung Ko, Jang Won Lee, Tony Thomas
2007/148 (PDF ) Practical Compact E-Cash Man Ho Au, Willy Susilo, Yi Mu
2007/147 (PDF ) Using decision problems in public key cryptography Vladimir Shpilrain, Gabriel Zapata
2007/146 (PDF ) Time Capsule Signature: Efficient and Provably Secure Constructions Bessie C. Hu, Duncan S. Wong, Qiong Huang, Guomin Yang, Xiaotie Deng
2007/145 (PDF ) Finding Collisions in Interactive Protocols -- A Tight Lower Bound on the Round Complexity of Statistically-Hiding Commitments Iftach Haitner, Jonathan J. Hoch, Omer Reingold, Gil Segev
2007/144 (PDF ) Two New Examples of TTM T. Moh
2007/143 (PDF ) Offline/Online Mixing Ben Adida, Douglas Wikström
2007/142 (PDF ) An Enhanced One-round Pairing-based Tripartite Authenticated Key Agreement Protocol Meng-Hui Lim, Sanggon Lee, Youngho Park, Hoonjae Lee
2007/141 (PDF ) Practical Cryptanalysis of SFLASH Vivien Dubois, Pierre-Alain Fouque, Adi Shamir, Jacques Stern
2007/140 (PDF ) Hidden Identity-Based Signatures Aggelos Kiayias, Hong-Sheng Zhou
2007/139 (PDF ) The Delivery and Evidences Layer Amir Herzberg, Igal Yoffe
2007/138 (PDF ) Efficient Pairing Computation on Curves Rongquan Feng, Hongfeng Wu
2007/137 (PDF ) Multivariates Polynomials for Hashing Jintai Ding, Bo-yin Yang
2007/135 (PDF ) Efficient ID-based Signature Without Trusted PKG Jingwei Liu, Rong Sun, Weidong Kou, Xinmei Wang
2007/134 (PDF ) Estimation of keys stored in CMOS cryptographic device after baking by using the charge shift Osman Kocar
2007/133 (PDF ) New Communication-Efficient Oblivious Transfer Protocols Based on Pairings Helger Lipmaa
2007/132 (PDF ) Equivocal Blind Signatures and Adaptive UC-Security Aggelos Kiayias, Hong-Sheng Zhou
2007/131 (PDF ) Noninteractive Manual Channel Message Authentication Based On eTCR Hash Functions Mohammad Reza Reyhanitabar, Shuhong Wang, Reihaneh Safavi-Naini
2007/130 (PDF ) Some Results on Anonymity in Hybrid Encryption Tian Yuan, Chen Zhi-Yu, Jin Yuee, Jin Feng, Ma Huihui
2007/129 (PDF ) An Algebraic Analysis of Trivium Ciphers based on the Boolean Satisfiability Problem Cameron McDonald, Chris Charnes, Josef Pieprzyk
2007/128 (PDF ) Computationally Sound Mechanized Proofs of Correspondence Assertions Bruno Blanchet
2007/127 (PDF ) CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts Vanesa Daza, Javier Herranz, Paz Morillo, Carla Ràfols
2007/126 (PDF ) An Interesting Member ID-based Group Signature Sujing Zhou, Dongdai Lin
2007/125 (PDF ) Attacking the IPsec Standards in Encryption-only Configurations Jean Paul Degabriele, Kenneth G. Paterson
2007/124 (PDF ) Rebuttal of overtaking VEST Benjamin Gittins, Howard Landman
2007/123 (PDF ) Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS Berkant Ustaoglu
2007/122 (PDF ) On the Security of three Versions of the WAI Protocol in Chinese WLAN Implementation Plan Qiang Tang
2007/121 (PDF ) Certificateless Encryption Schemes Strongly Secure in the Standard Model Alexander W. Dent, Benoit Libert, Kenneth G. Paterson
2007/120 (PDF ) Breaking 104 bit WEP in less than 60 seconds Erik Tews, Ralf-Philipp Weinmann, Andrei Pyshkin
2007/119 (PDF ) Rerandomizable RCCA Encryption Manoj Prabhakaran, Mike Rosulek
2007/118 (PDF ) Smooth Projective Hashing and Two-Message Oblivious Transfer Shai Halevi, Yael Tauman Kalai
2007/117 (PDF ) Improving the lower bound on the higher order nonlinearity of Boolean functions with prescribed algebraic immunity Sihem Mesnager
2007/116 (PDF ) A Zero-Knowledge Identification and Key Agreement Protocol D. R. Stinson, J. Wu
2007/115 (PDF ) Quadratic Almost Perfect Nonlinear Functions With Many Terms Carl Bracken, Eimear Byrne, Nadya Markin, Gary McGuire
2007/114 (PDF ) High Efficiency Feedback Shift Register: $\sigma-$LFSR Guang Zeng, Wenbao Han, Kaicheng He
2007/113 (PDF ) An Enhanced ID-based Deniable Authentication Protocol on Pairings Meng-Hui Lim, Sanggon Lee, Youngho Park, Hoonjae Lee
2007/112 (PDF ) Decomposed Attack for the Jacobian of a Hyperelliptic Curve over an Extension Field Koh-ichi Nagao
2007/111 (PDF ) Privacy-Preserving Distributed Set Intersection Qingsong Ye, Huaxiong Wang, Christophe Tartary
2007/110 (PDF ) Construction of Pairing-Friendly Elliptic Curves Woo Sug Kang
2007/109 (PDF ) How to Enrich the Message Space of a Cipher Thomas Ristenpart, Phillip Rogaway
2007/108 (PDF ) An Improved Distinguisher for Dragon Joo Yeon Cho, Josef Pieprzyk
2007/107 (PDF ) Knapsack Public-Key Cryptosystem Using Chinese Remainder Theorem Yasuyuki MURAKAMI, Takeshi NASAKO
2007/106 (PDF ) A generalization of Secret Sharing Scheme on the Basis of Recovering Algorithm, K-RA Masao KASAHARA
2007/105 (PDF ) Isodual Reduction of Lattices Nicholas A. Howgrave-Graham
2007/104 (PDF ) Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings Brecht Wyseur, Wil Michiels, Paul Gorissen, Bart Preneel
2007/103 (PDF ) Another Look at Square Roots and Traces (and Quadratic Equations) in Fields of Even Characteristic Roberto Avanzi
2007/102 (PDF ) On the Role of Scheduling in Simulation-Based Security Ran Canetti, Ling Cheung, Nancy Lynch, Olivier Pereira
2007/101 (PDF ) Practical Password Recovery on an MD5 Challenge and Response Yu Sasaki, Go Yamamoto, Kazumaro Aoki
2007/100 (PDF ) Practical Identity-Based Encryption (IBE) in Multiple PKG Environments and Its Applications Shengbao Wang, Zhenfu Cao
2007/099 (PDF ) Inferring sequences produced by a linear congruential generator on elliptic curves missing high--order bits Jaime Gutierrez, Alvar Ibeas
2007/098 (PDF ) Classes of Quadratic APN Trinomials and Hexanomials and Related Structures Lilya Budaghyan, Claude Carlet
2007/097 (PDF ) Large Cyclic Subgroups of Jacobians of Hyperelliptic Curves Christian Robenhagen Ravnshøj
2007/096 (PDF ) Somos Sequence Near-Addition Formulas and Modular Theta Functions R. Wm. Gosper, Rich Schroeppel
2007/095 (PDF ) Generic Certificateless Encryption in the Standard Model Qiong Huang, Duncan S. Wong
2007/094 (PDF ) Mesh Signatures : How to Leak a Secret with Unwitting and Unwilling Participants Xavier Boyen
2007/093 (PDF ) HAPADEP: Human Asisted Pure Audio Device Pairing Claudio Soriente, Gene Tsudik, Ersin Uzun
2007/092 (PDF ) PRIME POINTS ON ELLIPTIC CURVES AND ITS IMPACT ON ECDLP Grzegorz Wojtenko
2007/091 (PDF ) Arithmetic Operators for Pairing-Based Cryptography Jean-Luc Beuchat, Nicolas Brisebarre, Jérémie Detrey, Eiji Okamoto
2007/089 (PDF ) Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations Ueli Maurer, Dominik Raub
2007/088 (PDF ) An Algorithm for Finding Small Roots of Multivariate Polynomials over the Integers Domingo Gomez, Jaime Gutierrez, Alvar Ibeas
2007/087 (PDF ) Improvement on a Digital Signature Scheme without using One-way Hash and Message Redundancy Jie Liu, Jianhua Li
2007/086 (PDF ) Non-Interactive Proofs for Integer Multiplication Ivan Damgard, Rune Thorbek
2007/085 (PDF ) MultiCollision Attack on the Compression Functions of MD4 and 3-Pass HAVAL Hongbo Yu, Xiaoyun Wang
2007/084 (PDF ) Constant Size Ciphertext HIBE in the Augmented Selective-ID Model and its Extensions Sanjit Chatterjee, Palash Sarkar
2007/083 (PDF ) Public Key Encryption Which is Simultaneously a Locally-Decodable Error-Correcting Code Brett Hemenway, Rafail Ostrovsky
2007/082 (PDF ) Deniable Authentication on the Internet Shaoquan Jiang
2007/081 (PDF ) Revisiting an Efficient Elliptic Curve Key Agreement Protocol Maurizio Adriano Strangio
2007/079 (PDF ) How To Find Many Collisions of 3-Pass HAVAL Kazuhiro Suzuki, Kaoru Kurosawa
2007/078 (PDF ) MPC vs. SFE: Perfect Security in a Unified Corruption Model Zuzana Beerliova-Trubiniova, Matthias Fitzi, Martin Hirt, Ueli Maurer, Vassilis Zikas
2007/076 (PDF ) Almost Secure (1-Round, n-Channel) Message Transmission Scheme Kaoru Kurosawa, Kazuhiro Suzuki
2007/075 (PDF ) Weaknesses in the Pseudorandom Bit Generation Algorithms of the Stream Ciphers TPypy and TPy Gautham Sekar, Souradyuti Paul, Bart Preneel
2007/074 (PDF ) A Cramer-Shoup Encryption Scheme from the Linear Assumption and from Progressively Weaker Linear Variants Hovav Shacham
2007/073 (PDF ) Public Key Encryption that Allows PIR Queries Dan Boneh, Eyal Kushilevitz, Rafail Ostrovsky, William E. Skeith III
2007/071 (PDF ) Knowledge-Binding Commitments with Applications in Time-Stamping (Full Version) Ahto Buldas, Sven Laur
2007/070 (PDF ) Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 Family of Stream Ciphers (Corrected) Alexander Maximov
2007/069 (PDF ) Nominative Signature: Application, Security Model and Construction Dennis Y. W. Liu, Duncan S. Wong, Xinyi Huang, Guilin Wang, Qiong Huang, Yi Mu, Willy Susilo
2007/066 (PDF ) Low-Density Attack Revisited Tetsuya Izu, Jun Kogure, Takeshi Koshiba, Takeshi Shimoyama
2007/065 (PDF ) How to Derive Lower Bound on Oblivious Transfer Reduction Kaoru Kurosawa, Wataru Kishimoto, Takeshi Koshiba
2007/064 (PDF ) Algebraic Lower Bounds for Computing on Encrypted Data Rafail Ostrovsky, William E. Skeith III
2007/063 (PDF ) Constructing new APN functions from known ones Lilya Budaghyan, Claude Carlet, Gregor Leander
2007/062 (PDF ) Algebraic and Slide Attacks on KeeLoq Nicolas T. Courtois, Gregory V. Bard, David Wagner
2007/061 (PDF ) Accelerating SSL using the Vector processors in IBM's Cell Broadband Engine for Sony's Playstation 3 Neil Costigan, Michael Scott
2007/060 (PDF ) Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries Yonatan Aumann, Yehuda Lindell
2007/059 (PDF ) A Survey of Single Database PIR: Techniques and Applications Rafail Ostrovsky, William E. Skeith III
2007/058 (PDF ) The simplest method for constructing APN polynomials EA-inequivalent to power functions Lilya Budaghyan
2007/057 (PDF ) Constructing pairing-friendly genus 2 curves over prime fields with ordinary Jacobians David Freeman
2007/056 (PDF ) Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments Somesh Jha, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith, Stephen Chenney
2007/055 (PDF ) Cryptanalysis of the KeeLoq block cipher Andrey Bogdanov
2007/054 (PDF ) Cryptanalysis of Stream Ciphers Based on Arrays and Modular Addition Souradyuti Paul
2007/053 (PDF ) Compiler Assisted Elliptic Curve Cryptography M. Barbosa, A. Moss, D. Page
2007/052 (PDF ) Forward-Secure Sequential Aggregate Authentication Di Ma, Gene Tsudik
2007/051 (PDF ) Forward-secure RFID Authentication and Key Exchange Tri van Le, Mike Burmester, Breno de Medeiros
2007/050 (PDF ) Special block cipher family DN and new generation SNMAC-type hash function family HDN Vlastimil KLIMA
2007/049 (PDF ) Security Arguments for a Class of ID-based Signatures jin zhou, ya-juan zhang, yue-fei zhu
2007/048 (PDF ) A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator Daniel R. L. Brown, Kristian Gjøsteen
2007/047 (PDF ) New Constructions of Fuzzy Identity-Based Encryption Joonsang Baek, Willy Susilo, Jianying Zhou
2007/046 (PDF ) Direct Reduction of String (1,2)-OT to Rabin's OT Kaoru Kurosawa, Takeshi Koshiba
2007/045 (PDF ) A Coprocessor for the Final Exponentiation of the $\eta_T$ Pairing in Characteristic Three Jean-Luc Beuchat, Nicolas Brisebarre, Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto
2007/044 (PDF ) Design and Primitive Specification for Shannon Philip Hawkes, Cameron McDonald, Michael Paddon, Gregory Rose, Miriam Wiggers de Vries
2007/043 (PDF ) Reflection Attacks on Product Ciphers Orhun Kara
2007/042 (PDF ) Authorship Proof for Textual Document J. Wu, D. R. Stinson
2007/041 (PDF ) Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes B. Skoric, S. Katzenbeisser, M. U. Celik
2007/040 (PDF ) Efficient Quintuple Formulas for Elliptic Curves and Efficient Scalar Multiplication Using Multibase Number Representation Pradeep Kumar Mishra, Vassil Dimitrov
2007/039 (PDF ) New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures Onur Aciicmez, Shay Gueron, Jean-Pierre Seifert
2007/038 (PDF ) Multiple Modular Additions and Crossword Puzzle Attack on NLSv2 Joo Yeon Cho, Josef Pieprzyk
2007/037 (PDF ) Best Quadratic Approximations of Cubic Boolean Functions Nicholas Kolokotronis, Konstantinos Limniotis, Nicholas Kalouptsidis
2007/036 (PDF ) Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman Eike Kiltz
2007/035 (PDF ) Cryptanalysis of white box DES implementations Louis Goubin, Jean-Michel Masereel, Michael Quisquater
2007/034 (PDF ) A New Type of Cipher: DICING_CSB Li An-Ping
2007/033 (PDF ) From Selective-ID to Full Security: The Case of the Inversion-Based Boneh-Boyen IBE Scheme Eike Kiltz
2007/032 (PDF ) An improved collision probability for CBC-MAC and PMAC Avradip Mandal, Mridul Nandi
2007/031 (PDF ) Improved Security Analysis of PMAC Mridul Nandi, Avradip Mandal
2007/030 (PDF ) Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions Yang Cui, Eiichiro Fujisaki, Goichiro Hanaoka, Hideki Imai, Rui Zhang
2007/029 (PDF ) A General Construction of Tweakable Block Ciphers and Different Modes of Operations Debrup Chakraborty, Palash Sarkar
2007/028 (PDF ) HCH: A New Tweakable Enciphering Scheme Using the Hash-Counter-Hash Approach Debrup Chakraborty, Palash Sarkar
2007/026 (PDF ) Cryptanalysis and Improvement of an Elliptic Curve Diffie-Hellman Key Agreement Protocol Shengbao Wang, Zhenfu Cao, Maurizio Adriano Strangio, Lihua Wang
2007/025 (PDF ) Private Locally Decodable Codes Rafail Ostrovsky, Omkant Pandey, Amit Sahai
2007/024 (PDF ) Efficient Methods for Conversion and Solution of Sparse Systems of Low-Degree Multivariate Polynomials over GF(2) via SAT-Solvers Gregory V. Bard, Nicolas T. Courtois, Chris Jefferson.
2007/023 (PDF ) Efficient Hybrid Encryption from ID-Based Encryption Masayuki Abe, Yang Cui, Hideki Imai, Eike Kiltz
2007/022 (PDF ) On Perfectly Balanced Boolean Functions O. A. Logachev
2007/021 (PDF ) Two Trivial Attacks on Trivium Alexander Maximov, Alex Biryukov
2007/020 (PDF ) TinyTate: Identity-Based Encryption for Sensor Networks Leonardo B. Oliveira, Diego Aranha, Eduardo Morais, Felipe Daguano, Julio Lo'pez, Ricardo Dahab
2007/019 (PDF ) Fast Digital Signature Schemes as Secure as Diffie-Hellman Assumptions Changshe Ma, Jian Weng, Dong Zheng
2007/018 (PDF ) Strongly-Secure Identity-based Key Agreement and Anonymous Extension Sherman S. M. Chow, Kim-Kwang Raymond Choo
2007/017 (PDF ) Group Decryption Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu, Yumin Wang
2007/015 (PDF ) Group Encryption Aggelos Kiayias, Yiannis Tsiounis, Moti Yung
2007/014 (PDF ) Invertible Universal Hashing and the TET Encryption Mode Shai Halevi
2007/013 (PDF ) Optimised versions of the Ate and Twisted Ate Pairings Seiichi Matsuda, Naoki Kanayama, Florian Hess, Eiji Okamoto
2007/012 (PDF ) Interactive two-channel message authentication based on interactive-collision Resistant hash functions Atefeh Mashatan, Douglas R. Stinson
2007/011 (PDF ) Universally Composable Key-evolving Signature Jin Zhou, TingMao Chang, YaJuan Zhang, YueFei Zhu
2007/010 (PDF ) Computing endomorphism rings of Jacobians of genus 2 curves over finite fields David Freeman, Kristin Lauter
2007/009 (PDF ) New Public Key Cryptosystems Using Polynomials over Non-commutative Rings Zhenfu Cao, Xiaolei Dong, Licheng Wang
2007/008 (PDF ) Security analysis of the variant of the self-shrinking generator proposed at ICISC 2006 Dong Hoon Lee, Je Hong Park, Jaewoo Han
2007/007 (PDF ) One-Round ID-Based Blind Signature Scheme without ROS Assumption Wei Gao, Xueli Wang, Guilin Wang, Fei Li
2007/006 (PDF ) Efficient Dynamic k-Times Anonymous Authentication Lan Nguyen
2007/005 (PDF ) Privacy-Protecting Coupon System Revisited Lan Nguyen
2007/004 (PDF ) Cryptanalysis of Hwang-Chang’s a Time-Stamp Protocol for Digital Watermarking Jue-Sam Chou, Yalin Chen, Chung-Ju Chan
2007/003 (PDF ) The Energy Cost of Cryptographic Key Establishment in Wireless Sensor Networks Johann Groszschaedl, Alexander Szekely, Stefan Tillich
2007/001 (PDF ) Families of genus 2 curves with small embedding degree Laura Hitt
2006/486 (PDF ) Inductive Trace Properties for Computational Security Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell
2006/485 (PDF ) Indifferentiability of Single-Block-Length and Rate-1 Compression Functions Hidenori Kuwakado, Masakatu Morii
2006/483 (PDF ) New Constructions for Provably-Secure Time-Bound Hierarchical Key Assignment Schemes Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci
2006/482 (PDF ) Countermeasures for the Simple Branch Prediction Analysis Giovanni Agosta, Gerardo Pelosi
2006/481 (PDF ) A Practical Limit of Security Proof in the Ideal Cipher Model : Possibility of Using the Constant As a Trapdoor In Several Double Block Length Hash Functions Donghoon Chang
2006/480 (PDF ) Cryptanalysis of REESSE1+ Public Key Cryptosystem Shengli Liu, Fangguo Zhang
2006/479 (PDF ) Efficient Provably-Secure Hierarchical Key Assignment Schemes Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci
2006/478 (PDF ) Near-Collision Attack and Collision-Attack on Double Block Length Compression Functions based on the Block Cipher IDEA Donghoon Chang
2006/477 (PDF ) Dynamic Cryptographic Hash Functions William R. Speirs II, Samuel S. Wagstaff Jr.
2006/476 (PDF ) Password-Authenticated Multi-Party Key Exchange with Different Passwords Jeong Ok Kwon, Ik Rae Jeong, Kouichi Sakurai, Dong Hoon Lee
2006/475 (PDF ) New Technique for Solving Sparse Equation Systems Håvard Raddum, Igor Semaev
2006/474 (PDF ) Speeding up the Bilinear Pairings Computation on Curves with Automorphisms Chang-An Zhao, Fangguo Zhang, Jiwu Huang
2006/473 (PDF ) Identity-Based Proxy Re-encryption Matthew Green, Giuseppe Ateniese
2006/472 (PDF ) A Framework for Interactive Argument Systems using Quasigroupic Homorphic Commitment Luis Teixeira d'Aguiar Norton Brandao
2006/471 (PDF ) Multiplication and Squaring on Pairing-Friendly Fields Augusto Jun Devegili, Colm Ó~hÉigeartaigh, Michael Scott, Ricardo Dahab
2006/470 (PDF ) On the security of a group key agreement protocol Qiang Tang
2006/469 (PDF ) An Attack on Disguised Elliptic Curves David Mireles
2006/468 (PDF ) White Box Cryptography: Another Attempt Julien Bringer, Herve Chabanne, Emmanuelle Dottax
2006/467 (PDF ) Do We Need to Vary the Constants? (Methodological Investigation of Block-Cipher Based Hash Functions) Donghoon Chang, Moti Yung
2006/466 (PDF ) Prime Order Primitive Subgroups in Torus-Based Cryptography Jason E. Gower
2006/465 (PDF ) Security and Composition of Cryptographic Protocols: A Tutorial Ran Canetti
2006/464 (PDF ) Remarks on "Analysis of One Popular Group Signature Scheme'' in Asiacrypt 2006 Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik
2006/463 (PDF ) Obfuscation for Cryptographic Purposes Dennis Hofheinz, John Malone-Lee, Martijn Stam
2006/462 (PDF ) Improved Collision and Preimage Resistance Bounds on PGV Schemes Lei Duo, Chao Li
2006/461 (PDF ) On Post-Modern Cryptography Oded Goldreich
2006/460 (PDF ) Preimage Attacks On Provably Secure FFT Hashing proposed at Second Hash Workshop in 2006 Donghoon Chang
2006/459 (PDF ) Recursive lower bounds on the nonlinearity profile of Boolean functions and their applications Claude Carlet
2006/458 (PDF ) Copyrighting Public-key Functions and Applications to Black-box Traitor Tracing Aggelos Kiayias, Moti Yung
2006/457 (PDF ) Linear Approximating to Integer Addition Li An-Ping
2006/456 (PDF ) Indistinguishability Amplification Ueli Maurer, Krzysztof Pietrzak, Renato Renner
2006/455 (PDF ) On Achieving the ''Best of Both Worlds'' in Secure Multiparty Computation Jonathan Katz
2006/454 (PDF ) How to Win the Clone Wars: \\ Efficient Periodic n-Times Anonymous Authentication Jan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, Mira Meyerovich
2006/453 (PDF ) Key Replacement Attack on a Certificateless Signature Scheme Zhenfeng Zhang, Dengguo Feng
2006/452 (PDF ) Hybrid Protocol For Password-based Key Exchange in Three-party Setting TingMao Chang, Jin Zhou, YaJuan Zhang, YueFei Zhu
2006/451 (PDF ) Combined Differential, Linear and Related-Key Attacks on Block Ciphers and MAC Algorithms Jongsung Kim
2006/450 (PDF ) Secure Cryptographic Workflow in the Standard Model M. Barbosa, P. Farshim
2006/449 (PDF ) Robust Computational Secret Sharing and a Unified Account of Classical Secret-Sharing Goals Mihir Bellare, Phillip Rogaway
2006/448 (PDF ) Universally Composable and Forward Secure RFID Authentication and Key Exchange Tri van Le, Mike Burmester, Breno de Medeiros
2006/447 (PDF ) Towards a Separation of Semantic and CCA Security for Public Key Encryption Yael Gertner, Tal Malkin, Steven Myers
2006/446 (PDF ) New Identity-Based Authenticated Key Agreement Protocols from Pairings (without Random Oracles) Shengbao Wang, Zhenfu Cao, Kim-Kwang Raymond Choo
2006/445 (PDF ) A class of quadratic APN binomials inequivalent to power functions Lilya Budaghyan, Claude Carlet, Gregor Leander
2006/444 (PDF ) Lattices that Admit Logarithmic Worst-Case to Average-Case Connection Factors Chris Peikert, Alon Rosen
2006/443 (PDF ) Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups Yvo Desmedt, Tanja Lange, Mike Burmester
2006/442 (PDF ) An attack on the certificateless signature scheme from EUC Workshops 2006 Je Hong Park
2006/441 (PDF ) General Distinguishing Attacks on NMAC and HMAC with Birthday Attack Complexity Donghoon Chang, Mridul Nandi
2006/440 (PDF ) A New Type of Group Signature Scheme Jun Zhong Dake He
2006/439 (PDF ) A New Type of Group Blind Signature Scheme Based on Bilinear Pairings Jun Zhong Dake He
2006/438 (PDF ) On the pseudo-random generator ISAAC Jean-Philippe Aumasson
2006/437 (PDF ) On Zigzag Functions and Related Objects in New Metric An Braeken, Ventzislav Nikov, Svetla Nikova
2006/436 (PDF ) Statistically-Hiding Commitment from Any One-Way Function Iftach Haitner, Omer Reingold
2006/435 (PDF ) Searching for Shapes in Cryptographic Protocols (extended version) Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Thayer
2006/434 (PDF ) Balanced Boolean Functions with (more than) Maximum Algebraic Immunity Deepak Kumar Dalai, Subhamoy Maitra
2006/433 (PDF ) Information Theoretic Bounds on Authentication Systems in Query Model Reihaneh Safavi-Naini, Peter Wild
2006/432 (PDF ) Universally Composable Security with Global Setup Ran Canetti, Yevgeniy Dodis, Rafael Pass, Shabsi Walfish
2006/431 (PDF ) Some Efficient Algorithms for the Final Exponentiation of $\eta_T$ Pairing Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto
2006/430 (PDF ) From Weak to Strong Watermarking Nicholas Hopper, David Molnar, David Wagner
2006/429 (PDF ) On a new invariant of Boolean functions Sugata Gangopadhyay, Deepmala Sharma
2006/428 (PDF ) Another class of quadratic APN binomials over $\F_{2^n}$: the case $n$ divisible by 4 Lilya Budaghyan, Claude Carlet, Gregor Leander
2006/427 (PDF ) Pairing-friendly elliptic curves with small security loss by Cheon's algorithm Aya Comuta, Mitsuru Kawazoe, Tetsuya Takahashi
2006/424 (PDF ) Security Analysis of Voice-over-IP Protocols Prateek Gupta, Vitaly Shmatikov
2006/423 (PDF ) Perfect NIZK with Adaptive Soundness Masayuki Abe, Serge Fehr
2006/422 (PDF ) Long-term Security and Universal Composability Joern Mueller-Quade, Dominique Unruh
2006/421 (PDF ) Universally Composable Three-Party Key Distribution Jin Zhou, TingMao Chang, YaJuan Zhang, YueFei Zhu
2006/420 (PDF ) The REESSE1+ Public Key Cryptosystem v 2.21 Shenghui Su, Shuwang Lv
2006/419 (PDF ) Some New Hidden Ideal Cryptosystems Ilia Toli
2006/418 (PDF ) Analysis of Privacy-Preserving Element Reduction of Multiset Jae Hong Seo, HyoJin Yoon, Seongan Lim, Jung Hee Cheon, Dowon Hong
2006/417 (PDF ) The Recent Attack of Nie et al On TTM is Faulty T. Moh
2006/416 (PDF ) Authenticated Interleaved Encryption Claude Castelluccia
2006/415 (PDF ) On the Minimal Embedding Field Laura Hitt
2006/414 (PDF ) Zero Knowledge and Soundness are Symmetric Shien Jin Ong, Salil Vadhan
2006/413 (PDF ) Preimage Attack on Parallel FFT-Hashing Donghoon Chang
2006/412 (PDF ) Preimage Attacks on CellHash, SubHash and Strengthened Versions of CellHash and SubHash Donghoon Chang
2006/411 (PDF ) Preimage Attack on Hashing with Polynomials proposed at ICISC'06 Donghoon Chang
2006/410 (PDF ) Galois Field Commitment Scheme Alexandre Pinto, André Souto, Armando Matos, Luís Antunes
2006/409 (PDF ) A NEW MAC: LAMA Li An-Ping
2006/408 (PDF ) A Generic Construction of CCA-Secure Cryptosystems without NIZKP for a Bounded Number of Decryption Queries Goichiro Hanaoka, Hideki Imai
2006/407 (PDF ) Cryptography in the Multi-string Model Jens Groth, Rafail Ostrovsky
2006/406 (PDF ) Redundancy of the Wang-Yu Sufficient Conditions Yuto Nakano, Hidenori Kuwakado, Masakatu Morii
2006/405 (PDF ) Universally Composable Blind Signatures in the Plain Model Aslak Bakke Buan, Kristian Gøsteen, Lillian Kråkmo
2006/404 (PDF ) Faugere's F5 Algorithm Revisited Till Stegers
2006/403 (PDF ) Non-Wafer-Scale Sieving Hardware for the NFS: Another Attempt to Cope with 1024-bit Willi Geiselmann, Rainer Steinwandt
2006/402 (PDF ) Algebraic Cryptanalysis of the Data Encryption Standard Nicolas T. Courtois, Gregory V. Bard
2006/400 (PDF ) Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions Vipul Goyal, Ryan Moriarty, Rafail Ostrovsky, Amit Sahai
2006/399 (PDF ) Multi-Property-Preserving Hash Domain Extension and the EMD Transform Mihir Bellare, Thomas Ristenpart
2006/398 (PDF ) The Layered Games Framework for Specifications and Analysis of Security Protocols Amir Herzberg, Igal Yoffe
2006/397 (PDF ) Revisiting the Efficiency of Malicious Two-Party Computation David P. Woodruff
2006/396 (PDF ) Security Protocols with Isotropic Channels Madhukar Anand, Eric Cronin, Micah Sherr, Matt Blaze, Sampath Kannan
2006/395 (PDF ) Security-Focused Survey on Group Key Exchange Protocols Mark Manulis
2006/394 (PDF ) Identity Based Strong Designated Verifier Proxy Signature Schemes Sunder Lal, Vandani Verma
2006/392 (PDF ) The Tate Pairing via Elliptic Nets Katherine E. Stange
2006/391 (PDF ) A Note on Bounded Chosen Ciphertext Security from Black-box Semantical Security Ronald Cramer, Dennis Hofheinz, Eike Kiltz
2006/389 (PDF ) Traceable Ring Signature Eiichiro Fujisaki, Koutarou Suzuki
2006/388 (PDF ) Survey on Security Requirements and Models for Group Key Exchange Mark Manulis
2006/387 (PDF ) A Note on the Security of NTRUSign Phong Q. Nguyen
2006/386 (PDF ) The Wrestlers Protocol: A simple, practical, secure, deniable protocol for key-exchange Mark Wooding
2006/385 (PDF ) On Security Models and Compilers for Group Key Exchange Protocols Emmanuel Bresson, Mark Manulis, Joerg Schwenk
2006/384 (PDF ) Design and Analysis of a Hash Ring-iterative Structure Shenghui Su, Yixian Yang, Bo Yang, Shaolan Zhang
2006/383 (PDF ) Traitor tracing scheme with constant ciphertext rate against powerful pirates Thomas Sirvent
2006/382 (PDF ) Provisioning Protected Resource Sharing in Multi-Hop Wireless Networks E-yong Kim, Hwangnam Kim, Kunsoo Park
2006/381 (PDF ) Cryptanalysis on an Algorithm for Efficient Digital Signatures Fuw-Yi Yang
2006/380 (PDF ) On Security of Sovereign Joins Einar Mykletun, Gene Tsudik
2006/379 (PDF ) Security Bounds for the NIST Codebook-based Deterministic Random Bit Generator Matthew J. Campagna
2006/378 (PDF ) A New Key Exchange Primitive Based on the Triple Decomposition Problem Yesem Kurt
2006/377 (PDF ) Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards James Birkett, Alexander W. Dent, Gregory Neven, Jacob Schuldt
2006/376 (PDF ) A New Concept of Hash Functions SNMAC Using a Special Block Cipher and NMAC/HMAC Constructions Vlastimil KLIMA
2006/375 (PDF ) Distortion maps for genus two curves Steven D. Galbraith, Jordi Pujolàs, Christophe Ritzenthaler, Benjamin Smith
2006/374 (PDF ) Robust Final-Round Cache-Trace Attacks Against AES Joseph Bonneau
2006/373 (PDF ) Self-Generated-Certificate Public Key Cryptography and Certificateless Signature / Encryption Scheme in the Standard Model Joseph K. Liu, Man Ho Au, Willy Susilo
2006/372 (PDF ) A taxonomy of pairing-friendly elliptic curves David Freeman, Michael Scott, Edlyn Teske
2006/371 (PDF ) Hardware Implementation of the $\eta_T$ Pairing in Characteristic 3 Robert Ronan, Colm o hEigeartaigh, Colin Murphy, Tim Kerins, Paulo S. L. M. Barreto
2006/370 (PDF ) A DoS Attack Against the Integrity-Less ESP (IPSec) Ventzislav Nikov
2006/369 (PDF ) RadioGatún, a belt-and-mill hash function Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche
2006/368 (PDF ) Practical Hierarchical Identity Based Encryption and Signature schemes Without Random Oracles Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Duncan S. Wong
2006/367 (PDF ) An Attack on a Certificateless Signature Scheme Xuefei Cao, Kenneth G. Paterson, Weidong Kou
2006/366 (PDF ) A Latency-Free Election Scheme Kristian Gjøsteen
2006/364 (PDF ) Spelling-Error Tolerant, Order-Independent Pass-Phrases via the Damerau-Levenshtein String-Edit Distance Metric Gregory V. Bard
2006/362 (PDF ) Construction of a Hybrid (Hierarchical) Identity-Based Encryption Protocol Secure Against Adaptive Attacks Palash Sarkar, Sanjit Chatterjee
2006/361 (PDF ) Generic Construction of (Identity-based) Perfect Concurrent Signatures Sherman S. M. Chow, Willy Susilo
2006/360 (PDF ) Target Collisions for MD5 and Colliding X.509 Certificates for Different Identities Marc Stevens, Arjen Lenstra, Benne de Weger
2006/359 (PDF ) On Probabilistic versus Deterministic Provers in the Definition of Proofs Of Knowledge Mihir Bellare, Oded Goldreich
2006/358 (PDF ) Public Key Encryption with Keyword Search based on K-Resilient IBE Dalia Khader
2006/357 (PDF ) Cryptanalysis of a homomorphic public-key cryptosystem over a finite group Su-Jeong Choi, Simon R. Blackburn, Peter R. Wild
2006/356 (PDF ) Black-Box Knowledge Extraction Revisited: Universal Approach with Precise Bounds Emilia Käsper, Sven Laur, Helger Lipmaa
2006/355 (PDF ) Concurrent Non-Malleable Zero Knowledge Boaz Barak, Manoj Prabhakaran, Amit Sahai
2006/354 (PDF ) A new stream cipher: DICING Li An-Ping
2006/353 (PDF ) Analysis and Improvements of Two Identity-Based Perfect Concurrent Signature Schemes Zhenjie Huang, Kefei Chen, Yumin Wang
2006/352 (PDF ) Foundations of Secure E-Commerce: The Order Layer Amir Herzberg, Igal Yoffe
2006/351 (PDF ) On the Power of Simple Branch Prediction Analysis Onur Aciicmez, Cetin Kaya Koc, Jean-Pierre Seifert
2006/350 (PDF ) Impossible Differential Cryptanalysis of ARIA and Camellia Wenling Wu, Wentao Zhang, Dengguo Feng
2006/349 (PDF ) A Note On Side-Channels Resulting From Dynamic Compilation D. Page
2006/348 (PDF ) Non-Trivial Black-Box Combiners for Collision-Resistant Hash-Functions don't Exist Krzysztof Pietrzak
2006/347 (PDF ) Classification of Weil Restrictions Obtained by (2,...,2) Coverings of P^1 Fumiyuki Momose, Jinhui Chao
2006/346 (PDF ) Generic Transformation to Strongly Unforgeable Signatures Qiong Huang, Duncan S. Wong, Yiming Zhao
2006/345 (PDF ) Private and Efficient Stable Marriages (Matching) T. Atkinson, R. Bartak, M. -C. Silaghi, E. Tuleu, M. Zanker
2006/344 (PDF ) A Subject-Delegated Decryption Scheme with ``Tightly" Limited Authority Lihua Wang, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto
2006/343 (PDF ) Verifiably Encrypted Signature Scheme with Threshold Adjudication M. Choudary Gorantla, Ashutosh Saxena
2006/342 (PDF ) A Novel Secure Electronic Voting Protocol Based On Bilinear Pairings Jue-Sam Chou, Yalin Chen, Jin-Cheng Huang
2006/341 (PDF ) MV3: A new word based stream cipher using rapid mixing and revolving buffers Nathan Keller, Stephen D. Miller, Ilya Mironov, Ramarathnam Venkatesan
2006/340 (PDF ) Cryptanalyses of Some Multimedia Encryption Schemes Chengqing Li
2006/338 (PDF ) Efficient and Provably Secure Multi-Recipient Signcryption from Bilinear Pairings Fagen Li, Yupu Hu, Shuanggen Liu
2006/337 (PDF ) An Efficient and Secure Two-flow Zero-Knowledge Identification Protocol D. R. Stinson, J. Wu
2006/336 (PDF ) High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems Jintai Ding, Lei Hu, Xuyun Nie, Jianyu li, John Wagner
2006/335 (PDF ) A ID-Based Deniable Authentication Protocol on pairings Jue-Sam Chou, Yalin Chen, Jin-Cheng Huang
2006/334 (PDF ) Colliding Message Pair for 53-Step HAS-160 Florian Mendel
2006/333 (PDF ) Discrete Logarithms in Generalized Jacobians S. D. Galbraith, B. A. Smith
2006/332 (PDF ) Improved Efficiency for Private Stable Matching Matthew Franklin, Mark Gondree, Payman Mohassel
2006/331 (PDF ) On the Security of Generalized Jacobian Cryptosystems Isabelle Dechene
2006/330 (PDF ) Extended Double-Base Number System with applications to Elliptic Curve Cryptography Christophe Doche, Laurent Imbert
2006/329 (PDF ) Designated Verifier Signature Scheme Based on Braid Groups Shi-hua Zou, Ji-wen Zeng, Jun-jie Quan
2006/328 (PDF ) Anonymous Secure Communication in Wireless Mobile Ad-hoc Networks Sk. Md. Mizanur Rahman, Atsuo Inomata, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto
2006/327 (PDF ) An Algorithm for the $\eta_T$ Pairing Calculation in Characteristic Three and its Hardware Implementation Jean-Luc Beuchat, Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto
2006/326 (PDF ) Analyzing the HB and HB+ Protocols in the ``Large Error'' Case Jonathan Katz, Adam Smith
2006/325 (PDF ) Invisible Designated Confirmer Signatures without Random Oracles Victor K. Wei
2006/324 (PDF ) The Average Transmission Overhead of Broadcast Encryption Sarang Aravamuthan, Sachin Lodha
2006/323 (PDF ) Computational Soundness of Formal Indistinguishability and Static Equivalence Gergei Bana, Payman Mohassel, Till Stegers
2006/322 (PDF ) Algebraic Immunity of S-boxes Based on Power Mappings: Analysis and Construction Yassir Nawaz, Kishan Chand Gupta, Guang Gong
2006/321 (PDF ) Efficient Pseudorandom Generators Based on the DDH Assumption Reza Rezaeian Farashahi, Berry Schoenmakers, Andrey Sidorenko
2006/320 (PDF ) CMSS -- An Improved Merkle Signature Scheme Johannes Buchmann, Luis Carlos Coronado Garcia, Erik Dahmen, Martin Doering, Elena Klintsevich
2006/319 (PDF ) Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions Scott Contini, Yiqun Lisa Yin
2006/318 (PDF ) Chameleon-Based Deniable Authenticated Key Agreement Protocol Chunbo Ma, Jun Ao, Jianhua Li
2006/317 (PDF ) Weaknesses of the FORK-256 compression function Krystian Matusiewicz, Scott Contini, Josef Pieprzyk
2006/316 (PDF ) A Parallelization of ECDSA Resistant to Simple Power Analysis Attacks Sarang Aravamuthan, Viswanatha Rao Thumparthy
2006/315 (PDF ) On the Necessity of Rewinding in Secure Multiparty Computation Michael Backes, Joern-Mueller Quade, Dominique Unruh
2006/314 (PDF ) Concurrently Non-Malleable Zero Knowledge in the Authenticated Public-Key Model Yi Deng, Giovanni Di Crescenzo, Dongdai Lin
2006/313 (PDF ) Efficient Scalar Multiplication and Security against Power Analysis in Cryptosystems based on the NIST Elliptic Curves Over Prime Fields Lars Elmegaard-Fessel
2006/312 (PDF ) ElGamal type signature schemes for n-dimensional vector spaces Iwan M. Duursma, SeungKook Park
2006/310 (PDF ) A d-Sequence based Recursive Random Number Generator Abhishek Parakh
2006/309 (PDF ) Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Waters
2006/308 (PDF ) Efficient ID-based Threshold Signature Schemes without Pairings Jun Shao, Zhenfu Cao, Licheng Wang
2006/307 (PDF ) Note on Design Criteria for Rainbow-Type Multivariates Jintai Ding, Lei Hu, Bo-Yin Yang, Jiun-Ming Chen
2006/306 (PDF ) Revisiting the Security Model for Timed-Release Public-Key Encryption with Pre-Open Capability Alexander W. Dent, Qiang Tang
2006/305 (PDF ) Provably Sublinear Point Multiplication on Koblitz Curves and its Hardware Implementation V. S. Dimitrov, K. U. Jaervinen, M. J. Jacobson Jr., W. F. Chan, Z. Huang
2006/304 (PDF ) Identity-Based Encryption Gone Wild Michel Abdalla, Dario Catalano, Alexander W. Dent, John Malone-Lee, Gregory Neven, Nigel P. Smart
2006/303 (PDF ) Zero-knowledge-like Proof of Cryptanalysis of Bluetooth Encryption Eric Filiol
2006/302 (PDF ) Noninteractive two-channel message authentication based on hybrid-collision resistant hash functions. Atefeh Mashatan, Douglas R. Stinson
2006/301 (PDF ) New features for JPEG Steganalysis Johann Barbier, Éric Filiol, Kichenakoumar Mayoura
2006/299 (PDF ) Efficient Implementation of Tate Pairing on a Mobile Phone using Java Yuto Kawahara, Tsuyoshi Takagi, Eiji Okamoto
2006/298 (PDF ) A Fully Collusion Resistant Broadcast, Trace, and Revoke System Dan Boneh, Brent Waters
2006/297 (PDF ) Forward-Secure Signatures with Untrusted Update Xavier Boyen, Hovav Shacham, Emily Shen, Brent Waters
2006/296 (PDF ) On the Generic Construction of Identity-Based Signatures with Additional Properties David Galindo, Javier Herranz, Eike Kiltz
2006/295 (PDF ) Visual secret sharing scheme with autostereogram Feng Yi, Daoshun Wang, Yiqi Dai
2006/294 (PDF ) The Collision Intractability of MDC-2 in the Ideal Cipher Model John P Steinberger
2006/293 (PDF ) Fast Algorithms for the Free Riders Problem in Broadcast Encryption Zulfikar Ramzan, David P. Woodruff
2006/292 (PDF ) Ideal Multipartite Secret Sharing Schemes Oriol Farras, Jaume Marti-Farre, Carles Padro
2006/291 (PDF ) Hard Homogeneous Spaces Jean-Marc Couveignes
2006/290 (PDF ) On Authentication with HMAC and Non-Random Properties Christian Rechberger, Vincent Rijmen
2006/289 (PDF ) Efficient Ring Signatures without Random Oracles Hovav Shacham, Brent Waters
2006/288 (PDF ) Predicting Secret Keys via Branch Prediction Onur Aciicmez, Jean-Pierre Seifert, Cetin Kaya Koc
2006/287 (PDF ) Conjunctive, Subset, and Range Queries on Encrypted Data Dan Boneh, Brent Waters
2006/286 (PDF ) Shorter Verifier-Local Revocation Group Signatures From Bilinear Maps Sujing Zhou, Dongdai Lin
2006/285 (PDF ) Unrestricted Aggregate Signatures Mihir Bellare, Chanathip Namprempre, Gregory Neven
2006/284 (PDF ) Constant Round Group Key Exchange with Logarithmic Computational Complexity Junghyun Nam, Youngsook Lee, Dongho Won
2006/283 (PDF ) Does Privacy Require True Randomness? Carl Bosley, Yevgeniy Dodis
2006/281 (PDF ) Formalizing Human Ignorance: Collision-Resistant Hashing without the Keys Phillip Rogaway
2006/280 (PDF ) Deniable Authentication and Key Exchange Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk
2006/279 (PDF ) On (Hierarchical) Identity Based Encryption Protocols with Short Public Parameters \\ (With an Exposition of Waters' Artificial Abort Technique) Sanjit Chatterjee, Palash Sarkar
2006/278 (PDF ) Fundamental problems in provable security and cryptography Alexander W. Dent
2006/277 (PDF ) On Expected Probabilistic Polynomial-Time Adversaries -- A suggestion for restricted definitions and their benefits Oded Goldreich
2006/276 (PDF ) Mitigating Dictionary Attacks on Password-Protected Local Storage Ran Canetti, Shai Halevi, Michael Steiner
2006/275 (PDF ) A New Mode of Encryption Providing A Tweakable Strong Pseudo-Random Debrup Chakraborty, Palash Sarkar
2006/274 (PDF ) An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings Debasis Giri, P. D. Srivastava
2006/273 (PDF ) Secure Positioning of Mobile Terminals with Simplex Radio Communication Mikio Fujii
2006/272 (PDF ) Efficient Use of Random Delays Olivier Benoit, Michael Tunstall
2006/271 (PDF ) Modes of Encryption Secure against Blockwise-Adaptive Chosen-Plaintext Attack Gregory V. Bard
2006/270 (PDF ) Formal Analysis and Systematic Construction of Two-factor Authentication Scheme Guomin Yang, Duncan S. Wong, Huaxiong Wang, Xiaotie Deng
2006/269 (PDF ) An Analysis of the Hermes8 Stream Ciphers Steve Babbage, Carlos Cid, Norbert Pramstaller, Havard Raddum
2006/268 (PDF ) On the Equivalence of Several Security Notions of Key Encapsulation Mechanism Waka Nagao, Yoshifumi Manabe, Tatsuaki Okamoto
2006/267 (PDF ) Stateful Public-Key Cryptosystems: How to Encrypt with One 160-bit Exponentiation Mihir Bellare, Tadayoshi Kohno, Victor Shoup
2006/266 (PDF ) Computationally Sound Secrecy Proofs by Mechanized Flow Analysis Michael Backes, Peeter Laud
2006/265 (PDF ) Some (in)sufficient conditions for secure hybrid encryption. Javier Herranz, Dennis Hofheinz, Eike Kiltz
2006/264 (PDF ) A Simple and Unified Method of Proving Unpredictability Mridul Nandi
2006/263 (PDF ) Efficient FPGA Implementations and Cryptanalysis of Automata-based Dynamic Convolutional Cryptosystems Dragos Trinca
2006/262 (PDF ) Logical Concepts in Cryptography Simon Kramer
2006/261 (PDF ) Using Wiedemann's algorithm to compute the immunity against algebraic and fast algebraic attacks Frederic Didier
2006/260 (PDF ) A Note On Game-Hopping Proofs Alexander W. Dent
2006/259 (PDF ) Simplified Submission of Inputs to Protocols Douglas Wikstrom
2006/258 (PDF ) Cryptanalysis of a Cognitive Authentication Scheme Philippe Golle, David Wagner
2006/257 (PDF ) Efficient Divisor Class Halving on Genus Two Curves Peter Birkner
2006/256 (PDF ) Constant-Round Concurrent NMWI and its relation to NMZK Rafail Ostrovsky, Giuseppe Persiano, Ivan Visconti
2006/255 (PDF ) Malicious KGC Attacks in Certificateless Cryptography Man Ho Au, Jing Chen, Joseph K. Liu, Yi Mu, Duncan S. Wong, Guomin Yang
2006/254 (PDF ) Applications of SAT Solvers to Cryptanalysis of Hash Functions Ilya Mironov, Lintao Zhang
2006/253 (PDF ) Hard Instances of the Constrained Discrete Logarithm Problem Ilya Mironov, Anton Mityagin, Kobbi Nissim
2006/252 (PDF ) On the Resilience of Key Agreement Protocols to Key Compromise Impersonation Maurizio A. Strangio
2006/251 (PDF ) Accelerating Cryptanalysis with the Method of Four Russians Gregory V. Bard
2006/250 (PDF ) Linear Cryptanalysis of CTC Orr Dunkelman, Nathan Keller
2006/249 (PDF ) Enumeration of 9-variable Rotation Symmetric Boolean Functions having Nonlinearity > 240 Selcuk Kavut, Subhamoy Maitra, Sumanta Sarkar, Melek D. Yucel
2006/248 (PDF ) Disguising tori and elliptic curves Steven D. Galbraith
2006/246 (PDF ) ON THE POSTQUANTUM CIPHER SCHEME Jaroslav HRUBY
2006/245 (PDF ) Secure and Efficient Threshold Key Issuing Protocol for ID-based Cryptosystems K. Phani Kumar, G. Shailaja, Ashutosh Saxena
2006/244 (PDF ) Length-based cryptanalysis: The case of Thompson's Group Dima Ruinskiy, Adi Shamir, Boaz Tsaban
2006/243 (PDF ) Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields Tae Hyun Kim, Tsuyoshi Takagi, Dong-Guk Han, Ho Won Kim, Jongin Lim
2006/242 (PDF ) The Probability Advantages of Two Linear Expressions in Symmetric Ciphers Haina Zhang, Shaohui Wang, Xiaoyun Wang
2006/241 (PDF ) A Stronger Definition for Anonymous Electronic Cash Marten Trolin
2006/240 (PDF ) Computing Zeta Functions of Nondegenerate Curves W. Castryck, J. Denef, F. Vercauteren
2006/239 (PDF ) Resettable Zero Knowledge in the Bare Public-Key Model under Standard Assumption Yi Deng, Dongdai Lin
2006/237 (PDF ) Side Channel Analysis of Practical Pairing Implementations: Which Path is More Secure? Claire Whelan, Mike Scott
2006/236 (PDF ) Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security Shidi Xu, Yi Mu, Willy Susilo, Xiaofeng Chen, Xinyi Huang, Fangguo Zhang
2006/235 (PDF ) Application of ECM to a Class of RSA keys Abderrahmane Nitaj
2006/234 (PDF ) RFID Security: Tradeoffs between Security and Efficiency Ivan Damgård, Michael Østergaard
2006/233 (PDF ) A simple generalization of El-Gamal cryptosystem to non-abelian groups Ayan Mahalanobis
2006/232 (PDF ) Improvement to AKS algorithm Roman Popovych
2006/231 (PDF ) A handy multi-coupon system Sebastien Canard, Aline Gouget, Emeline Hufschmitt
2006/230 (PDF ) Another Look at Generic Groups Neal Koblitz, Alfred Menezes
2006/229 (PDF ) Another Look at "Provable Security". II Neal Koblitz, Alfred Menezes
2006/228 (PDF ) Non-Malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-based Characterization Mihir Bellare, Amit Sahai
2006/227 (PDF ) An Elliptic Curve Processor Suitable For RFID-Tags L. Batina, J. Guajardo, T. Kerins, N. Mentens, P. Tuyls, I. Verbauwhede
2006/226 (PDF ) The Fairness of Perfect Concurrent Signatures Guilin Wang, Feng Bao, Jianying Zhou
2006/225 (PDF ) Provably-Secure Time-Bound Hierarchical Key Assignment Schemes Giuseppe Ateniese, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci
2006/224 (PDF ) Generalizations of the Karatsuba Algorithm for Efficient Implementations André Weimerskirch, Christof Paar
2006/223 (PDF ) What Hashes Make RSA-OAEP Secure? Daniel R. L. Brown
2006/222 (PDF ) Decoding Interleaved Gabidulin Codes and Ciphertext-Security for GPT variants R. Overbeck
2006/221 (PDF ) Deterministic Authenticated-Encryption: A Provable-Security Treatment of the Key-Wrap Problem Phillip Rogaway, Thomas Shrimpton
2006/220 (PDF ) Multi-Dimensional Montgomery Ladders for Elliptic Curves Daniel R. L. Brown
2006/219 (PDF ) Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos Michael Backes, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay
2006/218 (PDF ) Computationally Sound Symbolic Secrecy in the Presence of Hash Functions Veronique Cortier, Steve Kremer, Ralf Kuesters, Bogdan Warinschi
2006/217 (PDF ) Statistical Analysis of the MARS Block Cipher Andrey Pestunov
2006/216 (PDF ) Fast and Secure Elliptic Curve Scalar Multiplication Over Prime Fields Using Special Addition Chains Meloni Nicolas
2006/215 (PDF ) Cryptanalysis of an Image Scrambling Scheme without Bandwidth Expansion Shujun Li, Chengqing Li, Kowk-Tung Lo, Guanrong Chen
2006/214 (PDF ) Password-Authenticated Group Key Establishment from Smooth Projective Hash Functions Jens-Matthias Bohli, Maria Isabel Gonzalez Vasco, Rainer Steinwandt
2006/213 (PDF ) Luby-Rackoff Ciphers from Weak Round Functions? Ueli Maurer, Yvonne Anne Oswald, Krzysztof Pietrzak, Johan Sjödin
2006/212 (PDF ) Reverse SSL: Improved Server Performance and DoS Resistance for SSL Handshakes Kemal BICAKCI, Bruno Crispo, Andrew S. Tanenbaum
2006/211 (PDF ) A Survey of Certificateless Encryption Schemes and Security Models Alexander W. Dent
2006/210 (PDF ) Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions Reza Curtmola, Juan Garay, Seny Kamara, Rafail Ostrovsky
2006/209 (PDF ) Minimal Weight and Colexicographically Minimal Integer Representations Clemens Heuberger, James A. Muir
2006/208 (PDF ) Private Information Retrieval Using Trusted Hardware Shuhong Wang, Xuhua Ding, Robert Deng, Feng Bao
2006/207 (PDF ) The Kurosawa-Desmedt Key Encapsulation is not Chosen-Ciphertext Secure Javier Herranz, Dennis Hofheinz, Eike Kiltz
2006/206 (PDF ) On the Provable Security of an Efficient RSA-Based Pseudorandom Generator Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang
2006/204 (PDF ) Towards Minimizing Memory Requirement for Implementation of Hyperelliptic Curve Crytosystems Pradeep Kumar Mishra, Pinakpani Pal, Palash Sarkar.
2006/203 (PDF ) Generalization of the Selective-ID Security Model for HIBE Protocols Sanjit Chatterjee, Palash Sarkar
2006/202 (PDF ) Ate pairing for $y^{2}=x^{5}-\alpha x$ in characteristic five Ryuichi Harasawa, Yutaka Sueyoshi, Aichi Kudo
2006/201 (PDF ) Efficient Tate Pairing Computation Using Double-Base Chains Chang'an Zhao, Fangguo Zhang, Jiwu Huang
2006/200 (PDF ) Improvement of recently proposed Remote User Authentication Schemes Guanfei Fang, Genxun huang
2006/199 (PDF ) Identity-based Key Agreement Protocols From Pairings L. Chen, Z. Cheng, N. P. Smart
2006/198 (PDF ) Cryptographically Private Support Vector Machines Sven Laur, Helger Lipmaa, Taneli Mielikäinen
2006/197 (PDF ) A Novel Algorithm for Solving the LPN Problem and its Application to Security Evaluation of the HB Protocol for RFID Authentication Marc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai, Yang Cui, Kanta Matsuura
2006/196 (PDF ) On ZK-Crypt, Book Stack, and Statistical Tests S. Doroshenko, A. Fionov, A. Lubkin, V. Monarev, B. Ryabko
2006/195 (PDF ) An Efficient ID-based Digital Signature with Message Recovery Based on Pairing Raylin Tso, Chunxiang Gu, Takeshi Okamoto, Eiji Okamoto
2006/193 (PDF ) (Hierarchical Identity-Based) Threshold Ring Signatures Victor K. Wei, Tsz Hon Yuen
2006/192 (PDF ) DPA attacks on keys stored in CMOS cryptographic devices through the influence of the leakage behavior Osman Kocar
2006/191 (PDF ) A PUBLIC KEY CRYPTOSYSTEM BASED ON PELL EQUATION Sahadeo Padhye
2006/190 (PDF ) Cryptanalysis of the Dual Elliptic Curve Pseudorandom Generator Berry Schoenmakers, Andrey Sidorenko
2006/189 (PDF ) Unconditionally secure chaffing and winnowing with short authentication tags D. R. Stinson
2006/188 (PDF ) New Blockcipher Modes of Operation with Beyond the Birthday Bound Security Tetsu Iwata
2006/187 (PDF ) On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 Jongsung Kim, Alex Biryukov, Bart Preneel, Seokhie Hong
2006/186 (PDF ) Deterministic and Efficiently Searchable Encryption Mihir Bellare, Alexandra Boldyreva, Adam O'Neill
2006/185 (PDF ) Statistical Zero-Knowledge Arguments for NP from Any One-Way Function Minh-Huyen Nguyen, Shien Jin Ong, Salil Vadhan
2006/184 (PDF ) On Signatures of Knowledge Melissa Chase, Anna Lysyanskaya
2006/183 (PDF ) Information-Theoretic Conditions for Two-Party Secure Function Evaluation Claude Crépeau, George Savvides, Christian Schaffner, Jürg Wullschleger
2006/182 (PDF ) On the Limits of Point Function Obfuscation Arvind Narayanan, Vitaly Shmatikov
2006/181 (PDF ) There exist Boolean functions on $n$ (odd) variables having nonlinearity $> 2^{n-1} - 2^{\frac{n-1}{2}}$ if and only if $n > 7$ Selçuk Kavut, Subhamoy Maitra, Melek D. Yücel
2006/180 (PDF ) Divisibility of the Hamming Weight by $2^k$ and Monomial Criteria for Boolean Functions Dmitry Khovratovich
2006/179 (PDF ) FPGA Accelerated Tate Pairing Based Cryptosystems over Binary Fields Chang Shu, Soonhak Kwon, Kris Gaj
2006/178 (PDF ) A New Cryptosystem Based On Hidden Order Groups Amitabh Saxena, Ben Soh
2006/177 (PDF ) On the (Im-)Possibility of Extending Coin Toss Dennis Hofheinz, Joern Mueller-Quade, Dominique Unruh
2006/176 (PDF ) Counting points on elliptic curves in medium characteristic Antoine Joux, Reynald Lercier
2006/175 (PDF ) Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models Moni Naor, Gil Segev, Adam Smith
2006/173 (PDF ) Some Practical Public-Key Encryption Schemes in both Standard Model and Random Oracle Model Le Trieu Phong, Ogata Wakaha
2006/172 (PDF ) On Computing Products of Pairings R Granger, N. P. Smart
2006/171 (PDF ) Key confirmation and adaptive corruptions in the protocol security logic Prateek Gupta, Vitaly Shmatikov
2006/170 (PDF ) Visual Cryptography Schemes with Optimal Pixel Expansion Carlo Blundo, Stelvio Cimato, Alfredo De Santis
2006/169 (PDF ) Simplified pairing computation and security implications Steven D. Galbraith, Colm O hEigeartaigh, Caroline Sheedy
2006/168 (PDF ) How Fast can be Algebraic Attacks on Block Ciphers ? Nicolas T. Courtois
2006/167 (PDF ) Towards Trustworthy e-Voting using Paper Receipts Yunho Lee, Kwangwoo Lee, Seungjoo Kim, Dongho Won
2006/166 (PDF ) General Secret Sharing Based on the Chinese Remainder Theorem Sorin Iftene
2006/165 (PDF ) Pairings for Cryptographers S. D. Galbraith, K. G. Paterson, N. P. Smart
2006/164 (PDF ) Classification of Signature-only Signature Models Zhengjun Cao
2006/163 (PDF ) Achieving a log(n) Speed Up for Boolean Matrix Operations and Calculating the Complexity of the Dense Linear Algebra step of Algebraic Stream Cipher Attacks and of Integer Factorization Methods Gregory V. Bard
2006/162 (PDF ) A Summary of McEliece-Type Cryptosystems and their Security D. Engelbert, R. Overbeck, A. Schmidt
2006/161 (PDF ) Cryptanalysis of 4-Pass HAVAL Zhangyi Wang, Huanguo Zhang, Zhongping Qin, Qingshu Meng
2006/158 (PDF ) An Efficient ID-based Proxy Signature Scheme from Pairings Chunxiang Gu, Yuefei Zhu
2006/157 (PDF ) An efficient way to access an array at a secret index Timothy Atkinson, Marius C. Silaghi
2006/156 (PDF ) The Hardness of the DHK Problem in the Generic Group Model Alexander W. Dent
2006/155 (PDF ) Independent Zero-Knowledge Sets Rosario Gennaro, Silvio Micali
2006/154 (PDF ) New Public Key Authentication Frameworks with Lite Certification Authority Xiaolei Dong, Licheng Wang, Zhenfu Cao
2006/153 (PDF ) On the Relationships Between Notions of Simulation-Based Security Anupam Datta, Ralf Kuesters, John C. Mitchell, Ajith Ramanathan
2006/152 (PDF ) Pairing based Mutual Authentication Scheme Using Smart Cards G. Shailaja, K. Phani Kumar, Ashutosh Saxena
2006/151 (PDF ) Simulation-Based Security with Inexhaustible Interactive Turing Machines Ralf Kuesters
2006/150 (PDF ) Demonstrating data possession and uncheatable data transfer Décio Luiz Gazzoni Filho, Paulo Sérgio Licciardi Messeder Barreto
2006/149 (PDF ) A method of construction of balanced functions with optimum algebraic immunity C. Carlet
2006/148 (PDF ) Computational Indistinguishability between Quantum States and Its Cryptographic Application Akinori Kawachi, Takeshi Koshiba, Harumichi Nishimura, Tomoyuki Yamakami
2006/147 (PDF ) New Integrated proof Method on Iterated Hash Structure and New Structures Duo Lei
2006/146 (PDF ) Completeness of Formal Hashes in the Standard Model Flavio D. Garcia, Peter van Rossum
2006/145 (PDF ) PUBLIC-KEY CRYPTOSYSTEM BASED ON ISOGENIES Alexander Rostovtsev, Anton Stolbunov
2006/144 (PDF ) Implementing Cryptographic Pairings on Smartcards Michael Scott, Neil Costigan, Wesam Abdulwahab
2006/143 (PDF ) Blinded Fault Resistant Exponentiation Guillaume Fumaroli, David Vigilant
2006/142 (PDF ) Rational Secret Sharing, Revisited S. Dov Gordon, Jonathan Katz
2006/141 (PDF ) Linear Sequential Circuit Approximation of Grain and Trivium Stream Ciphers Shahram Khazaei, Mahdi M. Hasanzadeh, Mohammad S. Kiaei
2006/140 (PDF ) GVG-RP: A Net-centric Negligibility-based Security Model for Self-organizing Networks Jiejun Kong
2006/139 (PDF ) A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version) Francois-Xavier Standaert, Tal G. Malkin, Moti Yung
2006/138 (PDF ) Trace-Driven Cache Attacks on AES Onur Ac\i{}içmez, Çetin Kaya Koç
2006/137 (PDF ) Defining Strong Privacy for RFID Ari Juels, Stephen A. Weis
2006/136 (PDF ) A Challenging but Feasible Blockwise-Adaptive Chosen-Plaintext Attack on SSL Gregory V. Bard
2006/135 (PDF ) The Design Principle of Hash Function with Merkle-Damgård Construction Duo Lei, Da Lin, Li Chao, Keqin Feng, Longjiang Qu
2006/134 (PDF ) Identity Based Strong Designated Verifier Signature Scheme K. Phani Kumar, G. Shailaja, Ashutosh Saxena
2006/133 (PDF ) Low Complexity Bit-Parallel Square Root Computation over GF($2^m$) for all Trinomials Francisco Rodríguez-Henríquez, Guillermo Morales-Luna, Julio López-Hernández
2006/132 (PDF ) Conditional Reactive Simulatability Michael Backes, Markus Duermuth, Dennis Hofheinz, Ralf Kuesters
2006/131 (PDF ) Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols Mike Burmester, Tri van Le, Breno de Medeiros
2006/130 (PDF ) Simulatable Security and Polynomially Bounded Concurrent Composition Dennis Hofheinz, Dominique Unruh
2006/129 (PDF ) Some Remarks on the TKIP Key Mixing Function of IEEE 802.11i Wei Han, Dong Zheng, Ke-fei Chen
2006/128 (PDF ) On the existence of distortion maps on ordinary elliptic curves Denis Charles
2006/127 (PDF ) A New Cryptanalytic Time/Memory/Data Trade-off Algorithm Sourav Mukhopadhyay, Palash Sarkar
2006/126 (PDF ) ECGSC: Elliptic Curve based Generalized Signcryption Scheme Yiliang Han, Xiaoyuan Yang
2006/125 (PDF ) Fast computation of Tate pairing on general divisors of genus 3 hyperelliptic curves Eunjeong Lee, Hyang-Sook Lee, Yoonjin Lee
2006/124 (PDF ) Fast Elliptic Scalar Multiplication using New Double-base Chain and Point Halving K. W. Wong, Edward C. W. Lee, L. M. Cheng, Xiaofeng Liao
2006/123 (PDF ) Designated Confirmer Signatures Revisited Douglas Wikström
2006/122 (PDF ) Chosen-Ciphertext Secure Identity-Based Encryption in the Standard Model with short Ciphertexts Eike Kiltz
2006/121 (PDF ) Counting Prime Numbers with Short Binary Signed Representation José de Jesús Angel Angel, Guillermo Morales-Luna
2006/120 (PDF ) Key Privacy for Identity Based Encryption Jason E. Holt
2006/118 (PDF ) On construction of non-normal Boolean functions Sugata Gangopadhyay, Deepmala Sharma
2006/117 (PDF ) Conjectured Security of the ANSI-NIST Elliptic Curve RNG Daniel R. L. Brown
2006/116 (PDF ) Second Preimages for Iterated Hash Functions Based on a b-Block Bypass Mario Lamberger, Norbert Pramstaller, Vincent Rijmen
2006/115 (PDF ) Fast exponentiation via prime finite field isomorphism Alexander Rostovtsev
2006/114 (PDF ) Tate pairing for $y^{2}=x^{5}-\alpha x$ in Characteristic Five Ryuichi Harasawa, Yutaka Sueyoshi, Aichi Kudo
2006/113 (PDF ) A New Construction of Time Capsule Signature Miaomiao Zhang, Gongliang Chen, Jianhua Li, Licheng Wang, Haifeng Qian
2006/112 (PDF ) Entity Authentication and Authenticated Key Exchange with Tree Parity Machines Markus Volkmer
2006/111 (PDF ) Attacking LCCC Batch Verification of RSA Signatures Martin Stanek
2006/110 (PDF ) The Eta Pairing Revisited F. Hess, N. P. Smart, F. Vercauteren
2006/109 (PDF ) A Simpler Sieving Device: Combining ECM and TWIRL Willi Geiselmann, Fabian Januszewski, Hubert Koepfer, Jan Pelzl, Rainer Steinwandt
2006/108 (PDF ) Efficient Public Key Encryption with Keyword Search Schemes from Pairings Chunxiang Gu, Yuefei Zhu, Yajuan Zhang
2006/107 (PDF ) The number field sieve for integers of low weight Oliver Schirokauer
2006/106 (PDF ) Further Refinement of Pairing Computation Based on Miller's Algorithm Chao-Liang Liu, Gwoboa Horng, Te-Yu Chen
2006/105 (PDF ) Tunnels in Hash Functions: MD5 Collisions Within a Minute Vlastimil Klima
2006/104 (PDF ) Fast Collision Attack on MD5 Marc Stevens
2006/103 (PDF ) Security of VSH in the Real World Markku-Juhani O. Saarinen
2006/102 (PDF ) Efficient Blind and Partially Blind Signatures Without Random Oracles Tatsuaki Okamoto
2006/101 (PDF ) Information-theoretic analysis of coating PUFs B. Skoric, S. Maubach, T. Kevenaar, P. Tuyls
2006/100 (PDF ) A Shorter Group Signature with Verifier-Location Revocation and Backward Unlinkability Zhou Sujing, Lin Dongdai
2006/099 (PDF ) An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families Dongvu Tonien, Reihaneh Safavi-Naini
2006/098 (PDF ) Gröbner Basis Based Cryptanalysis of SHA-1 Makoto Sugita, Mitsuru Kawazoe, Hideki Imai
2006/097 (PDF ) A Cryptographic Tour of the IPsec Standards Kenneth G. Paterson
2006/096 (PDF ) Sequential Aggregate Signatures and Multisignatures without Random Oracles Steve Lu, Rafail Ostrovsky, Amit Sahai, Hovav Shacham, Brent Waters
2006/095 (PDF ) MAC Reforgeability John Black, Martin Cochran
2006/094 (PDF ) Cryptanalysis of the MEM Mode of Operation Peng Wang, Dengguo Feng, Wenling Wu
2006/093 (PDF ) RSA and a higher degree diophantine equation Abderrahmane Nitaj
2006/092 (PDF ) Cryptanalysis of RSA with constrained keys Abderrahmane Nitaj
2006/091 (PDF ) The Complexity of Online Memory Checking Moni Naor, Guy Rothblum
2006/090 (PDF ) Secure Sketch for Multi-Sets Ee-Chien Chang, Vadym Fedyukovych, Qiming Li
2006/089 (PDF ) A Tree-based Model of Unicast Stream Authentication Goce Jakimoski, Yvo Desmedt
2006/088 (PDF ) On the Feasibility of Consistent Computations Sven Laur, Helger Lipmaa
2006/087 (PDF ) Analysis of the SPV Secure Routing Protocol: Weaknesses and Lessons Barath Raghavan, Saurabh Panjwani, Anton Mityagin
2006/086 (PDF ) Analysis of the Linux Random Number Generator Zvi Gutterman, Benny Pinkas, Tzachy Reinman
2006/085 (PDF ) Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles) Xavier Boyen, Brent Waters
2006/084 (PDF ) Cryptography from Anonymity Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai
2006/083 (PDF ) Browsers Defenses Against Phishing, Spoofing and Malware Amir Herzberg
2006/082 (PDF ) Parsimonious Asynchronous Byzantine-Fault-Tolerant Atomic Broadcast HariGovind V. Ramasamy, Christian Cachin
2006/081 (PDF ) Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage -or- How to Store Ballots on a Voting Machine David Molnar, Tadayoshi Kohno, Naveen Sastry, David Wagner
2006/080 (PDF ) Efficient Identity-based Signatures Secure in the Standard Model Kenneth G. Paterson, Jacob C. N. Schuldt
2006/079 (PDF ) Towards Provably Secure Group Key Agreement Building on Group Theory Jens-Matthias Bohli, Benjamin Glas, Rainer Steinwandt
2006/078 (PDF ) Verifiable Random Permutations Yevgeniy Dodis, Prashant Puniya
2006/077 (PDF ) On Secret Sharing Schemes, Matroids and Polymatroids Jaume Marti-Farre, Carles Padro
2006/075 (PDF ) ON THE WEIL SUM EVALUATION OF CENTRAL POLYNOMIAL IN MULTIVARIATE QUADRATIC CRYPTOSYSTEM TOMOHIRO HARAYAMA
2006/074 (PDF ) How to Construct Sufficient Condition in Searching Collisions of MD5 Yu Sasaki, Yusuke Naito, Jun Yajima, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta
2006/073 (PDF ) Stronger Security of Authenticated Key Exchange Brian LaMacchia, Kristin Lauter, Anton Mityagin
2006/072 (PDF ) Cryptanalysis of the Bluetooth E0 Cipher using OBDD's Yaniv Shaked, Avishai Wool
2006/071 (PDF ) A Fast and Key-Efficient Reduction of Chosen- Ciphertext to Known-Plaintext Security Ueli Maurer, Johan Sjödin
2006/070 (PDF ) The experimental distinguishing attack on RC4 Sergey Doroshenko, Boris Ryabko
2006/069 (PDF ) Automated Security Proofs with Sequences of Games Bruno Blanchet, David Pointcheval
2006/068 (PDF ) Limits of the Reactive Simulatability/UC of Dolev-Yao Models with Hashes Michael Backes, Birgit Pfitzmann, Michael Waidner
2006/067 (PDF ) Scalar Multiplication on Koblitz Curves using Double Bases Roberto Avanzi, Francesco Sica
2006/066 (PDF ) Simple and Flexible Private Revocation Checking John Solis, Gene Tsudik
2006/065 (PDF ) On Expected Constant-Round Protocols for Byzantine Agreement Jonathan Katz, Chiu-Yuen Koo
2006/064 (PDF ) Perturbing and Protecting a Traceable Block Cipher Julien Bringer, Hervé Chabanne, Emmanuelle Dottax
2006/063 (PDF ) Provably Secure Universal Steganographic Systems Boris Ryabko, Daniil Ryabko
2006/059 (PDF ) High Security Pairing-Based Cryptography Revisited R. Granger, D. Page, N. P. Smart
2006/058 (PDF ) Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario Michael Backes, Sebastian Mödersheim, Birgit Pfitzmann, Luca Viganò
2006/057 (PDF ) Key Exchange Using Passwords and Long Keys Vladimir Kolesnikov, Charles Rackoff
2006/056 (PDF ) Key Exchange Protocols: Security Definition, Proof Method and Applications Anupam Datta, Ante Derek, John C. Mitchell, Bogdan Warinschi
2006/055 (PDF ) Multicollision Attacks on some Generalized Sequential Hash Functions M. Nandi, D. R. Stinson
2006/054 (PDF ) How to Build a Low-Cost, Extended-Range RFID Skimmer Ilan Kirschenbaum, Avishai Wool
2006/053 (PDF ) Cryptanalysis of the CFVZ cryptosystem J. J. Climent, E. Gorla, J. Rosenthal
2006/052 (PDF ) Software mitigations to hedge AES against cache-based software side channel vulnerabilities Ernie Brickell, Gary Graunke, Michael Neve, Jean-Pierre Seifert
2006/051 (PDF ) Proposal for Piece In Hand Matrix Ver.2: General Concept for Enhancing Security of Multivariate Public Key Cryptosystems Shigeo Tsujii, Kohtaro Tadaki, Ryou Fujita
2006/050 (PDF ) Secure Device Pairing based on a Visual Channel Nitesh Saxena, Jan-Erik Ekberg, Kari Kostiainen, N. Asokan
2006/049 (PDF ) Crossword Puzzle Attack on NLS Joo Yeon Cho, Josef Pieprzyk
2006/048 (PDF ) New Results on Multipartite Access Structures Javier Herranz, German Saez
2006/047 (PDF ) Cryptographically Sound Theorem Proving Christoph Sprenger, Michael Backes, David Basin, Birgit Pfitzmann, Michael Waidner
2006/046 (PDF ) Efficient Primitives from Exponentiation in Zp Shaoquan Jiang
2006/045 (PDF ) Fully Collusion Resistant Traitor Tracing Dan Boneh, Amit Sahai, Brent Waters
2006/044 (PDF ) Linear Integer Secret Sharing and Distributed Exponentiation Ivan Damgard, Rune Thorbek
2006/043 (PDF ) New Proofs for NMAC and HMAC: Security Without Collision-Resistance Mihir Bellare
2006/042 (PDF ) Application of LFSRs for Parallel Sequence Generation in Cryptologic Algorithms Sourav Mukhopadhyay, Palash Sarkar
2006/041 (PDF ) Reactively Simulatable Certified Mail Birgit Pfitzmann, Matthias Schunter, Michael Waidner
2006/040 (PDF ) Linkable Democratic Group Signatures Mark Manulis, Ahmad-Reza Sadeghi, Joerg Schwenk
2006/039 (PDF ) Two-Round AES Differentials Joan Daemen, Vincent Rijmen
2006/038 (PDF ) Zhuang-Zi: A New Algorithm for Solving Multivariate Polynomial Equations over a Finite Field Jintai Ding, Jason E. Gower, Dieter S. Schmidt
2006/037 (PDF ) Message Authentication on 64-bit Architectures Ted Krovetz
2006/036 (PDF ) Vector Stream Cipher Instant Key Recovery Sean O'Neil
2006/035 (PDF ) Parallel Itoh-Tsujii Multiplicative Inversion Algorithm for a Special Class of Trinomials Francisco Rodríguez-Henríquez, Guillermo Morales-Luna, Nazar A. Saqib, Nareli Cruz-Cortés
2006/034 (PDF ) Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation without Random Oracles Eike Kiltz, David Galindo
2006/033 (PDF ) Arithmetic of Generalized Jacobians Isabelle Déchène
2006/032 (PDF ) Reducing the Number of Homogeneous Linear Equations in Finding Annihilators Deepak Kumar Dalai, Subhamoy Maitra
2006/031 (PDF ) On a Variation of Kurosawa-Desmedt Encryption Scheme Le Trieu Phong, Wakaha Ogata
2006/030 (PDF ) Improved cryptanalysis of Py Paul Crowley
2006/029 (PDF ) Authenticated Hybrid Encryption for Multiple Recipients Stéphanie Alt
2006/028 (PDF ) Cryptanalysis of recently proposed Remote User Authentication Schemes Thulasi Goriparthi, Manik Lal Das, Atul Negi, Ashutosh Saxena
2006/027 (PDF ) Finding Low Degree Annihilators for a Boolean Function Using Polynomial Algorithms Vladimir Bayev
2006/026 (PDF ) Constructing Pairing-Friendly Elliptic Curves with Embedding Degree 10 David Freeman
2006/025 (PDF ) Signatures for Network Coding Denis Charles, Kamal Jain, Kristin Lauter
2006/024 (PDF ) Improving the Decoding Efficiency of Private Search George Danezis, Claudia Diaz
2006/023 (PDF ) A Method to Implement Direct Anonymous Attestation HE GE
2006/021 (PDF ) Cryptographic hash functions from expander graphs Denis Charles, Eyal Goren, Kristin Lauter
2006/020 (PDF ) Scrambling Adversarial Errors Using Few Random Bits, Optimal Information Reconciliation, and Better Private Codes Adam Smith
2006/019 (PDF ) Hermes8 : A Low-Complexity Low-Power Stream Cipher Ulrich Kaiser
2006/018 (PDF ) Notion of Algebraic Immunity and Its evaluation Related to Fast Algebraic Attacks Deepak Kumar Dalai, Kishan Chand Gupta, Subhamoy Maitra
2006/017 (PDF ) Threshold and Proactive Pseudo-Random Permutations Yevgeniy Dodis, Aleksandr Yampolskiy, Moti Yung
2006/016 (PDF ) Message Modification for Step 21-23 on SHA-0 Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Jun Yajima, Noboru Kunihiro, Kazuo Ohta
2006/015 (PDF ) A Family of Dunces: Trivial RFID Identification and Authentication Protocols Gene Tsudik
2006/014 (PDF ) Sound Computational Interpretation of Symbolic Hashes in the Standard Model Flavio D. Garcia, Peter van Rossum
2006/013 (PDF ) Comments on a Provably Secure Three-Party Password-Based Authenticated Key Exchange Protocol Using Weil Pairings Hung-Yu Chien
2006/012 (PDF ) Certificate-Based Encryption Without Random Oracles Paz Morillo, Carla Ràfols
2006/011 (PDF ) Formal Proof for the Correctness of RSA-PSS Christina Lindenberg, Kai Wirt, Johannes Buchmann
2006/010 (PDF ) Finding Characteristic Polynomials with Jump Indices Steve Babbage, Matthew Dodd
2006/009 (PDF ) Breaking and Fixing Public-Key Kerberos Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Joe-Kay Tsay, Christopher Walstad
2006/008 (PDF ) A Simple Left-to-Right Algorithm for the Computation of the Arithmetic Weight of Integers James A. Muir
2006/007 (PDF ) Further Discussions on the Security of a Nominative Signature Scheme Lifeng Guo, Guilin Wang, Duncan S. Wong
2006/006 (PDF ) Group Key Agreement for Ad Hoc Networks Lijun Liao
2006/005 (PDF ) Pairing Calculation on Supersingular Genus 2 Curves Colm O hEigeartaigh, Michael Scott
2006/004 (PDF ) Provably Secure Subsitution of Cryptographic Tools Lea Kissner, David Molnar
2006/003 (PDF ) Sequential and Parallel Cascaded Convolutional Encryption with Local Propagation: Toward Future Directions in Symmetric Cryptography Dragos Trinca
2006/002 (PDF ) Geometric constructions of optimal linear perfect hash families S. G. Barwick, W. -A. Jackson.
2006/001 (PDF ) Homomorphic Cryptosystems and their Applications Doerte K. Rappe
2005/469 (PDF ) A lower bound on the higher order nonlinearity of algebraic immune functions C. Carlet
2005/468 (PDF ) Blind Attacks on Engineering Samples Vanessa Gratzer, David Naccache
2005/467 (PDF ) A Probabilistic Hoare-style logic for Game-based Cryptographic Proofs (Extended Version) Ricardo Corin, Jerry den Hartog
2005/466 (PDF ) Cryptanalysis of the Yang -Wang's password authentication schemes Jue-Sam Chou, Ming-De Yang, Guey-Chuen Lee
2005/465 (PDF ) A sequence approach to constructing perfect hash families S. G. Barwick, W. -A. Jackson
2005/464 (PDF ) Equivalent Keys in Multivariate Quadratic Public Key Systems Christopher Wolf, Bart Preneel
2005/463 (PDF ) More short signatures without random oracles Victor K. Wei, Tsz Hon Yuen
2005/462 (PDF ) A Simplified Quadratic Frobenius Primality Test Martin Seysen
2005/461 (PDF ) Parallel and Concurrent Security of the HB and HB+ Protocols Jonathan Katz, Ji Sun Shin
2005/460 (PDF ) One-Time HNP or Attacks on a Flawed El Gamal Revisited Tomas Rosa
2005/459 (PDF ) A Practical Attack on the Root Problem in Braid Groups Anja Groch, Dennis Hofheinz, Rainer Steinwandt
2005/458 (PDF ) Seifert's RSA Fault Attack: Simplified Analysis and Generalizations James A. Muir
2005/457 (PDF ) Weakness of shim¡¦s New ID-based tripartite multiple-key agreement protocol Jue-Sam Chou, Chu-Hsing Lin, Chia-Hung Chiu
2005/456 (PDF ) A Secure Scheme for Authenticated Encryption Fuw-Yi Yang
2005/455 (PDF ) Enhancing CK-Model for Key Compromise Impersonation Resilience and Identity-based Key Exchange Robert W. Zhu, Xiaojian Tian, Duncan S. Wong
2005/454 (PDF ) Efficient Arithmetic on Subfield Elliptic Curves over Small Odd Characteristics Keisuke Hakuta, Hisayoshi Sato, Tsuyoshi Takagi
2005/453 (PDF ) Further Constructions of Almost Resilient Functions Pinhui Ke, Jie Zhang, Qiaoyan Wen
2005/452 (PDF ) Using Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol Ran Canetti, Ling Cheung, Dilsun Kaynar, Moses Liskov, Nancy Lynch, Olivier Pereira, Roberto Segala
2005/451 (PDF ) Weaknesses of the Boyd-Mao Deniable Authenticated key Establishment for Internet Protocols Jue-Sam Chou, Yalin Chen, Ming-De Yang
2005/450 (PDF ) Improvement of Manik et al.¡¦s remote user authentication scheme Jue-Sam Chou, Yalin Chen, Jyun-Yu Lin
2005/449 (PDF ) On the Boolean functions With Maximum Possible Algebraic Immunity : Construction and A Lower Bound of the Count Longjiang Qu, Guozhu Feng, Chao Li
2005/448 (PDF ) On the (In)security of Stream Ciphers Based on Arrays and Modular Addition (Full Version) Souradyuti Paul, Bart Preneel
2005/447 (PDF ) A new key exchange protocol based on the decomposition problem Vladimir Shpilrain, Alexander Ushakov
2005/446 (PDF ) Democratic Group Signatures on Example of Joint Ventures Mark Manulis
2005/445 (PDF ) An Anonymous Authentication Scheme for Trusted Computing Platform HE GE
2005/444 (PDF ) Privacy-Preserving Polling using Playing Cards Sid Stamm, Markus Jakobsson
2005/443 (PDF ) Revised: Block Cipher Based Hash Function Construction From PGV Duo Lei
2005/442 (PDF ) One-Time Signatures Revisited: Have They Become Practical? Dalit Naor, Amir Shenhav, Avishai Wool
2005/441 (PDF ) Tight bound between nonlinearity and algebraic immunity Mikhail Lobanov
2005/439 (PDF ) A note on the n-spendable extension of Ferguson's single-term off-line coins T. C. Lam
2005/438 (PDF ) Minimal Assumptions for Efficient Mercurial Commitments Yevgeniy Dodis
2005/436 (PDF ) A Note on the Kasami Power Function Doreen Hertel
2005/435 (PDF ) Concurrent Blind Signatures without Random Oracles Aggelos Kiayias, Hong-Sheng Zhou
2005/434 (PDF ) Prompted User Retrieval of Secret Entropy: The Passmaze Protocol Daniel R. L. Brown
2005/433 (PDF ) Proxy Re-Signatures: New Definitions, Algorithms, and Applications Giuseppe Ateniese, Susan Hohenberger
2005/432 (PDF ) On the Security of Kaweichel Dieter Schmidt
2005/431 (PDF ) Is it possible to have CBE from CL-PKE? Bo Gyeong Kang, Je Hong Park
2005/430 (PDF ) F-HASH: Securing Hash Functions Using Feistel Chaining Duo Lei
2005/429 (PDF ) Signature from a New Subgroup Assumption Victor K. Wei
2005/428 (PDF ) Loud and Clear: Human-Verifiable Authentication Based on Audio Michael T. Goodrich, Michael Sirivianos, John Solis, Gene Tsudik, Ersin Uzun
2005/427 (PDF ) Solutions to Key Exposure Problem in Ring Signature Joseph K. Liu, Duncan S. Wong
2005/426 (PDF ) On the Security of a Certificateless Public-Key Encryption Zhenfeng Zhang, Dengguo Feng
2005/425 (PDF ) Improved Collision Attack on Hash Function MD5 Jie Liang, Xuejia Lai
2005/424 (PDF ) Efficient Mutual Data Authentication Using Manually Authenticated Strings Sven Laur, N. Asokan, Kaisa Nyberg
2005/422 (PDF ) On Anonymity of Group Signatures Zhou Sujing, Lin Dongdai
2005/421 (PDF ) Key-dependent Message Security under Active Attacks -- BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles Michael Backes, Birgit Pfitzmann, Andre Scedrov
2005/420 (PDF ) Efficient Scalar Multiplication by Isogeny Decompositions Christophe Doche, Thomas Icart, David R. Kohel
2005/419 (PDF ) Unified Point Addition Formulæ and Side-Channel Attacks Douglas Stebila, Nicolas Thériault
2005/418 (PDF ) Generic On-Line/Off-Line Threshold Signatures Chris Crutchfield, David Molnar, David Turner, David Wagner
2005/417 (PDF ) Correlation-Resistant Storage via Keyword-Searchable Encryption Lucas Ballard, Matthew Green, Breno de Medeiros, Fabian Monrose
2005/416 (PDF ) Cryptography in Theory and Practice: The Case of Encryption in IPsec Kenneth G. Paterson, Arnold K. L. Yau
2005/412 (PDF ) Constant-Size Hierarchical Identity-Based Signature/Signcryption without Random Oracles Tsz Hon Yuen, Victor K. Wei
2005/411 (PDF ) More Compact E-Cash with Efficient Coin Tracing Victor K. Wei
2005/410 (PDF ) Short (resp. Fast) CCA2-Fully-Anonymous Group Signatures using IND-CPA-Encrypted Escrows Victor K. Wei
2005/408 (PDF ) Compartmented Secret Sharing Based on the Chinese Remainder Theorem Sorin Iftene
2005/407 (PDF ) Anonymous Signature Schemes Guomin Yang, Duncan S. Wong, Xiaotie Deng, Huaxiong Wang
2005/406 (PDF ) Relations amount Statistical Security Notions - or - Why Exponential Adversaries are Unlimited Dominique Unruh
2005/405 (PDF ) Building Better Signcryption Schemes with Tag-KEMs Tor E. Bjørstad, Alexander W. Dent
2005/404 (PDF ) Preventing Attacks on Machine Readable Travel Documents (MRTDs) Gaurav S. Kc, Paul A. Karger
2005/403 (PDF ) Collisions in the Original Version of a Chaotic Hash Function Scott Contini
2005/402 (PDF ) Some Analysis of Radix-r Representations Dong-Guk Han, Tsuyoshi Takagi
2005/401 (PDF ) A Computationally Sound Mechanized Prover for Security Protocols Bruno Blanchet
2005/400 (PDF ) Improved Collision Attack on MD5 Yu Sasaki, Yusuke Naito, Noboru Kunihiro, Kazuo Ohta
2005/399 (PDF ) On affine rank of spectrum support for plateaued function Yuriy Tarannikov
2005/398 (PDF ) Preliminary Analysis of DHA-256 IAIK Krypto Group
2005/397 (PDF ) Enhancing the MD-Strengthening and Designing Scalable Families of One-Way Hash Algorithms Neil Kauer, Tony Suarez, Yuliang Zheng
2005/396 (PDF ) Design and Analysis of a Robust and Efficient Block Cipher using Cellular Automata Pallavi Joshi, Debdeep Mukhopadhyay, Dipanwita RoyChowdhury
2005/395 (PDF ) Secure Group Key Establishment Revisited Jens-Matthias Bohli, Maria Isabel Gonzalez Vasco, Rainer Steinwandt
2005/394 (PDF ) How to Shuffle in Public Ben Adida, Douglas Wikström
2005/393 (PDF ) Multivariate Quadratic Polynomials in Public Key Cryptography Christopher Wolf
2005/392 (PDF ) An Efficient Variant of RSA Cryptosystem Sahadeo Padhye
2005/391 (PDF ) Some thoughts on Collision Attacks in the Hash Functions MD5, SHA-0 and SHA-1 Praveen Gauravaram, William Millan, Juanma Gonzalez Nieto
2005/390 (PDF ) 3C- A Provably Secure Pseudorandom Function and Message Authentication Code.A New mode of operation for Cryptographic Hash Function Praveen Gauravaram, William Millan, Juanma Gonzalez Nieto, Edward Dawson
2005/389 (PDF ) How to Generate Universally Verifiable Signatures in Ad-Hoc Networks KyungKeun Lee, JoongHyo Oh, SangJae Moon
2005/388 (PDF ) Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing YongBin Zhou, DengGuo Feng
2005/387 (PDF ) On highly nonlinear S-boxes and their inability to thwart DPA attacks (completed version) C. Carlet
2005/386 (PDF ) A New Short Signature Scheme Without Random Oracles from Bilinear Pairings Fangguo Zhang, Xiaofeng Chen, Willy Susilo, Yi Mu
2005/385 (PDF ) Practical Group Signatures without Random Oracles Giuseppe Ateniese, Jan Camenisch, Susan Hohenberger, Breno de Medeiros
2005/384 (PDF ) Some Explicit Formulae of NAF and its Left-to-Right Analogue Dong-Guk Han, Tetsuya Izu, Tsuyoshi Takagi
2005/383 (PDF ) Key Mixing in Block Ciphers through Addition modulo $2^n$ Debdeep Mukhopadhyay, Dipanwita RoyChowdhury
2005/382 (PDF ) One-Wayness Equivalent to General Factoring Kaoru Kurosawa, Tsuyoshi Takagi
2005/381 (PDF ) Compact Group Signatures Without Random Oracles Xavier Boyen, Brent Waters
2005/380 (PDF ) Breaking RSA May Be As Difficult As Factoring Daniel R. L. Brown
2005/379 (PDF ) Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs Jonathan Katz, Yehuda Lindell
2005/378 (PDF ) A New Protocol for Conditional Disclosure of Secrets And Its Applications Sven Laur, Helger Lipmaa
2005/377 (PDF ) Exclusion-Intersection Encryption Sherman S. M. Chow, Siu-Ming Yiu
2005/376 (PDF ) Representing small identically self-dual matroids by self-dual codes Carles Padro, Ignacio Gracia
2005/375 (PDF ) Truncated differential cryptanalysis of five rounds of Salsa20 Paul Crowley
2005/374 (PDF ) Computation of Tate Pairing for Supersingular Curves over characteristic 5 and 7 Kunpeng Wang, Bao Li
2005/373 (PDF ) Efficient Broadcast Encryption Scheme with Log-Key Storage Yong Ho Hwang, Pil Joong Lee
2005/372 (PDF ) Secret color images sharing schemes based on XOR operation Dao-Shun Wang, Lei Zhang, Ning Ma, Lian-Sheng Huang
2005/371 (PDF ) On a Traitor Tracing Scheme from ACISP 2003 Dongvu Tonien
2005/370 (PDF ) Resource Fairness and Composability of Cryptographic Protocols Juan A. Garay, Philip MacKenzie, Manoj Prabhakaran, Ke Yang
2005/369 (PDF ) Secure and {\sl Practical} Identity-Based Encryption David Naccache
2005/368 (PDF ) The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks David Molnar, Matt Piotrowski, David Schultz, David Wagner
2005/367 (PDF ) Searchable Keyword-Based Encryption Dong Jin Park, Juyoung Cha, Pil Joong Lee
2005/366 (PDF ) Efficient Compilers for Authenticated Group Key Exchange Qiang Tang, Chris J. Mitchell
2005/365 (PDF ) Derandomization in Cryptography Boaz Barak, Shien Jin Ong, Salil Vadhan
2005/364 (PDF ) Additive Proofs of Knowledge - A New Notion For Non-Interactive Proofs Amitabh Saxena
2005/363 (PDF ) Elliptic Curves with Low Embedding Degree Florian Luca, Igor E. Shparlinski
2005/362 (PDF ) On a (Flawed) Proposal to Build More Pairing-Friendly Curves Michael Scott, Paulo S. L. M. Barreto
2005/361 (PDF ) Strict Avalanche Criterion Over Finite Fields Yuan Li, T. W. Cusick
2005/360 (PDF ) Burmester-Desmedt Tree-Based Key Transport Revisited: Provable Security Jens Matthias-Bohli, Maria Isabel Gonzalez Vasco, Rainer Steinwandt
2005/359 (PDF ) An infinite class of quadratic APN functions which are not equivalent to power mappings L. Budaghyan, C. Carlet, P. Felke, G. Leander
2005/358 (PDF ) Normal Basis Multiplication Algorithms for GF(2n) (Full Version) Haining Fan, Duo Liu, Yiqi Dai
2005/357 (PDF ) Cryptanalysis of Two ID-based Authenticated Key Agreement Protocols from Pairings Kyung-Ah Shim
2005/356 (PDF ) Exponential Memory-Bound Functions for Proof of Work Protocols Fabien Coelho
2005/355 (PDF ) ID-based Encryption Scheme Secure against Chosen Ciphertext Attacks Rongxing Lu, Zhenfu Cao
2005/354 (PDF ) Pairing-Based Two-Party Authenticated Key Agreement Protocol Rongxing Lu, Zhenfu Cao, Renwang Su, Jun Shao
2005/353 (PDF ) On the Security of A Group Signature Scheme Jianhong Zhang, Wei Zou
2005/352 (PDF ) Candidate One-Way Functions and One-Way Permutations Based on Quasigroup String Transformations Danilo Gligoroski
2005/351 (PDF ) Errors in Computational Complexity Proofs for Protocols Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock
2005/350 (PDF ) Is SHA-1 conceptually sound? Charanjit S. Jutla, Anindya C. Patthak
2005/349 (PDF ) Oblivious Transfer and Linear Functions Ivan B. Damgaard, Serge Fehr, Louis Salvail, Christian Schaffner
2005/346 (PDF ) Batch Verification of Validity of Bids in Homomorphic E-auction Kun Peng, Colin Boyd, Ed Dawson
2005/345 (PDF ) Group Signatures with Efficient Concurrent Join Aggelos Kiayias, Moti Yung
2005/344 (PDF ) Countering chosen-ciphertext attacks against noncommutative polly cracker-type cryptosystems. Tapan Rai
2005/343 (PDF ) Zero-Knowledge Blind Identification For Smart Cards Using Bilinear Pairings Amitabh Saxena, Serguey Priymak, Ben Soh
2005/342 (PDF ) Special Polynomial Families for Generating More Suitable Elliptic Curves for Pairing-Based Cryptosystems Pu Duan, Shi Cui, Choong Wah Chan
2005/341 (PDF ) A Universally Composable Scheme for Electronic Cash Marten Trolin
2005/339 (PDF ) Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings Zhaohui Cheng, Liqun Chen, Richard Comley, Qiang Tang
2005/338 (PDF ) An Improved Power Analysis Attack Against Camellia's Key Schedule Lu Xiao, Howard M. Heys
2005/337 (PDF ) Statistical Multiparty Computation Based on Random Walks on Graphs Liangliang Xiao, Mulan Liu, Zhifang Zhang
2005/336 (PDF ) Pairing-based identification schemes David Freeman
2005/335 (PDF ) One-Way Signature Chaining - A New Paradigm For Group Cryptosystems Amitabh Saxena, Ben Soh
2005/334 (PDF ) Secure Key-Updating for Lazy Revocation Michael Backes, Christian Cachin, Alina Oprea
2005/333 (PDF ) Universally Composable Disk Encryption Schemes Ivan Damgård, Kasper Dupont
2005/332 (PDF ) Classification of Cubic $(n-4)$-resilient Boolean Functions An Braeken, Yuri Borissov, Svetla Nikova, Bart Preneel
2005/331 (PDF ) A Fuzzy Sketch with Trapdoor Julien Bringer, Hervé Chabanne, Quoc Dung Do
2005/330 (PDF ) A Dedicated Processor for the eta Pairing Robert Ronan, Colm O hEigeartaigh, Colin Murphy, Michael Scott, Tim Kerins, W. P. Marnane
2005/329 (PDF ) Cryptographic Protocols to Prevent Spam Amir Herzberg
2005/328 (PDF ) On Constructing Universal One-Way Hash Functions from Arbitrary One-Way Functions Jonathan Katz, Chiu-Yuen Koo
2005/327 (PDF ) On the Security of Encryption Modes of MD4, MD5 and HAVAL Jongsung Kim, Alex Biryukov, Bart Preneel, Sangjin Lee
2005/326 (PDF ) A Suite of Non-Pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity Patrick P. Tsang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong
2005/325 (PDF ) An Effective Method to Implement Group Signature with Revocation HE GE
2005/324 (PDF ) Extracting bits from coordinates of a point of an elliptic curve Nicolas Gürel
2005/323 (PDF ) The Weil pairing on elliptic curves over C Steven D. Galbraith
2005/322 (PDF ) Evolutionary Design of Trace Form Bent Functions Min yang, Qingshu Meng, Huanguo Zhang
2005/321 (PDF ) Exact Maximum Expected Differential and Linear Probability for 2-Round Advanced Encryption Standard (AES) Liam Keliher, Jiayuan Sui
2005/320 (PDF ) Efficient Identity-Based Encryption with Tight Security Reduction Nuttapong Attrapadung, Benoit Chevallier-Mames, Jun Furukawa, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang
2005/319 (PDF ) ID-based Restrictive Partially Blind Signatures and Applications Xiaofeng Chen, Fangguo Zhang, Shengli Liu
2005/318 (PDF ) Bounds on Birthday Attack Times Michael J. Wiener
2005/317 (PDF ) Ring Signatures without Random Oracles Sherman S. M. Chow, Joseph K. Liu, Victor K. Wei, Tsz Hon Yuen
2005/316 (PDF ) Collision Attack on XTR and a Countermeasure with a Fixed Pattern Dong-Guk Han, Tsuyoshi Takagi, Tae Hyun Kim, Ho Won Kim, Kyo Il Chung
2005/315 (PDF ) A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags David Molnar, Andrea Soppera, David Wagner
2005/314 (PDF ) Fast genus 2 arithmetic based on Theta functions P. Gaudry
2005/313 (PDF ) Deterministic Identity-Based Signatures for Partial Aggregation Javier Herranz
2005/312 (PDF ) A New Efficient Algorithm for Solving Systems of Multivariate Polynomial Equations Xijin Tang, Yong Feng
2005/311 (PDF ) What do S-boxes Say in Differential Side Channel Attacks? Cecile Canovas, Jessy Clediere
2005/310 (PDF ) Meta Ring Signature Hiroyuki OKAZAKI, Ryuichi SAKAI, Masao KASAHARA
2005/309 (PDF ) A New Efficient ID-Based Authenticated Key Agreement Protocol Quan Yuan, Songping Li
2005/308 (PDF ) Adaptable Group-Oriented Signature Chunbo Ma, Jun Ao, Dake He
2005/307 (PDF ) The Equivalence Between the DHP and DLP for Elliptic Curves Used in Practical Applications, Revisited K. Bentahar
2005/306 (PDF ) Murakami-Kasahara ID-based Key Sharing Scheme Revisited ---In Comparison with Maurer-Yacobi Schemes--- Yasuyuki MURAKAMI, Masao KASAHARA
2005/305 (PDF ) Steganography with Imperfect Samplers Anna Lysyanskaya, Maria Meyerovich
2005/304 (PDF ) Ring Signatures: Stronger Definitions, and Constructions without Random Oracles Adam Bender, Jonathan Katz, Ruggero Morselli
2005/303 (PDF ) Key Regression: Enabling Efficient Key Distribution for Secure Distributed Storage Kevin Fu, Seny Kamara, Tadayoshi Kohno
2005/302 (PDF ) Elliptic Curves for Pairing Applications Angela Murphy, Noel Fitzpatrick
2005/301 (PDF ) On the Hardware Implementation of the MICKEY-128 Stream Cipher Paris Kitsos
2005/300 (PDF ) Towards Security Two-part Authenticated Key Agreement Protocols Songping Li, Quan Yuan, Jin Li
2005/299 (PDF ) Nonlinearity of the Round Function Marcin Kontak, Janusz Szmidt
2005/298 (PDF ) Keeping Denial-of-Service Attackers in the Dark Gal Badishi, Amir Herzberg, Idit Keidar
2005/297 (PDF ) DSAC: An Approach to Ensure Integrity of Outsourced Databases using Signature Aggregation and Chaining Maithili Narasimha, Gene Tsudik
2005/296 (PDF ) A Key Establishment IP-Core for Ubiquitous Computing Markus Volkmer, Sebastian Wallner
2005/295 (PDF ) Hidden Exponent RSA and Efficient Key Distribution HE GE
2005/294 (PDF ) On Fairness in Simulatability-based Cryptographic Systems Michael Backes, Dennis Hofheinz, Jörn Müller-Quade, Dominique Unruh
2005/293 (PDF ) Speeding Up Pairing Computation Colm O hEigeartaigh
2005/292 (PDF ) Improved Integral Cryptanalysis of FOX Block Cipher Wu Wenling, Zhang Wentao, Feng Dengguo
2005/291 (PDF ) Cryptography In the Bounded Quantum-Storage Model Ivan Damgård, Serge Fehr, Louis Salvail, Christian Schaffner
2005/290 (PDF ) Perfect Non-Interactive Zero Knowledge for NP Jens Groth, Rafail Ostrovsky, Amit Sahai
2005/289 (PDF ) Overview of Key Agreement Protocols Ratna Dutta, Rana Barua
2005/288 (PDF ) Direct Chosen Ciphertext Security from Identity-Based Techniques Xavier Boyen, Qixiang Mei, Brent Waters
2005/287 (PDF ) Provable Efficient Certificateless Public Key Encryption Yijuan Shi, Jianhua Li
2005/286 (PDF ) Concurrent Zero Knowledge without Complexity Assumptions Daniele Micciancio, Shien Jin Ong, Amit Sahai, Salil Vadhan
2005/285 (PDF ) Generalizations of RSA public key cryptosystems Li Banghe
2005/284 (PDF ) Foundations and Applications for Secure Triggers Ariel Futoransky, Emiliano Kargieman, Carlos Sarraute, Ariel Waissbein
2005/283 (PDF ) Revisiting Oblivious Signature-Based Envelopes Samad Nasserian, Gene Tsudik
2005/282 (PDF ) Spreading Alerts Quietly and the Subgroup Escape Problem James Aspnes, Zoë Diamadi, Kristian Gjøsteen, René Peralta, Aleksandr Yampolskiy
2005/281 (PDF ) Herding Hash Functions and the Nostradamus Attack John Kelsey, Tadayoshi Kohno
2005/280 (PDF ) Partitioned Cache Architecture as a Side-Channel Defence Mechanism D. Page
2005/279 (PDF ) Efficient reduction of 1 out of $n$ oblivious transfers in random oracle model Bao Li, Hongda Li, Guangwu Xu, Haixia Xu
2005/278 (PDF ) A New Rabin-type Trapdoor Permutation Equivalent to Factoring and Its Applications Katja Schmidt-Samoa
2005/277 (PDF ) Scholten Forms and Elliptic/Hyperelliptic Curves with Weak Weil Restrictions Fumiyuki Momose, Jinhui Chao
2005/276 (PDF ) Use of Sparse and/or Complex Exponents in Batch Verification of Exponentiations Jung Hee Cheon, Dong Hoon Lee
2005/275 (PDF ) Explicit Construction of Secure Frameproof Codes Dongvu Tonien, Reihaneh Safavi-Naini
2005/274 (PDF ) Performance Improvements and a Baseline Parameter Generation Algorithm for NTRUSign Jeff Hoffstein, Nick Howgrave-Graham, Jill Pipher, Joseph H. Silverman, William Whyte
2005/273 (PDF ) CRYPTOGRAPHY BASED ON CHAOTIC SYNCHRONIZATION: ROUND III P G Vaidya, Sajini Anand
2005/272 (PDF ) An Authentication Protocol For Mobile Agents Using Bilinear Pairings Amitabh Saxena, Ben Soh
2005/271 (PDF ) Cache attacks and Countermeasures: the Case of AES Dag Arne Osvik, Adi Shamir, Eran Tromer
2005/270 (PDF ) Examining Indistinguishability-Based Proof Models for Key Establishment Protocols Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock
2005/269 (PDF ) Security Weakness in a Three-Party Password-Based Key Exchange Protocol Using Weil Pairing Junghyun Nam, Seungjoo Kim, Dongho Won
2005/268 (PDF ) Secure Human-Computer Identification (Interface) Systems against Peeping Attacks: SecHCI Shujun Li, Heung-Yeung Shum
2005/267 (PDF ) Stream Cipher Design based on Jumping Finite State Machines Cees J. A. Jansen
2005/266 (PDF ) A Matching Lower Bound on the Minimum Weight of SHA-1 Expansion Code Charanjit S. Jutla, Anindya C. Patthak
2005/265 (PDF ) Security Analysis of KEA Authenticated Key Exchange Protocol Kristin Lauter, Anton Mityagin
2005/264 (PDF ) On an authentication scheme based on the Root Problem in the braid group Boaz Tsaban
2005/263 (PDF ) Wang's sufficient conditions of MD5 are not sufficient Jun Yajima, Takeshi Shimoyama
2005/262 (PDF ) Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator Ivan Damgård, Yuval Ishai
2005/261 (PDF ) The Cramer-Shoup Encryption Scheme is Plaintext Aware in the Standard Model Alexander W. Dent
2005/260 (PDF ) Powered Tate Pairing Computation Bo Gyeong Kang, Je Hong Park
2005/259 (PDF ) Efficient Delegation of Pairing Computation Bo Gyeong Kang, Moon Sung Lee, Je Hong Park
2005/258 (PDF ) Relations Among Notions of Security for Identity Based Encryption Schemes Nuttapong Attrapadung, Yang Cui, Goichiro Hanaoka, Hideki Imai, Kanta Matsuura, Peng Yang, Rui Zhang
2005/257 (PDF ) TMD-Tradeoff and State Entropy Loss Considerations of Streamcipher MICKEY Jin Hong, Woo-Hwan Kim
2005/256 (PDF ) Fuzzy Universal Hashing and Approximate Authentication Reihaneh Safavi-Naini, Dongvu Tonien
2005/255 (PDF ) Inoculating Multivariate Schemes Against Differential Attacks Jintai Ding, Jason E. Gower
2005/254 (PDF ) Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi
2005/253 (PDF ) Security Notions for Identity Based Encryption David Galindo, Ichiro Hasuo
2005/252 (PDF ) Faster Pairings using an Elliptic Curve with an Efficient Endomorphism Michael Scott
2005/251 (PDF ) Feistel Schemes and Bi-Linear Cryptanalysis Nicolas Courtois
2005/250 (PDF ) The topology of covert conflict Shishir Nagaraja, Ross Anderson
2005/248 (PDF ) Collision-Resistant usage of MD5 and SHA-1 via Message Preprocessing Michael Szydlo, Yiqun Lisa Yin
2005/247 (PDF ) A Simple and Provably Good Code for SHA Message Expansion Charanjit S. Jutla, Anindya C. Patthak
2005/246 (PDF ) A Verifiable Secret Shuffle of Homomorphic Encryptions Jens Groth
2005/245 (PDF ) On the Algebraic Immunity of Symmetric Boolean Functions An Braeken, Bart Preneel
2005/244 (PDF ) Theoretical cryptanalysis of the Klimov-Shamir number generator TF-1 Boaz Tsaban
2005/243 (PDF ) Cryptanalysis of Sfinks Nicolas T. Courtois
2005/242 (PDF ) Private Searching On Streaming Data Rafail Ostrovsky, William E. Skeith III
2005/241 (PDF ) On the binary sequences with high $GF(2)$ linear complexities and low $GF(p)$ linear complexities Hao Chen, Liqing Xu
2005/240 (PDF ) Attack on Okamoto et al.'s New Short Signature Schemes Fangguo Zhang, Xiaofeng Chen
2005/239 (PDF ) A Share-Correctable Protocol for the Shamir Threshold Scheme and Its Application to Participant Enrollment Raylin Tso, Ying Miao, Takeshi Okamoto, Eiji Okamoto
2005/237 (PDF ) An Active Attack Against HB+ - A Provably Secure Lightweight Authentication Protocol Henri Gilbert, Matt Robshaw, Herve Sibert
2005/236 (PDF ) Effective Polynomial Families for Generating More Pairing-Friendly Elliptic Curves Pu Duan, Shi Cui, Choong Wah Chan
2005/235 (PDF ) Tree Parity Machine Rekeying Architectures for Embedded Security Markus Volkmer, Sebastian Wallner
2005/234 (PDF ) LILI-II is not Broken William Millan, Ed Dawson
2005/233 (PDF ) On the Entropy of Arcfour Keys Luke O'Connor
2005/232 (PDF ) Lightweight Key Exchange and Stream Cipher based solely on Tree Parity Machines Markus Volkmer, Sebastian Wallner
2005/231 (PDF ) Fast generators for the Diffie-Hellman key agreement protocol and malicious standards Boaz Tsaban
2005/229 (PDF ) Basic Theory in Construction of Boolean Functions with Maximum Possible Annihilator Immunity Deepak Kumar Dalai, Subhamoy Maitra, Sumanta Sarkar
2005/228 (PDF ) Efficient Doubling on Genus 3 Curves over Binary Fields Xinxin Fan, Thomas Wollinger, Yumin Wang
2005/227 (PDF ) Threshold Ring Signatures Efficient for Large Sets of Signers K. Maneva-Jakimoska, G. Jakimoski, M. Burmester
2005/226 (PDF ) Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme Liqun Chen, Zhaohui Cheng
2005/225 (PDF ) Minimality of the Hamming Weight of the \tau-NAF for Koblitz Curves and Improved Combination with Point Halving Roberto M. Avanzi, Clemens Heuberger, Helmut Prodinger
2005/224 (PDF ) An Efficient ID-KEM Based On The Sakai-Kasahara Key Construction L. Chen, Z. Cheng, J. Malone-Lee, N. P. Smart
2005/223 (PDF ) Diffie-Hellman Key Exchange Protocol, Its Generalization and Nilpotent Groups Ayan Mahalanobis
2005/222 (PDF ) Efficient Comb Elliptic Curve Multiplication Methods Resistant to Power Analysis Min Feng, Bin B. Zhu, Maozhi Xu, Shipeng Li
2005/221 (PDF ) Constant Round Dynamic Group Key Agreement Ratna Dutta, Rana Barua
2005/220 (PDF ) Limits of the Cryptographic Realization of Dolev-Yao-style XOR Michael Backes, Birgit Pfitzmann
2005/219 (PDF ) Cryptanalysis of a 32-bit RC4-like Stream Cipher Hongjun Wu
2005/218 (PDF ) The conjugacy problem and related problems in lattice-ordered groups W. Charles Holland, Boaz Tsaban
2005/217 (PDF ) Efficient Identity-Based Key Encapsulation to Multiple Parties M. Barbosa, P. Farshim
2005/216 (PDF ) A Secret Sharing Scheme for Preventing the Cheaters from Acquiring the Secret Hassan Jameel, Sungyoung Lee
2005/215 (PDF ) Reconciling CA-Oblivious Encryption, Hidden Credentials, OSBE and Secret Handshakes Jason E. Holt
2005/214 (PDF ) TMTO With Multiple Data: Analysis and New Single Table Trade-offs Sourav Mukhopadhyay, Palash Sarkar
2005/212 (PDF ) Probability distributions of Correlation and Differentials in Block Ciphers Joan Daemen, Vincent Rijmen
2005/211 (PDF ) Games and the Impossibility of Realizable Ideal Functionality Anupam Datta, Ante Derek, John C. Mitchell, Ajith Ramanathan, Andre Scedrov
2005/210 (PDF ) The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function John Black
2005/209 (PDF ) Comments on Weaknesses in Two Group Diffie-Hellman Key Exchange Protocols Jin Wook Byun, Dong Hoon Lee
2005/207 (PDF ) Some Thoughts on Time-Memory-Data Tradeoffs Alex Biryukov
2005/206 (PDF ) On Session Key Construction in Provably-Secure Key Establishment Protocols: Revisiting Chen & Kudla (2003) and McCullagh & Barreto (2005) ID-Based Protocols Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock
2005/205 (PDF ) Another look at HMQV Alfred Menezes
2005/204 (PDF ) An Algebraic Masking Method to Protect AES Against Power Attacks Nicolas Courtois, Louis Goubin
2005/203 (PDF ) On Exact Algebraic [Non-]Immunity of S-boxes Based on Power Functions Nicolas Courtois, Blandine Debraize, Eric Garrido
2005/202 (PDF ) The Best Differential Characteristics and Subtleties of the Biham-Shamir Attacks on DES Nicolas Courtois
2005/201 (PDF ) On Security Proof of McCullagh-Barreto's Key Agreement Protocol and its Variants Zhaohui Cheng, Liqun Chen
2005/200 (PDF ) Block ciphers sensitive to Groebner Basis Attacks Johannes Buchmann, Andrei Pychkine, Ralf-Philipp Weinmann
2005/198 (PDF ) Universally Composable Time-Stamping Schemes with Audit Ahto Buldas, Peeter Laud, Märt Saarepera, Jan Willemson
2005/197 (PDF ) Weaknesses in two group Diffie-Hellman key exchange protocols Qiang Tang, Liqun Chen
2005/196 (PDF ) Universally Composable Password-Based Key Exchange Ran Canetti, Shai Halevi, Jonathan Katz, Yehuda Lindell, Philip MacKenzie
2005/195 (PDF ) Twin RSA Arjen K. Lenstra, Benjamin M. M. de Weger
2005/194 (PDF ) Primal-Dual Distance Bounds of Linear Codes with Application to Cryptography Ryutaroh Matsumoto, Kaoru Kurosawa, Toshiya Itoh, Toshimitsu Konno, Tomohiko Uyematsu
2005/193 (PDF ) VSH, an Efficient and Provable Collision Resistant Hash Function Scott Contini, Arjen K. Lenstra, Ron Steinfeld
2005/192 (PDF ) On the security and the efficiency of the Merkle signature scheme Carlos Coronado
2005/191 (PDF ) Public Key Encryption with Keyword Search Revisited Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
2005/190 (PDF ) Security Proof of "Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA" SeongHan Shin, Kazukuni Kobara, Hideki Imai
2005/189 (PDF ) A Weak-Randomizer Attack on RSA-OAEP with e = 3 Daniel R. L. Brown
2005/188 (PDF ) Group Signature where Group Manager, Members and Open Authority are Identity-Based Victor K. Wei, Tsz Hon Yuen, Fangguo Zhang
2005/187 (PDF ) How To Exchange Secrets with Oblivious Transfer Michael O. Rabin
2005/185 (PDF ) Security properties of two provably secure conference key agreement protocols Qiang Tang, Chris J. Mitchell
2005/184 (PDF ) Recursive Constructions of Secure Codes and Hash Families Using Difference Function Families Dongvu Tonien, Reihaneh Safavi-Naini
2005/183 (PDF ) PEKE, Probabilistic Encryption Key Exchange, 10 Years Later, Including the PEKEv1.25 Specifications Thierry Moreau
2005/182 (PDF ) Cryptanalysis on Chang-Yang-Hwang Protected Password Change Protocol Chih-I Wang, Chun-I Fan, D. J. Guan
2005/181 (PDF ) A plausible approach to computer-aided cryptographic proofs Shai Halevi
2005/180 (PDF ) A Note on Secure Key Issuing in ID-based Cryptography XU Chunxiang, ZHOU Junhui, QIN Zhiguang
2005/179 (PDF ) Intrusion-Resilience via the Bounded-Storage Model Stefan Dziembowski
2005/178 (PDF ) Analyzing Unlinkability of Some Group Signatures Zhou Sujing, Lin Dongdai
2005/177 (PDF ) Secret sharing on the $d$-dimensional cube Laszlo Csirmaz
2005/176 (PDF ) HMQV: A High-Performance Secure Diffie-Hellman Protocol Hugo Krawczyk
2005/175 (PDF ) A 32-bit RC4-like Keystream Generator Yassir Nawaz, Kishan Chand Gupta, Guang Gong
2005/174 (PDF ) On the Automatic Construction of Indistinguishable Operations Manuel Barbosa, Dan Page
2005/173 (PDF ) Weaknesses in a leakage-resilient authenticated key transport protocol Qiang Tang, Chris J. Mitchell
2005/171 (PDF ) Towards computationally sound symbolic analysis of key exchange protocols Prateek Gupta, Vitaly Shmatikov
2005/170 (PDF ) Unclonable Group Identification Ivan Damgård, Kasper Dupont, Michael Østergaard Pedersen
2005/169 (PDF ) Enforcing Confinement in Distributed Storage and a Cryptographic Model for Access Control Shai Halevi, Paul A. Karger, Dalit Naor
2005/168 (PDF ) Dynamic k-Times Anonymous Authentication Lan Nguyen, Rei Safavi-Naini
2005/166 (PDF ) Tate pairing computation on the divisors of hyperelliptic curves for cryptosystems Eunjeong Lee, Yoonjin Lee
2005/165 (PDF ) CRYPTOGRAPHIC MERSENNE TWISTER AND FUBUKI STREAM/BLOCK CIPHER Makoto Matsumoto, Takuji Nishimura, Mariko Hagita, Mutsuo Saito
2005/164 (PDF ) A Distinguish attack on COSvd Ciphers Mohammad Ali Orumiehchi ha, Dr. R. Mirghadri
2005/163 (PDF ) Modeling Insider Attacks on Group Key-Exchange Protocols Jonathan Katz, Ji Sun Shin
2005/162 (PDF ) A Provably Secure and Efficient Verifiable Shuffle based on a Variant of the Paillier Cryptosystem Lan Nguyen, Rei Safavi-Naini, Kaoru Kurosawa
2005/161 (PDF ) Multiple forgery attacks against Message Authentication Codes David A. McGrew, Scott R. Fluhrer
2005/160 (PDF ) First Steps Toward a Cryptography-Aware Language and Compiler M. Barbosa, R. Noad, D. Page, N. P. Smart
2005/159 (PDF ) On Constructing Parallel Pseudorandom Generators from One-Way Functions Emanuele Viola
2005/158 (PDF ) Geometric Cryptosystem Arkady Berenstein, Leon Chernyak
2005/157 (PDF ) FOX Algorithm Implementation: a hardware design approach Colm O'Keeffe, Emanuel Popovici
2005/156 (PDF ) On the security of some password-based key agreement schemes Qiang Tang, Chris J. Mitchell
2005/155 (PDF ) Py (Roo): A Fast and Secure Stream Cipher using Rolling Arrays Eli Biham, Jennifer Seberry
2005/154 (PDF ) Secure Stochastic Multi-party Computation for Combinatorial Problems and a Privacy Concept that Explicitely Factors out Knowledge about the Protocol Marius C. Silaghi, Gerhard Friedrich
2005/153 (PDF ) On Security of Koyama Schemes Sahadeo Padhye
2005/152 (PDF ) On High-Rate Cryptographic Compression Functions Richard Ostertag, Martin Stanek
2005/151 (PDF ) Improved Collision Attack on MD4 Yusuke Naito, Yu Sasaki, Noboru Kunihiro, Kazuo Ohta
2005/150 (PDF ) Secure Delegation of Elliptic-Curve Pairing Benoit Chevallier-Mames, Jean-Sebastien Coron, Noel McCullagh, David Naccache, Michael Scott
2005/149 (PDF ) Conditionally Verifiable Signatures Aldar C-F. Chan, Ian F. Blake
2005/148 (PDF ) On Universal Composable Security of Time-Stamping Protocols Toshihiko Matsuo, Shin'ichiro Matsuo
2005/147 (PDF ) Tamper-Evident Digital Signatures: Protecting Certification Authorities Against Malware Jong Youl Choi, Philippe Golle, Markus Jakobsson
2005/146 (PDF ) A High Speed Architecture for Galois/Counter Mode of Operation (GCM) Bo Yang, Sambit Mishra, Ramesh Karri
2005/145 (PDF ) Small Secure Sketch for Point-Set Difference Ee-Chien Chang, Qiming Li
2005/144 (PDF ) Kaweichel, an Extension of Blowfish for 64-Bit Architectures Dieter Schmidt
2005/143 (PDF ) Multiparty Computation Based on Connectivity of Graphs Liangliang Xiao, Mulan Liu, Zhifang Zhang
2005/142 (PDF ) Broadcast Encryption with Random Key Pre-distribution Schemes Mahalingam Ramkumar
2005/141 (PDF ) Enhanced password-based key establishment protocol Qiang Tang, Chris J. Mitchell
2005/140 (PDF ) How to Split a Shared Secret into Shared Bits in Constant-Round Ivan Damgård, Matthias Fitzi, Jesper Buus Nielsen, Tomas Toft
2005/139 (PDF ) Scaling security in pairing-based protocols Michael Scott
2005/138 (PDF ) I-HARPS: An Efficient Key Pre-distribution Scheme Mahalingam Ramkumar
2005/137 (PDF ) A Sender Verifiable Mix-Net and a New Proof of a Shuffle Douglas Wikström
2005/136 (PDF ) Skipping, Cascade, and Combined Chain Schemes for Broadcast Encryption Jung Hee Cheon, Nam-su Jho, Myung-Hwan Kim, Eun Sun Yoo
2005/135 (PDF ) Design of near-optimal pseudorandom functions and pseudorandom permutations in the information-theoretic model Jacques Patarin, Paul Camion
2005/134 (PDF ) Broadcast Authentication With Hashed Random Preloaded Subsets Mahalingam Ramkumar
2005/133 (PDF ) Pairing-Friendly Elliptic Curves of Prime Order Paulo S. L. M. Barreto, Michael Naehrig
2005/132 (PDF ) Formal Notions of Anonymity for Peer-to-peer Networks Jiejun Kong
2005/131 (PDF ) Dynamic Group Key Agreement in Tree-Based Setting Ratna Dutta, Rana Barua
2005/129 (PDF ) On The Indistinguishability-Based Security Model of Key Agreement Protocols-Simple Cases Zhaohui Cheng, Manos Nistazakis, Richard Comley, Luminita Vasiu
2005/127 (PDF ) Browser Model for Security Analysis of Browser-Based Protocols Thomas Groß, Birgit Pfitzmann, Ahmad-Reza Sadeghi
2005/126 (PDF ) On the Statistically Optimal Divide and Conquer Correlation Attack on the Shrinking Generator Shahram Khazaei, Mahmood Salmasizadeh, Javad Mohajeri
2005/125 (PDF ) SPA Resistant Left-to-Right Integer Recodings Nicolas Thériault
2005/124 (PDF ) Append-Only Signatures Eike Kiltz, Anton Mityagin, Saurabh Panjwani, Barath Raghavan
2005/123 (PDF ) Accumulators from Bilinear Pairings and Applications to ID-based Ring Signatures and Group Membership Revocation Lan Nguyen
2005/122 (PDF ) Breaking and Repairing Trapdoor-free Group Signature Schemes from Asiacrypt 2004 Xinyi Huang, Willy Susilo, Yi Mu
2005/121 (PDF ) Pass-thoughts: Authenticating With Our Minds Julie Thorpe, P. C. van Oorschot, Anil Somayaji
2005/120 (PDF ) On Designatedly Verified (Non-interactive) Watermarking Schemes Malapati Raja Sekhar, Takeshi Okamoto, Eiji Okamato
2005/119 (PDF ) Index Calculus in Class Groups of Plane Curves of Small Degree Claus Diem
2005/118 (PDF ) Results on Rotation Symmetric Bent Functions Deepak Kumar Dalai, Subhamoy Maitra
2005/117 (PDF ) Boneh-Franklin Identity Based Encryption Revisited David Galindo
2005/116 (PDF ) On Computable Isomorphisms in Efficient Asymmetric Pairing Based Systems Nigel Smart, Frederik Vercauteren
2005/115 (PDF ) Characteristics of Key-Dependent S-Boxes: the Case of Twofish Marco Macchetti
2005/114 (PDF ) Intrusion-Resilient Secure Channels Gene Itkis, Robert McNerney Jr., Scott W. Russell
2005/113 (PDF ) Partially Fixed Point Multiplication Majid Khabbazian, T. Aaron Gulliver, Vijay K. Bhargava
2005/112 (PDF ) On the relationship between squared pairings and plain pairings Bo Gyeong Kang, Je Hong Park
2005/111 (PDF ) Weak Composite Diffie-Hellman is not Weaker than Factoring Kooshiar Azimian, Javad Mohajeri, Mahmoud Salmasizadeh
2005/110 (PDF ) Diffie-Hellman key exchange protocol and non-abelian nilpotent groups. Ayan Mahalanobis
2005/109 (PDF ) A Public Key Cryptosystem Based on Singular Cubic Curve Sahadeo Padhye
2005/108 (PDF ) Efficient Identity-Based and Authenticated Key Agreement Protocol Yongge Wang
2005/107 (PDF ) A Uniform Framework for Cryptanalysis of the Bluetooth $E_0$ Cipher Ophir Levy, Avishai Wool
2005/106 (PDF ) How To Play Almost Any Mental Game Over The Net --- Concurrent Composition via Super-Polynomial Simulation Boaz Barak, Amit Sahai
2005/105 (PDF ) On Error Correction in the Exponent Chris Peikert
2005/104 (PDF ) On estimating the lattice security of NTRU Nick Howgrave-Graham, Jeff Hoffstein, Jill Pipher, William Whyte
2005/103 (PDF ) Cryptanalysis and improvement of an ID-based ad-hoc anonymous identification scheme at CT-RSA 05 Fangguo Zhang, Xiaofeng Chen
2005/102 (PDF ) Finding MD5 Collisions on a Notebook PC Using Multi-message Modifications Vlastimil Klima
2005/101 (PDF ) Soundness and Completeness of Formal Logics of Symmetric Encryption Gergei Bana
2005/100 (PDF ) almost enumeration of 8-variable bent functions Qingshu Meng, Huanguo Zhang, Jingsong Cui, Min Yang
2005/099 (PDF ) Time-Data-Memory Trade-Off Based Cryptanalysis of Certain Broadcast Encryption Schemes Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai
2005/098 (PDF ) Probabilistic Opacity for a Passive Adversary and its Application to Chaum's Voting Scheme Yassine Lakhnech, Laurent Mazare
2005/097 (PDF ) Computationally Sound Verification of Security Protocols Using Diffie-Hellman Exponentiation Yassine Lakhnech, Laurent Mazare
2005/096 (PDF ) Almost Perfect Nonlinear Monomials over GF($2^n$) for Infinitely Many $n$ David Jedlicka
2005/095 (PDF ) Security and Privacy Issues in E-passports Ari Juels, David Molnar, David Wagner
2005/094 (PDF ) A Survey on ID-Based Cryptographic Primitives M. Choudary Gorantla, Raju Gangishetti, Ashutosh Saxena
2005/093 (PDF ) An ID-Based Key Agreement Scheme from pairing Guohong Xie
2005/092 (PDF ) PRF Domain Extension Using DAGs Charanjit Jutla
2005/091 (PDF ) Distributed Phishing Attacks Markus Jakobsson, Adam Young
2005/090 (PDF ) Rediscovery of Time Memory Tradeoffs Jin Hong, Palash Sarkar
2005/089 (PDF ) Cryptographer's Toolkit for Construction of $8$-Bit Bent Functions Hans Dobbertin, Gregor Leander
2005/088 (PDF ) The MAC function Pelican 2.0 Joan Daemen, Vincent Rijmen
2005/087 (PDF ) AES side channel attack protection using random isomorphisms A. G. Rostovtsev, O. V. Shemyakina
2005/086 (PDF ) Simple Pseudorandom Number Generator with Strengthened Double Encryption (Cilia) Henry Ng
2005/084 (PDF ) On Resistance of DES to Related-Key Differential Cryptanalysis Goce Jakimoski, Yvo Desmedt
2005/083 (PDF ) Security notions for disk encryption Kristian Gjøsteen
2005/082 (PDF ) Some properties of an FSE 2005 Hash Proposal Lars R. Knudsen
2005/080 (PDF ) A QKD Protocol Extendable to Support Entanglement and Reduce Unauthorized Information Gain by Randomizing the Bases Lists with Key Values and Invalidate Explicit Privacy Amplification R. Venkatesh, C. Sanjeevakumar, M. Kasi Rajan, L. Sudarsan, N. Srinivasan
2005/079 (PDF ) Zero-Knowledge Proofs for Mix-nets of Secret Shares and a Version of ElGamal with Modular Homomorphism Marius C Silaghi
2005/078 (PDF ) Duality between Multiplication and Modular Reduction Wieland Fischer, Jean-Pierre Seifert
2005/077 (PDF ) Taxonomy of Public Key Schemes based on the problem of Multivariate Quadratic equations Christopher Wolf, Bart Preneel
2005/076 (PDF ) Pairing-Based Cryptography at High Security Levels Neal Koblitz, Alfred Menezes
2005/075 (PDF ) Finding MD5 Collisions – a Toy For a Notebook Vlastimil Klima
2005/074 (PDF ) Computationally sound implementations of equational theories against passive adversaries Mathieu Baudet, Vëronique Cortier, Steve Kremer
2005/073 (PDF ) BROADCAST ENCRYPTION $\pi$ Nam-Su Jho, Jung Hee Cheon, Myung-Hwan Kim, Eun Sun Yoo
2005/072 (PDF ) Practical Lattice Basis Sampling Reduction Johannes Buchmann, Christoph Ludwig
2005/070 (PDF ) On public-key cryptosystems based on combinatorial group theory Jean-Camille Birget, Spyros S. Magliveras, Michal Sramka
2005/069 (PDF ) Fast Elliptic Curve Point Multiplication using Double-Base Chains V. S. Dimitrov, L. Imbert, P. K. Mishra
2005/068 (PDF ) N-adic Summation-Shrinking Generator. Basic properties and empirical evidences. Zhaneta Tasheva, Borislav Bedzhev, Borislav Stoyanov
2005/067 (PDF ) Colliding X.509 Certificates Arjen Lenstra, Xiaoyun Wang, Benne de Weger
2005/066 (PDF ) Unconditionally Secure Constant Round Multi-Party Computation for Equality, Comparison, Bits and Exponentiation Eike Kiltz
2005/065 (PDF ) Efficient hardware for the Tate pairing calculation in characteristic three T. Kerins, W. P. Marnane, E. M. Popovici, P. S. L. M. Barreto
2005/064 (PDF ) On Efficient Key Agreement Protocols Anish Mathuria, Vipul Jain
2005/061 (PDF ) Key Derivation and Randomness Extraction Olivier Chevassut, Pierre-Alain Fouque, Pierrick Gaudry, David Pointcheval
2005/060 (PDF ) Compact E-Cash Jan Camenisch, Susan Hohenberger, Anna Lysyanskaya
2005/059 (PDF ) Secret sharing schemes on graphs Laszlo Csirmaz
2005/058 (PDF ) Generic Constructions of Identity-Based and Certificateless KEMs K. Bentahar, P. Farshim, J. Malone-Lee, N. P. Smart
2005/057 (PDF ) Tight Reductions among Strong Diffie-Hellman Assumptions Victor K. Wei
2005/056 (PDF ) Deniable Authentication with RSA and Multicasting Daniel R. L. Brown
2005/055 (PDF ) Untraceability of Two Group Signature Schemes Zhengjun Cao
2005/053 (PDF ) An Approach Towards Rebalanced RSA-CRT with Short Public Exponent Hung-Min Sun, Mu-En Wu
2005/052 (PDF ) Picking Virtual Pockets using Relay Attacks on Contactless Smartcard Systems Ziv Kfir, Avishai Wool
2005/051 (PDF ) A Note on Shor's Quantum Algorithm for Prime Factorization Zhengjun Cao
2005/050 (PDF ) David Chaum's Voter Verification using Encrypted Paper Receipts Poorvi L. Vora
2005/049 (PDF ) Adversarial Model for Radio Frequency Identification Gildas Avoine
2005/048 (PDF ) Cryptanalysis of two identification schemes based on an ID-based cryptosystem Qiang Tang, Chris J. Mitchell
2005/047 (PDF ) Cryptanalysis of an anonymous wireless authentication and conference key distribution scheme Qiang Tang, Chris J. Mitchell
2005/046 (PDF ) New Approaches for Deniable Authentication Mario Di Raimondo, Rosario Gennaro
2005/045 (PDF ) Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3 Nick Howgrave-Graham, Joseph H. Silverman, William Whyte
2005/044 (PDF ) On the affine classification of cubic bent functions Sergey Agievich
2005/043 (PDF ) An Efficient Solution to The Millionaires' Problem Based on Homomorphic Encryption Hsiao-Ying Lin, Wen-Guey Tzeng
2005/042 (PDF ) Polyhedrons over Finite Abelian Groups and Their Cryptographic Applications O. A. Logachev, A. A. Salnikov, V. V. Yaschenko
2005/041 (PDF ) On the Security of a Group Signature Scheme with Strong Separability Lihua Liu, Zhengjun Cao
2005/040 (PDF ) Unfairness of a protocol for certified delivery Juan M. Estevez-Tapiador, Almudena Alcaide
2005/039 (PDF ) Distinguishing Stream Ciphers with Convolutional Filters Joan Daemen, Gilles Van Assche
2005/037 (PDF ) Improving Secure Server Performance by Re-balancing SSL/TLS Handshakes Claude Castelluccia, Einar Mykletun, Gene Tsudik
2005/036 (PDF ) Concurrent Composition of Secure Protocols in the Timing Model Yael Kalai, Yehuda Lindell, Manoj Prabhakaran
2005/035 (PDF ) An Efficient CDH-based Signature Scheme With a Tight Security Reduction Benoit Chevallier-Mames
2005/034 (PDF ) Flexible Framework for Secret Handshakes (Multi-Party Anonymous and Un-observable Authentication) Gene Tsudik, Shouhuai Xu
2005/033 (PDF ) An Attack on CFB Mode Encryption As Used By OpenPGP Serge Mister, Robert Zuccherato
2005/032 (PDF ) On the Notion of Statistical Security in Simulatability Definitions Dennis Hofheinz, Dominique Unruh
2005/031 (PDF ) The Vector Decomposition Problem for Elliptic and Hyperelliptic Curves Iwan Duursma, Negar Kiyavash
2005/030 (PDF ) Weak keys of the Diffie Hellman key exchange II : Pairing based schemes on elliptic curves. A. A. Kalele, V. R. Sule
2005/029 (PDF ) A model and architecture for pseudo-random generation with applications to /dev/random Boaz Barak, Shai Halevi
2005/028 (PDF ) Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan Hohenberger
2005/027 (PDF ) Tag-KEM/DEM: A New Framework for Hybrid Encryption Masayuki ABE, Rosario Gennaro, Kaoru Kurosawa
2005/026 (PDF ) Techniques for random maskin in hardware Jovan Dj. Golic
2005/025 (PDF ) Analysis of Affinely Equivalent Boolean Functions Meng Qing-shu, Yang min, Zhang Huan-guo, Liu Yu-zhen
2005/024 (PDF ) Weak keys of the Diffe Hellman key exchange I A. A. Kalele, V. R. Sule
2005/023 (PDF ) A Construction of Public-Key Cryptosystem Using Algebraic Coding on the Basis of Superimposition and Randomness Masao Kasahara
2005/022 (PDF ) An Improved and Efficient Countermeasure against Power Analysis Attacks ChangKyun Kim, JaeCheol Ha, SangJae Moon, Sung-Ming Yen, Wei-Chih Lien, Sung-Hyun Kim
2005/021 (PDF ) Partial Hiding in Public-Key Cryptography Eabhnat N\'ı Fhloinn, Michael Purser
2005/020 (PDF ) (De)Compositions of Cryptographic Schemes and their Applications to Protocols R. Janvier, Y. Lakhnech, L. Mazare
2005/019 (PDF ) The Full Abstraction of the UC Framework Jesüs F. Almansa
2005/018 (PDF ) Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys Dan Boneh, Craig Gentry, Brent Waters
2005/017 (PDF ) Side Channel Attacks on Implementations of Curve-Based Cryptographic Primitives Roberto M. Avanzi
2005/016 (PDF ) Narrow T-functions Magnus Daum
2005/015 (PDF ) Hierarchical Identity Based Encryption with Constant Size Ciphertext Dan Boneh, Xavier Boyen, Eu-Jin Goh
2005/014 (PDF ) A Chosen Ciphertext Attack on a Public Key Cryptosystem Based on Lyndon Words Ludovic Perret
2005/013 (PDF ) Comments: Insider attack on Cheng et al.'s pairing-based tripartite key agreement protocols Hung-Yu Chien
2005/012 (PDF ) Efficient Certificateless Public Key Encryption Zhaohui Cheng, Richard Comley
2005/011 (PDF ) An Improved Elegant Method to Re-initialize Hash Chains Yuanchao Zhao, Daoben Li
2005/010 (PDF ) Update on SHA-1 Vincent Rijmen, Elisabeth Oswald
2005/009 (PDF ) Mixing properties of triangular feedback shift registers Bernd Schomburg
2005/008 (PDF ) Comments on ``Distributed Symmetric Key Management for Mobile Ad hoc Networks" from INFOCOM 2004 J. Wu, R. Wei
2005/007 (PDF ) The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu
2005/006 (PDF ) A Metric on the Set of Elliptic Curves over ${\mathbf F}_p$. Pradeep Kumar Mishra, Kishan Chand Gupta
2005/005 (PDF ) A sufficient condition for key-privacy Shai Halevi
2005/004 (PDF ) Benes and Butterfly schemes revisited Jacques Patarin, Audrey Montreuil
2005/003 (PDF ) Cryptanalysis of Hiji-bij-bij (HBB) Vlastimil Klima
2005/002 (PDF ) Logcrypt: Forward Security and Public Verification for Secure Audit Logs Jason E. Holt, Kent E. Seamons
2005/001 (PDF ) On Obfuscating Point Functions Hoeteck Wee
2004/377 (PDF ) New Distributed Ring Signatures for General Families of Signing Subsets Javier Herranz, Germán Sáez
2004/376 (PDF ) Cryptanalysis of RCES/RSES Image Encryption Scheme Shujun Li, Chengqing Li, Guanrong Chen, Kwok-Tung Lo
2004/375 (PDF ) Efficient Pairing Computation on Supersingular Abelian Varieties Paulo S. L. M. Barreto, Steven Galbraith, Colm O hEigeartaigh, Michael Scott
2004/374 (PDF ) A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks Shujun Li, Chengqing Li, Guanrong Chen, Nikolaos G. Bourbakis, Kwok-Tung Lo
2004/373 (PDF ) Delegateable Signature Using Witness Indistinguishable and Witness Hiding Proofs Chunming Tang, Dingyi Pei, Zhuojun Liu
2004/371 (PDF ) Construction and Traversal of Hash Chain with Public Links Vipul Goyal
2004/370 (PDF ) Tracing-by-Linking Group Signautres Victor K. Wei
2004/369 (PDF ) SCA1 Model: Towards a concrete security approach to the design of cryptosystems secure against side-channel attacks Filipe Rosado da-Fonseca
2004/368 (PDF ) Cryptographic Asynchronous Multi-Party Computation with Optimal Resilience Martin Hirt, Jesper Buus Nielsen, Bartosz Przydatek
2004/367 (PDF ) On the Affine Transformations of HFE-Cryptosystems and Systems with Branches Patrick Felke
2004/366 (PDF ) Piece In Hand Concept for Enhancing the Security of Multivariate Type Public Key Cryptosystems: Public Key Without Containing All the Information of Secret Key Shigeo Tsujii, Kohtaro Tadaki, Ryou Fujita
2004/365 (PDF ) Ordinary abelian varieties having small embedding degree Steven D. Galbraith, J. McKee, P. Valenca
2004/364 (PDF ) Finding good differential patterns for attacks on SHA-1 Krystian Matusiewicz, Josef Pieprzyk
2004/363 (PDF ) Rethinking the security of some authenticated group key agreement schemes Qiang Tang, Chris J. Mitchell
2004/362 (PDF ) A new security proof for Damgård's ElGamal Kristian Gjøsteen
2004/361 (PDF ) Superfluous Keys in Multivariate Quadratic Asymmetric Systems Christopher Wolf, Bart Preneel
2004/360 (PDF ) Equivalent Keys in HFE, C$^*$, and variations Christopher Wolf, Bart Preneel
2004/359 (PDF ) Secure Computation of the Mean and Related Statistics Eike Kiltz, Gregor Leander, John Malone-Lee
2004/358 (PDF ) Reusable Cryptographic Fuzzy Extractors Xavier Boyen
2004/357 (PDF ) MD5 To Be Considered Harmful Someday Dan Kaminsky
2004/356 (PDF ) Practical Attacks on Digital Signatures Using MD5 Message Digest Ondrej Mikle
2004/355 (PDF ) A Small-Scale Voting Protocol Hiding Vote-Counts of All Candidates Pei-yih Ting, Po-Yueh Hung
2004/354 (PDF ) Classes of Plateaued Rotation Symmetric Boolean Functions under Transformation of Walsh Spectra Alexander Maximov
2004/353 (PDF ) Direct Division in Factor Rings Patrick Fitzpatrick, Christopher Wolf
2004/352 (PDF ) Practical Cryptography in High Dimensional Tori Marten van Dijk, Robert Granger, Dan Page, Karl Rubin, Alice Silverberg, Martijn Stam, David Woodruff
2004/350 (PDF ) Multivariable public--key cryptosystems Jintai Ding, Dieter Schmidt
2004/349 (PDF ) A DPA Attack on the Improved Ha-Moon Algorithm Dong Jin PARK, Pil Joong LEE
2004/348 (PDF ) A weakness in Sun-Chen-Hwang's three-party key agreement protocols using passwords Junghyun Nam, Seungjoo Kim, Dongho Won
2004/347 (PDF ) Addendum to ``On the Generalized Linear Equivalence of Functions over Finite Fields'' Marco Macchetti
2004/346 (PDF ) Random Switching Logic: A Countermeasure against DPA based on Transition Probability Daisuke Suzuki, Minoru Saeki, Tetsuya Ichikawa
2004/345 (PDF ) On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock, Greg Maitland
2004/344 (PDF ) Modified Parameter Attacks: Practical Attacks against CCA2 Secure Cryptosystems and Countermeasures Nick Howgrave-Graham, Joseph H. Silverman, Ari Singer, William Whyte
2004/343 (PDF ) Revisit Of McCullagh--Barreto Two-Party ID-Based Authenticated Key Agreement Protocols Kim-Kwang Raymond Choo
2004/342 (PDF ) A comb method to render ECC resistant against Side Channel Attacks Mustapha Hedabou, Pierre Pinel, Lucien Bénéteau
2004/341 (PDF ) Reducing Complexity Assumptions for Statistically-Hiding Commitment Omer Horvitz, Jonathan Katz, Chiu-Yuen Koo, Ruggero Morselli
2004/340 (PDF ) Request for Review of Key Wrap Algorithms Morris Dworkin
2004/339 (PDF ) Divisors in Residue Classes, Constructively Don Coppersmith, Nick Howgrave-Graham, S. V. Nagaraj
2004/338 (PDF ) Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, Hideki Imai
2004/337 (PDF ) Security on Generalized Feistel Scheme with SP Round Function Wu Wenling, Zhang Wentao, Lin Dongdai
2004/336 (PDF ) Oblivious Transfer Is Symmetric Stefan Wolf, Jürg Wullschleger
2004/335 (PDF ) Statistical Zero-Knowledge Arguments for NP Using Approximable-Preimage-Size One-Way Functions Haitner Iftach, Shaltiel Ronen
2004/334 (PDF ) Universally Composable Symbolic Analysis of Cryptographic Protocols (The case of encryption-based mutual authentication and key exchange) Ran Canetti, Jonathan Herzog
2004/333 (PDF ) Secure Multi-party Computation for selecting a solution according to a uniform distribution over all solutions of a general combinatorial problem Marius-Calin Silaghi
2004/332 (PDF ) Sequences of games: a tool for taming complexity in security proofs Victor Shoup
2004/331 (PDF ) Code-Based Game-Playing Proofs and the Security of Triple Encryption Mihir Bellare, Phillip Rogaway
2004/330 (PDF ) Multicollision Attacks on Generalized Hash Functions M. Nandi, D. R. Stinson
2004/329 (PDF ) Hardness amplification of weakly verifiable puzzles Ran Canetti, Shai Halevi, Michael Steiner
2004/327 (PDF ) Efficient Identity Based Ring Signature Sherman S. M. Chow, S. M. Yiu, Lucas C. K. Hui
2004/326 (PDF ) Cryptanalysis of Qiu-Gu-Chen Variant Group Signature Scheme Zhengjun Cao
2004/325 (PDF ) Complexity of the Collision and Near-Collision Attack on SHA-0 with Different Message Schedules Mitsuhiro HATTORI, Shoichi HIROSE, Susumu YOSHIDA
2004/324 (PDF ) On a Probabilistic Approach to the Security Analysis of Cryptographic Hash Functions G. Laccetti, G. Schmid
2004/323 (PDF ) A note on López-Dahab coordinates Tanja Lange
2004/322 (PDF ) Separable and Anonymous Identity-Based Key Issuing Ai-fen Sui, Sherman S. M. Chow, Lucas C. K. Hui, S. M. Yiu, K. P. Chow, W. W. Tsang, C. F. Chong, K. H. Pun, H. W. Chan
2004/321 (PDF ) The conjugacy search problem in public key cryptography: unnecessary and insufficient Vladimir Shpilrain, Alexander Ushakov
2004/320 (PDF ) Upper Bounds for the Selection of the Cryptographic Key Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults Alfonso De Gregorio
2004/319 (PDF ) Badger - A Fast and Provably Secure MAC Martin Boesgaard, Ove Scavenius, Thomas Pedersen, Thomas Christensen, Erik Zenner
2004/318 (PDF ) Upper Bounds on the Communication Complexity of Optimally Resilient Cryptographic Multiparty Computation Martin Hirt, Jesper Buus Nielsen
2004/317 (PDF ) Adaptively-Secure, Non-Interactive Public-Key Encryption Ran Canetti, Shai Halevi, Jonathan Katz
2004/316 (PDF ) On a Threshold Group Signature Scheme and a Fair Blind Signature Scheme Zhengjun Cao
2004/315 (PDF ) Security Arguments for Partial Delegation with Warrant Proxy Signature Schemes Qin Wang, Zhenfu Cao
2004/314 (PDF ) A Technical Comparison of IPSec and SSL AbdelNasir Alshamsi, Takamichi Saito
2004/313 (PDF ) Cryptanalysis of a threshold proxy signature with known signers Fuw-Yi Yang, Jinn-Ke Jan, Woei-Jiunn Jeng
2004/312 (PDF ) Ramanujan Graphs and the Random Reducibility of Discrete Log on Isogenous Elliptic Curves David Jao, Stephen D. Miller, Ramarathnam Venkatesan
2004/311 (PDF ) Hierarchical Group Signatures Marten Trolin, Douglas Wikstrom
2004/310 (PDF ) A Verifiable Random Function With Short Proofs and Keys Yevgeniy Dodis, Aleksandr Yampolskiy
2004/309 (PDF ) The Power of Verification Queries in Message Authentication and Authenticated Encryption Mihir Bellare, Oded Goldreich, Anton Mityagin
2004/308 (PDF ) Cryptanalysis of Noel McCullagh and Paulo S. L. M. Barreto¡¯s two-party identity-based key agreement Guohong Xie
2004/307 (PDF ) Universal Forgeability of Wang-Wu-Wang Key-Insulated Signature Scheme Zhengjun Cao
2004/306 (PDF ) The Static Diffie-Hellman Problem Daniel R. L. Brown, Robert P. Gallant
2004/305 (PDF ) A note on efficient computation of cube roots in characteristic 3 Paulo S. L. M. Barreto
2004/304 (PDF ) Second Preimages on n-bit Hash Functions for Much Less than 2^n Work John Kelsey, Bruce Schneier
2004/303 (PDF ) Efficient Tate Pairing Computation for Supersingular Elliptic Curves over Binary Fields Soonhak Kwon
2004/302 (PDF ) Security of Wang-Li Threshold Signature Scheme Lifeng Guo
2004/301 (PDF ) VMPC-MAC: A Stream Cipher Based Authenticated Encryption Scheme Bartosz Zoltak
2004/300 (PDF ) Relating Symbolic and Cryptographic Secrecy Michael Backes, Birgit Pfitzmann
2004/299 (PDF ) Security Flaws in a Pairing-based Group Signature Scheme Zhengjun Cao, Sherman S. M. Chow
2004/298 (PDF ) Nominative Proxy Signature Schemes Zuo-Wen Tan, Zhuo-Jun Liu
2004/297 (PDF ) Post-Quantum Signatures Johannes Buchmann, Carlos Coronado, Martin Döring, Daniela Engelbert, Christoph Ludwig, Raphael Overbeck, Arthur Schmidt, Ulrich Vollmer, Ralf-Philipp Weinmann
2004/296 (PDF ) Designs of Efficient Secure Large Hash Values Mridul Nandi
2004/295 (PDF ) An Access Control Scheme for Partially Ordered Set Hierarchy with Provable Security Jiang Wu, Ruizhong Wei
2004/294 (PDF ) Solving Systems of Differential Equations of Addition and Cryptanalysis of the Helix Cipher Souradyuti Paul, Bart Preneel
2004/293 (PDF ) Provably Secure Authentication of Digital Media Through Invertible Watermarks Jana Dittmann, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith
2004/292 (PDF ) Asynchronous Proactive RSA Ruishan Zhang, Kefei Chen
2004/291 (PDF ) The Rabbit Stream Cipher - Design and Security Analysis Martin Boesgaard, Thomas Pedersen, Mette Vesterager, Erik Zenner
2004/290 (PDF ) The Security of the FDH Variant of Chaum's Undeniable Signature Scheme Wakaha Ogata, Kaoru Kurosawa, Swee-Huay Heng
2004/289 (PDF ) Fault attack on the DVB Common Scrambling Algorithm Kai Wirt
2004/287 (PDF ) Almost Ideal Contrast Visual Cryptography with Reversing Duong Quang Viet, Kaoru Kurosawa
2004/286 (PDF ) Generalized compact knapsacks, cyclic lattices, and efficient one-way functions from worst-case complexity assumptions Daniele Micciancio
2004/285 (PDF ) Generation of random Picard curves for cryptography Annegret Weng
2004/284 (PDF ) ON THE DEGREE OF HOMOGENEOUS BENT FUNCTIONS Qingshu Meng, Huanguo Zhang, Min Yang, Jingsong Cui
2004/283 (PDF ) Fault and Side-Channel Attacks on Pairing Based Cryptography D. Page, F. Vercauteren
2004/282 (PDF ) New Monotone Span Programs from Old Ventzislav Nikov, Svetla Nikova
2004/281 (PDF ) Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation Patrick P. Tsang, Victor K. Wei
2004/280 (PDF ) Cryptanalysis of Park-Lee Nominative Proxy Signature Scheme Zhengjun Cao
2004/279 (PDF ) Parallel Montgomery Multiplication in $GF(2^k)$ using Trinomial Residue Arithmetic Jean-Claude Bajard, Laurent Imbert, Graham A. Jullien
2004/278 (PDF ) The Extended Codebook (XCB) Mode of Operation David A. McGrew, Scott R. Fluhrer
2004/277 (PDF ) Experimenting with Faults, Lattices and the DSA David Naccache, Phong Q. Nguyen, Michael Tunstall, Claire Whelan
2004/276 (PDF ) Improving the algebraic immunity of resilient and nonlinear functions and constructing bent functions C. Carlet
2004/275 (PDF ) An e-Voting Scheme with Improved Resistance to Bribe and Coercion Wei-Chi Ku, Chun-Ming Ho
2004/274 (PDF ) A NOVEL ALGORITHM ENUMERATING BENT FUNCTIONS Meng Qing-shu, Yang min, Zhang huan-guo, Cui jing-song
2004/273 (PDF ) Cryptanalysis of Threshold-Multisignature schemes Lifeng Guo
2004/272 (PDF ) A Characterization of Authenticated-Encryption as a Form of Chosen-Ciphertext Security Tom Shrimpton
2004/271 (PDF ) The Mundja Streaming MAC Philip Hawkes, Michael Paddon, Gregory G. Rose
2004/270 (PDF ) An Enhanced and Secure Protocol for Authenticated Key Exchange Fuw-Yi Yang, Jinn-Ke Jan
2004/269 (PDF ) Cryptanalysis of Threshold-Multisignature Schemes Lifeng Guo
2004/268 (PDF ) Untraceability of Wang-Fu Group Signature Scheme Zhengjun Cao, Lihua Liu
2004/267 (PDF ) Separable Linkable Threshold Ring Signatures Patrick P. Tsang, Victor K. Wei, Tony K. Chan, Man Ho Au, Joseph K. Liu, Duncan S. Wong
2004/266 (PDF ) A New Minimal Average Weight Representation for Left-to-Right Point Multiplication Methods M. Khabbazian, T. A. Gulliver
2004/265 (PDF ) sSCADA: Securing SCADA Infrastructure Communications Yongge Wang, Bei-Tseng Chu
2004/264 (PDF ) Musings on the Wang et al. MD5 Collision Philip Hawkes, Michael Paddon, Gregory G. Rose
2004/263 (PDF ) Applications of $\mathcal{M}$ultivariate $\mathcal{Q}$uadratic Public Key Systems Christopher Wolf, Bart Preneel
2004/262 (PDF ) Universal Forgeability of a Forward-Secure Blind Signature Scheme Proposed by Duc et al. Lihua Liu, Zhengjun Cao
2004/261 (PDF ) Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption Dan Boneh, Jonathan Katz
2004/260 (PDF ) Secure Group Communications over Combined Wired/Wireless Networks Junghyun Nam, Seungjoo Kim, Hyungkyu Yang, Dongho Won
2004/259 (PDF ) On Boolean Functions with Generalized Cryptographic Properties An Braeken, Ventzislav Nikov, Svetla Nikova, Bart Preneel
2004/258 (PDF ) Escrow-Free Encryption Supporting Cryptographic Workflow S. S. Al-Riyami, J. Malone-Lee, N. P. Smart
2004/257 (PDF ) A Weakness in Jung-Paeng-Kim's ID-based Conference Key Distribution Scheme Junghyun Nam, Seungjoo Kim, Dongho Won
2004/256 (PDF ) On the supports of the Walsh transforms of Boolean functions Claude Carlet, Sihem Mesnager
2004/255 (PDF ) A Complete Divisor Class Halving Algorithm for Hyperelliptic Curve Cryptosystems of Genus Two Izuru Kitamura, Masanobu Katagi, Tsuyoshi Takagi
2004/254 (PDF ) New paradigms for digital generation and post-processing of random data Jovan Dj. Golic
2004/253 (PDF ) Design Principles for Iterated Hash Functions Stefan Lucks
2004/252 (PDF ) Security Proofs for Identity-Based Identification and Signature Schemes Mihir Bellare, Chanathip Namprempre, Gregory Neven
2004/251 (PDF ) Attacks on Bresson-Chevassut-Essiari-Pointcheval's Group Key Agreement Scheme for Low-Power Mobile Devices Junghyun Nam, Seungjoo Kim, Dongho Won
2004/250 (PDF ) Identity Based Threshold Proxy Signature Jing Xu, Zhenfeng Zhang, Dengguo Feng
2004/249 (PDF ) Attacks On An ISO/IEC 11770-2 Key Establishment Protocol Zhaohui Cheng, Richard Comley
2004/248 (PDF ) Classification of Boolean Functions of 6 Variables or Less with Respect to Cryptographic Properties An Braeken, Yuri Borissov, Svetla Nikova, Bart Preneel
2004/247 (PDF ) Vectorial fast correlation attacks Jovan Dj. Golic, Guglielmo Morgari
2004/246 (PDF ) Upper and Lower Bounds on Black-Box Steganography Nenad Dedic, Gene Itkis, Leonid Reyzin, Scott Russell
2004/245 (PDF ) On codes, matroids and secure multi-party computation from linear secret sharing schemes Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge Jimenez Urroz, Gregor Leander, Jaume Marti-Farre, Carles Padro
2004/244 (PDF ) Signcryption in Hierarchical Identity Based Cryptosystem Sherman S. M. Chow, Tsz Hon Yuen, Lucas C. K. Hui, S. M. Yiu
2004/243 (PDF ) On the Key Exposure Problem in Chameleon Hashes Giuseppe Ateniese, Breno de Medeiros
2004/242 (PDF ) Combinatorial group theory and public key cryptography Vladimir Shpilrain, Gabriel Zapata
2004/241 (PDF ) A Comparison of Point Counting methods for Hyperelliptic Curves over Prime Fields and Fields of Characteristic 2 Colm O hEigeartaigh
2004/240 (PDF ) A Weil Descent Attack against Elliptic Curve Cryptosystems over Quartic Extension Fields Seigo Arita, Kazuto Matsuo, Koh-ichi Nagao, Mahoro Shimura
2004/239 (PDF ) Geometric Key Establishment Arkady Berenstein, Leon Chernyak
2004/238 (PDF ) Security Analysis of A Dynamic ID-based Remote User Authentication Scheme Amit K Awasthi, Sunder Lal
2004/237 (PDF ) Efficient Cryptanalysis of RSE(2)PKC and RSSE(2)PKC Christopher Wolf, An Braeken, Bart Preneel
2004/236 (PDF ) Forgery Attacks on Chang et al.'s signature scheme with message recovery FU Xiaotong, XU Chunxiang, XIAO Guozhen
2004/235 (PDF ) Cryptographic Implications of Hess' Generalized GHS Attack Alfred Menezes, Edlyn Teske
2004/234 (PDF ) On the security of some nonrepudiable threshold proxy signature schemes with known signers Zuo-Wen Tan, Zhuo-Jun Liu
2004/233 (PDF ) Password-Based Authenticated Key Exchange in the Three-Party Setting Michel Abdalla, Pierre-Alain Fouque, David Pointcheval
2004/232 (PDF ) Extending the Resynchronization Attack Frederik Armknecht, Joseph Lano, Bart Preneel
2004/231 (PDF ) Timed-Release and Key-Insulated Public Key Encryption Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan Osipkov
2004/230 (PDF ) A Provable Secure Scheme for Partially Blind Signatures Fuw-Yi Yang, Jinn-Ke Jan
2004/229 (PDF ) Secure Direct Communication Using Quantum Calderbank-Shor-Steane Codes Xin Lu, Zhi Ma, Dengguo Feng
2004/228 (PDF ) DISTRIBUTION OF R-PATTERNS IN THE KERDOCK-CODE BINARY SEQUENCES AND THE HIGHEST LEVEL SEQUENCES OF PRIMITIVE SEQUENCES OVER $Z_{2^l}$ Honggang Hu, Dengguo Feng
2004/227 (PDF ) Sign Change Fault Attacks On Elliptic Curve Cryptosystems Johannes Blömer, Martin Otto, Jean-Pierre Seifert
2004/226 (PDF ) Lower Bounds for Non-Black-Box Zero Knowledge Boaz Barak, Yehuda Lindell, Salil Vadhan
2004/225 (PDF ) Vectorial Boolean functions and induced algebraic equations Jovan Dj. Golic
2004/224 (PDF ) The Polynomial Composition Problem in (Z/nZ)[X] Marc Joye, David Naccache, Stephanie Porte
2004/223 (PDF ) Inversion-Free Arithmetic on Genus 3 Hyperelliptic Curves Xinxin Fan, Yumin Wang
2004/222 (PDF ) A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes An Braeken, Christopher Wolf, Bart Preneel
2004/221 (PDF ) Towards Plaintext-Aware Public-Key Encryption without Random Oracles Mihir Bellare, Adriana Palacio
2004/220 (PDF ) On Oleshchuk's Public Key Cryptosystem Heiko Stamer, Friedrich Otto
2004/219 (PDF ) Entropic Security and the Encryption of High Entropy Messages Yevgeniy Dodis, Adam Smith
2004/218 (PDF ) Plaintext-Simulatability Eiichiro Fujisaki
2004/217 (PDF ) Cryptanalyzing the Polynomial-Reconstruction based Public-Key System Under Optimal Parameter Choice Aggelos Kiayias, Moti Yung
2004/216 (PDF ) Tree Parity Machine Rekeying Architectures Markus Volkmer, Sebastian Wallner
2004/215 (PDF ) Transitive Signatures: New Schemes and Proofs Mihir Bellare, Gregory Neven
2004/214 (PDF ) Classification of Highly Nonlinear Boolean Power Functions with a Randomised Algorithm for Checking Normality An Braeken, Christopher Wolf, Bart Preneel
2004/213 (PDF ) Cryptanalysis of Chang et al.'s Signature Scheme with Message Recovery Fangguo Zhang
2004/212 (PDF ) ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption Danfeng Yao, Nelly Fazio, Yevgeniy Dodis, Anna Lysyanskaya
2004/211 (PDF ) Scalable, Server-Passive, User-Anonymous Timed Release Public Key Encryption from Bilinear Pairing Ian F. Blake, Aldar C-F. Chan
2004/210 (PDF ) Hybrid Cryptography Alexander W. Dent
2004/209 (PDF ) The Security and Efficiency of Micciancio's Cryptosystem Christoph Ludwig
2004/208 (PDF ) Deterministic Polynomial Time Equivalence of Computing the RSA Secret Key and Factoring Jean-Sebastien Coron, Alexander May
2004/207 (PDF ) On Corrective Patterns for the SHA-2 Family Philip Hawkes, Michael Paddon, Gregory G. Rose
2004/206 (PDF ) ID-Based Proxy Signature Using Bilinear Pairings Jing Xu, Zhenfeng Zhang, Dengguo Feng
2004/205 (PDF ) Direct Anonymous Attestation Ernie Brickell, Jan Camenisch, Liqun Chen
2004/204 (PDF ) Authenticated tree parity machine key exchange Markus Volkmer, Andre Schaumburg
2004/203 (PDF ) How to Cheat at Chess: A Security Analysis of the Internet Chess Club John Black, Martin Cochran, Ryan Gardner
2004/202 (PDF ) Covering Radius of the $(n-3)$-rd Order Reed-Muller Code in the Set of Resilient Functions Yuri Borissov, An Braeken, Svetla Nikova
2004/201 (PDF ) Non-Interactive and Information-Theoretic Secure Publicly Verifiable Secret Sharing Chunming Tang, Dingyi Pei, Zhuojun Liu, Yong He
2004/200 (PDF ) On Cheating Immune Secret Sharing An Braeken, Svetla Nikova, Ventzislav Nikov
2004/199 (PDF ) Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD Xiaoyun Wang, Dengguo Feng, Xuejia Lai, Hongbo Yu
2004/198 (PDF ) Long Modular Multiplication for Cryptographic Applications Laszlo Hars
2004/197 (PDF ) SPA-based attack against the modular reduction within a partially secured RSA-CRT implementation Helmut Kahl
2004/196 (PDF ) Password Based Key Exchange with Mutual Authentication Shaoquan Jiang, Guang Gong
2004/195 (PDF ) Signed Binary Representations Revisited Katsuyuki Okeya, Katja Schmidt-Samoa, Christian Spahn, Tsuyoshi Takagi
2004/194 (PDF ) A Note on An Encryption Scheme of Kurosawa and Desmedt Rosario Gennaro, Victor Shoup
2004/193 (PDF ) The Security and Performance of the Galois/Counter Mode of Operation (Full Version) David A. McGrew, John Viega
2004/191 (PDF ) Scalar Multiplication in Elliptic Curve Cryptosystems: Pipelining with Pre-computations Pradeep Kumar Mishra
2004/190 (PDF ) Distributed Ring Signatures for Identity-Based Scenarios Javier Herranz, Germán Sáez
2004/189 (PDF ) Computing Modular Polynomials Denis Charles, Kristin Lauter
2004/188 (PDF ) Grey Box Implementation of Block Ciphers Preserving the Confidentiality of their Design Vincent Carlier, Hervé Chabanne, Emmanuelle Dottax
2004/187 (PDF ) Parallel FPGA Implementation of RSA with Residue Number Systems - Can side-channel threats be avoided? - Extended version Mathieu Ciet, Michael Neve, Eric Peeters, Jean-Jacques Quisquater
2004/185 (PDF ) On the Existence of low-degree Equations for Algebraic Attacks Frederik Armknecht
2004/184 (PDF ) ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings Amit K Awasthi, Sunder Lal
2004/183 (PDF ) A New Forward Secure Signature Scheme Bo Gyeong Kang, Je Hong Park, Sang Geun Hahn
2004/182 (PDF ) Simpler Session-Key Generation from Short Random Passwords Minh-Huyen Nguyen, Salil Vadhan
2004/181 (PDF ) On the Composition of Authenticated Byzantine Agreement Yehuda Lindell, Anna Lysyanskaya, Tal Rabin
2004/180 (PDF ) Efficient Identity-Based Encryption Without Random Oracles Brent R. Waters
2004/179 (PDF ) Identity Based Threshold Ring Signature Sherman S. M. Chow, Lucas C. K. Hui, S. M. Yiu
2004/178 (PDF ) Optimal Updating of Ideal Threshold Schemes S. G. Barwick, W. -A. Jackson, K. M. Martin, C. M. O'Keefe
2004/177 (PDF ) Updating the Parameters of a Threshold Scheme by Minimal Broadcast S. G. Barwick, W. -A. Jackson, K. M. Martin
2004/176 (PDF ) A Biometric Identity Based Signature Scheme Andrew Burnett, Adam Duffy, Tom Dowling
2004/175 (PDF ) A Proof of Yao's Protocol for Secure Two-Party Computation Yehuda Lindell, Benny Pinkas
2004/174 (PDF ) Short Group Signatures Dan Boneh, Xavier Boyen, Hovav Shacham
2004/173 (PDF ) Secure Identity Based Encryption Without Random Oracles Dan Boneh, Xavier Boyen
2004/172 (PDF ) Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles Dan Boneh, Xavier Boyen
2004/171 (PDF ) Short Signatures Without Random Oracles Dan Boneh, Xavier Boyen
2004/170 (PDF ) Efficient Consistency Proofs for Generalized Queries on a Committed Database Rafail Ostrovsky, Charles Rackoff, Adam Smith
2004/169 (PDF ) Regional Blackouts: Protection of Broadcast Content on 3G Networks. Alexander W. Dent, Allan Tomlinson
2004/168 (PDF ) Building Instances of TTM Immune to the Goubin-Courtois Attack and the Ding-Schmidt Attack T. Moh, J. M. Chen, Boyin Yang
2004/167 (PDF ) A Secure and Efficient Key Exchange Protocol for Mobile Communications Fuw-Yi Yang, Jinn-Ke Jan
2004/166 (PDF ) FRMAC, a Fast Randomized Message Authentication Code Eliane Jaulmes, Reynald Lercier
2004/165 (PDF ) A comparison of MNT curves and supersingular curves D. Page, N. P. Smart, F. Vercauteren
2004/164 (PDF ) ID-based Cryptography from Composite Degree Residuosity Man Ho Au, Victor K. Wei
2004/162 (PDF ) On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-way Quantum Transmission Ivan Damgaard, Thomas Pedersen, Louis Salvail
2004/161 (PDF ) Improvement of Thériault Algorithm of Index Calculus for Jacobian of Hyperelliptic Curves of Small Genus Ko-ichi Nagao
2004/160 (PDF ) Scalable Public-Key Tracing and Revoking Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti Yung
2004/159 (PDF ) Provably Secure On-demand Source Routing in Mobile Ad Hoc Networks Gergely Acs, Levente Buttyan, Istvan Vajda
2004/158 (PDF ) Mobile Terminal Security Olivier Benoit, Nora Dabbous, Laurent Gauteron, Pierre Girard, Helena Handschuh, David Naccache, Stéphane Socié, Claire Whelan
2004/157 (PDF ) Hardware and Software Normal Basis Arithmetic for Pairing Based Cryptography in Characteristic Three R. Granger, D. Page, M. Stam
2004/156 (PDF ) Quantum cryptography: a practical information security perspective Kenneth G. Paterson, Fred Piper, Ruediger Schack
2004/155 (PDF ) Security and Identification Indicators for Browsers against Spoofing and Phishing Attacks Amir Herzberg, Ahmad Gbara
2004/154 (PDF ) Controlling Spam by Secure Internet Content Selection Amir Herzberg
2004/153 (PDF ) A double large prime variation for small genus hyperelliptic index calculus P. Gaudry, E. Thomë, N. Thëriault, C. Diem
2004/152 (PDF ) Another Look at ``Provable Security'' Neal Koblitz, Alfred Menezes
2004/151 (PDF ) Suitable Curves for Genus-4 HCC over Prime Fields: Point Counting Formulae for Hyperelliptic Curves of type $y^2=x^{2k+1}+ax$ Mitsuhiro Haneda, Mitsuru Kawazoe, Tetsuya Takahashi
2004/150 (PDF ) An Authenticated Certificateless Public Key Encryption Scheme Young-Ran Lee, Hyang-Sook Lee
2004/149 (PDF ) Secure and Efficient AES Software Implementation for Smart Caards E. Trichina, L. Korkishko
2004/148 (PDF ) Provably Secure Delegation-by-Certification Proxy Signature Schemes Zuowen Tan, Zhuojun Liu
2004/147 (PDF ) Key Recovery Method for CRT Implementation of RSA Matthew J. Campagna, Amit Sethi
2004/146 (PDF ) Near-Collisions of SHA-0 Eli Biham, Rafi Chen
2004/145 (PDF ) Electromagnetic Side Channels of an FPGA Implementation of AES Vincent Carlier, Hervé Chabanne, Emmanuelle Dottax, Hervé Pelletier
2004/144 (PDF ) Plateaued Rotation Symmetric Boolean Functions on Odd Number of Variables Alexander Maximov, Martin Hell, Subhamoy Maitra
2004/143 (PDF ) Short Signatures, Provable Security, Generic Attacks and Computational Security of Multivariate Polynomial Schemes such as HFE, Quartz and Sflash Nicolas T. Courtois
2004/141 (PDF ) Elastic AES Debra L. Cook, Moti Yung, Angelos D. Keromytis
2004/139 (PDF ) New Notions of Security: Achieving Universal Composability without Trusted Setup Manoj Prabhakaran, Amit Sahai
2004/138 (PDF ) How to Disembed a Program? Benoit Chevallier-Mames, David Naccache, Pascal Paillier, David Pointcheval
2004/137 (PDF ) New GF(2n) Parallel Multiplier Using Redundant Representation Haining Fan, Yiqi Dai
2004/136 (PDF ) CompChall: Addressing Password Guessing Attacks Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith Abraham, Sugata Sanyal
2004/135 (PDF ) More Efficient Server Assisted One Time Signatures Vipul Goyal
2004/134 (PDF ) Secure and Efficient Masking of AES - A Mission Impossible? Elisabeth Oswald, Stefan Mangard, Norbert Pramstaller
2004/133 (PDF ) Secret Handshakes from CA-Oblivious Encryption Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik
2004/132 (PDF ) On Small Characteristic Algebraic Tori in Pairing-Based Cryptography R. Granger, D. Page, M. Stam
2004/131 (PDF ) A New ID-based Signature with Batch Verification Jung Hee Cheon, Yongdae Kim, Hyo Jin Yoon
2004/130 (PDF ) Private Inference Control David Woodruff, Jessica Staddon
2004/129 (PDF ) Generalizing Kedlaya's order counting based on Miura Theory Joe Suzuki
2004/128 (PDF ) Elastic Block Ciphers Debra L. Cook, Moti Yung, Angelos D. Keromytis
2004/127 (PDF ) DDH-based Group Key Agreement in a Mobile Environment Junghyun Nam, Jinwoo Lee, Seungjoo Kim, Dongho Won
2004/126 (PDF ) Two Software Normal Basis Multiplication Algorithms for GF(2n) Haining Fan, Yiqi Dai
2004/125 (PDF ) EME*: extending EME to handle arbitrary-length messages with associated data Shai Halevi
2004/124 (PDF ) Universally Composable DKG with Linear Number of Exponentiations Douglas Wikström
2004/123 (PDF ) On security of XTR public key cryptosystems against Side Channel Attacks Dong-Guk Han, Jongin Lim, Kouichi Sakurai
2004/122 (PDF ) A New Two-Party Identity-Based Authenticated Key Agreement Noel McCullagh, Paulo S. L. M. Barreto
2004/121 (PDF ) Fast and Proven Secure Blind Identity-Based Signcryption from Pairings Tsz Hon Yuen, Victor K. Wei
2004/120 (PDF ) Security of Symmetric Encryption Schemes with One-Way IND-CNA Key Setup Bartosz Zoltak
2004/119 (PDF ) Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography Masayuki Abe, Serge Fehr
2004/118 (PDF ) Fast addition on non-hyperelliptic genus $3$ curves Stéphane Flon, Roger Oyono, Christophe Ritzenthaler
2004/117 (PDF ) Efficient and Forward-Secure Identity-Based Signcryption Noel McCullagh, Paulo S. L. M. Barreto
2004/116 (PDF ) On the Limitations of Universally Composable Two-Party Computation Without Set-up Assumptions Ran Canetti, Eyal Kushilevitz, Yehuda Lindell
2004/115 (PDF ) Provably-Secure and Communication-Efficient Scheme for Dynamic Group Key Exchange Junghyun Nam, Sungduk Kim, Seungjoo Kim, Dongho Won
2004/114 (PDF ) Improved Identity-Based Signcryption Liqun Chen, John Malone-Lee
2004/113 (PDF ) On the Security and Composability of the One Time Pad Dominik Raub, Rainer Steinwandt, Joern Mueller-Quade
2004/112 (PDF ) Relation between XL algorithm and Groebner Bases Algorithms M. Sugita, M. Kawazoe, H. Imai
2004/111 (PDF ) The Vulnerability of SSL to Chosen Plaintext Attack Gregory V. Bard
2004/110 (PDF ) Designing Against the `Overdefined System of Equations' Attack Carlisle Adams
2004/109 (PDF ) Concealing Complex Policies with Hidden Credentials Robert Bradshaw, Jason Holt, Kent Seamons
2004/108 (PDF ) Two Improved Partially Blind Signature Schemes from Bilinear Pairings Sherman S. M. Chow, Lucas C. K. Hui, S. M. Yiu, K. P. Chow
2004/107 (PDF ) Classification of genus 2 curves over $\mathbb{F}_{2^n}$ and optimization of their arithmetic Bertrand BYRAMJEE, Sylvain DUQUESNE
2004/106 (PDF ) Capacity and Examples of Template Protecting Biometric Authentication Systems P. Tuyls, J. Goseling
2004/105 (PDF ) Receipt-Free Homomorphic Elections and Write-in Ballots Alessandro Acquisti
2004/104 (PDF ) Efficient and Provably Secure Trapdoor-free Group Signature Schemes from Bilinear Pairings Lan Nguyen, Rei Safavi-Naini
2004/103 (PDF ) Cryptanalysis of SFlash v3 Jintai Ding, Dieter Schmidt
2004/102 (PDF ) The Exact Security of an Identity Based Signature and its Applications Benoît Libert, Jean-Jacques Quisquater
2004/101 (PDF ) Provably Secure Masking of AES Johannes Blömer, Jorge Guajardo Merchan, Volker Krummel
2004/100 (PDF ) The Sorcerer’s Apprentice Guide to Fault Attacks Hagai Bar-El, Hamid Choukri, David Naccache, Michael Tunstall, Claire Whelan
2004/099 (PDF ) Secure Hashed Diffie-Hellman over Non-DDH Groups Rosario Gennaro, Hugo Krawczyk, Tal Rabin
2004/098 (PDF ) Attacking a Public Key Cryptosystem Based on Tree Replacement María Isabel González Vasco, David Pérez García
2004/097 (PDF ) How To Re-initialize a Hash Chain Vipul Goyal
2004/095 (PDF ) GNFS Factoring Statistics of RSA-100, 110, ..., 150 Kazumaro Aoki, Yuji Kida, Takeshi Shimoyama, Hiroki Ueda
2004/094 (PDF ) Block Ciphers and Stream Ciphers: The State of the Art Alex Biryukov
2004/093 (PDF ) A Provably Secure Nyberg-Rueppel Signature Variant with Applications Giuseppe Ateniese, Breno de Medeiros
2004/092 (PDF ) A New Stream Cipher HC-256 Hongjun Wu
2004/091 (PDF ) Signature Bouquets: Immutability for Aggregated/Condensed Signatures Einar Mykletun, Maithili Narasimha, Gene Tsudik
2004/090 (PDF ) Provably Secure Authenticated Tree Based Group Key Agreement Protocol Ratna Dutta, Rana Barua, Palash Sarkar
2004/089 (PDF ) Security of Random Key Pre-distribution Schemes With Limited Tamper Resistance Mahalingam Ramkumar, Nasir Memon
2004/087 (PDF ) Using primitive subgroups to do more with fewer bits K. Rubin, A. Silverberg
2004/086 (PDF ) Fuzzy Identity Based Encryption Amit Sahai, Brent Waters
2004/085 (PDF ) The CS2 Block Cipher Tom St Denis
2004/084 (PDF ) Evaluating elliptic curve based KEMs in the light of pairings David Galindo, Sebastia Martin, Jorge L. Villar
2004/083 (PDF ) Scan Based Side Channel Attack on Data Encryption Standard Bo Yang, Kaijie Wu, Ramesh Karri
2004/082 (PDF ) The Reactive Simulatability (RSIM) Framework for Asynchronous Systems Michael Backes, Birgit Pfitzmann, Michael Waidner
2004/081 (PDF ) Rewriting Variables: the Complexity of Fast Algebraic Attacks on Stream Ciphers Philip Hawkes, Gregory G. Rose
2004/080 (PDF ) HENKOS Stream Cipher Marius Oliver Gheorghita
2004/079 (PDF ) Pairing-Based One-Round Tripartite Key Agreement Protocols Zhaohui Cheng, Luminita Vasiu, Richard Comley
2004/078 (PDF ) Analysis of the WinZip encryption method Tadayoshi Kohno
2004/077 (PDF ) Foundations of Group Signatures: The Case of Dynamic Groups Mihir Bellare, Haixia Shi, Chong Zhang
2004/076 (PDF ) Group Signatures: Provable Security, Efficient Constructions and Anonymity from Trapdoor-Holders Aggelos Kiayias, Moti Yung
2004/075 (PDF ) An Hybrid Mode of Operation Alexis W. Machado
2004/074 (PDF ) Completion of Computation of Improved Upper Bound on the Maximum Average Linear Hull Probabilty for Rijndael Liam Keliher, Henk Meijer, Stafford Tavares
2004/073 (PDF ) Index calculus for abelian varieties and the elliptic curve discrete logarithm problem Pierrick Gaudry
2004/072 (PDF ) Asymmetric Cryptography: Hidden Field Equations Christopher Wolf, Bart Preneel
2004/071 (PDF ) An IBE Scheme to Exchange Authenticated Secret Keys Waldyr Benits Jr, Routo Terada
2004/070 (PDF ) Easy decision-Diffie-Hellman groups Steven D Galbraith, Victor Rotger
2004/069 (PDF ) A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model Wonil Lee, Mridul Nandi, Palash Sarkar, Donghoon Chang, Sangjin Lee, Kouichi Sakurai
2004/068 (PDF ) Synthesis of Secure FPGA Implementations Kris Tiri, Ingrid Verbauwhede
2004/067 (PDF ) Charge Recycling Sense Amplifier Based Logic: Securing Low Power Security IC’s against Differential Power Analysis Kris Tiri, Ingrid Verbauwhede
2004/066 (PDF ) A Dynamic and Differential CMOS Logic Style to Resist Power and Timing Attacks on Security IC’s. Kris Tiri, Ingrid Verbauwhede
2004/065 (PDF ) Refinements of Miller's Algorithm for Computing Weil/Tate Pairing Ian Blake, Kumar Murty, Guangwu Xu
2004/064 (PDF ) Pairing-Based Cryptographic Protocols : A Survey Ratna Dutta, Rana Barua, Palash Sarkar
2004/063 (PDF ) An Oblivious Transfer Protocol with Log-Squared Communication Helger Lipmaa
2004/062 (PDF ) On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions John Black, Martin Cochran, Thomas Shrimpton
2004/061 (PDF ) TTS: Rank Attacks in Tame-Like Multivariate PKCs Bo-Yin Yang, Jiun-Ming Chen
2004/060 (PDF ) Positive Results and Techniques for Obfuscation Benjamin Lynn, Manoj Prabhakaran, Amit Sahai
2004/059 (PDF ) Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library Michael Backes, Birgit Pfitzmann
2004/058 (PDF ) Generating more MNT elliptic curves Michael Scott, Paulo S. L. M Barreto
2004/057 (PDF ) On Multiple Linear Approximations Alex Biryukov, Christophe De Cannière, Michael Quisquater
2004/055 (PDF ) Redundant Trinomials for Finite Fields of Characteristic $2$ Christophe Doche
2004/054 (PDF ) Comments on a Threshold Proxy Signature Scheme Based on the RSA Cryptosystem Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng
2004/053 (PDF ) Efficient and Universally Composable Committed Oblivious Transfer and Applications Juan Garay, Philip MacKenzie, Ke Yang
2004/052 (PDF ) The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures Tal Malkin, Satoshi Obana, Moti Yung
2004/051 (PDF ) Privacy Preserving Keyword Searches on Remote Encrypted Data Yan-Cheng Chang, Michael Mitzenmacher
2004/050 (PDF ) Yet another attack on a password authentication scheme based on quadratic residues with parameters unknown 1 Lizhen Yang, Xiaoyun Wang, Dong Zheng, Kefei Chen
2004/049 (PDF ) Side Channel Analysis for Reverse Engineering (SCARE) - An Improved Attack Against a Secret A3/A8 GSM Algorithm Christophe Clavier
2004/048 (PDF ) Tail-MAC: A Message Authentication Scheme for Stream Ciphers Bartosz Zoltak
2004/047 (PDF ) On a zero-knowledge property of arguments of knowledge based on secure public key encryption schemes Yodai Watanabe
2004/046 (PDF ) Revision of Tractable Rational Map Cryptosystem Lih-Chung Wang, Fei-Hwang Chang
2004/045 (PDF ) Lower Bounds and Impossibility Results for Concurrent Self Composition Yehuda Lindell
2004/044 (PDF ) Transitive Signatures Based on Non-adaptive Standard Signatures Zhou Sujing
2004/043 (PDF ) Multi-sequences with d-perfect property Xiutao Feng, Quanlong Wang, Zongduo Dai
2004/041 (PDF ) Efficient k-out-of-n Oblivious Transfer Schemes with Adaptive and Non-Adaptive Queries Cheng-Kang Chu, Wen-Guey Tzeng
2004/040 (PDF ) Cryptanalysis of a timestamp-based password authentication scheme Lizhen Yang, Kefei Chen
2004/039 (PDF ) A Bilinear Spontaneous Anonymous Threshold Signature for Ad Hoc Groups Victor K. Wei
2004/038 (PDF ) Chameleon Hashing without Key Exposure Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim
2004/037 (PDF ) A Provably Secure Scheme for Restrictive Partially Blind Signatures Fuw-Yi Yang, Jinn-Ke Jan
2004/036 (PDF ) Single Database Private Information Retrieval with Logarithmic Communication Yan-Cheng Chang
2004/035 (PDF ) Cryptographic Hash-Function Basics: Definitions, Implications and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance Phillip Rogaway, Thomas Shrimpton
2004/034 (PDF ) s(n) An Arithmetic Function of Some Interest, and Related Arithmetic Gideon Samid
2004/033 (PDF ) New Approaches to Password Authenticated Key Exchange based on RSA Muxiang Zhang
2004/032 (PDF ) Compressed Pairings Michael Scott, Paulo S. L. M. Barreto
2004/031 (PDF ) Summation polynomials and the discrete logarithm problem on elliptic curves Igor Semaev
2004/030 (PDF ) Point Compression on Jacobians of Hyperelliptic Curves over $\F_q$. Colin Stahlke
2004/029 (PDF ) Finding Optimum Parallel Coprocessor Design for Genus 2 Hyperelliptic Curve Cryptosystems Guido Bertoni, Luca Breveglieri, Thomas Wollinger, Christof Paar
2004/028 (PDF ) Custodian-Hiding Verifiable Encryption Joseph K. Liu, Victor K. Wei, Duncan S. Wong
2004/027 (PDF ) Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups Joseph K. Liu, Victor K. Wei, Duncan S. Wong
2004/026 (PDF ) The CSQUARE Transform Tom St Denis
2004/025 (PDF ) Clarifying Obfuscation: Improving the Security of White-Box Encoding Hamilton E. Link, William D. Neumann
2004/024 (PDF ) Exponential S-boxes Sergey Agievich, Andrey Afonenko
2004/023 (PDF ) RDS: Remote Distributed Scheme for Protecting Mobile Agents Asnat Dadon-Elichai
2004/022 (PDF ) Privacy-Enhanced Searches Using Encrypted Bloom Filters Steven M. Bellovin, William R. Cheswick
2004/021 (PDF ) Externalized Fingerprint Matching Claude Barral, Jean-Sébastien Coron, David Naccache
2004/020 (PDF ) Optimal Signcryption from Any Trapdoor Permutation Yevgeniy Dodis, Michael J. Freedman, Stanislaw Jarecki, Shabsi Walfish
2004/019 (PDF ) New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms Tetsu Iwata, Tadayoshi Kohno
2004/018 (PDF ) Corrections of the NIST Statistical Test Suite for Randomness Song-Ju Kim, Ken Umeno, Akio Hasegawa
2004/017 (PDF ) Cryptanalysis of an ID-based Password Authentication Scheme using Smart Cards and Fingerprints M. Scott
2004/016 (PDF ) A Synchronous Model for Multi-Party Computation and the Incompleteness of Oblivious Transfer Dennis Hofheinz, Joern Mueller-Quade
2004/015 (PDF ) An AGM-type elliptic curve point counting algorithm in characteristic three Trond Stølen Gustavsen, Kristian Ranestad
2004/014 (PDF ) Crosscorrelation Spectra of Dillon and Patterson-Wiedemann type Boolean Functions Sugata Gangopadhyay, Subhamoy Maitra
2004/013 (PDF ) Cryptanalysis of a Provably Secure Cryptographic Hash Function Jean-Sebastien Coron, Antoine Joux
2004/012 (PDF ) Pitfalls in public key cryptosystems based on free partially commutative monoids and groups Maria Isabel Gonzalez Vasco, Rainer Steinwandt
2004/011 (PDF ) Known-Plaintext Attack Against a Permutation Based Video Adam J. Slagell
2004/010 (PDF ) Fast Pseudo-Hadamard Transforms Tom St Denis
2004/009 (PDF ) Efficient and Secure Multi-Party Computation with Faulty Majority and Complete Fairness Juan A. Garay, Philip MacKenzie, Ke Yang
2004/008 (PDF ) The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols Mihir Bellare, Adriana Palacio
2004/007 (PDF ) Traceable Signatures Aggelos Kiayias, Yiannis Tsiounis, Moti Yung
2004/006 (PDF ) Protocol Initialization for the Framework of Universal Composability Boaz Barak, Yehuda Lindell, Tal Rabin
2004/005 (PDF ) Universal Undeniable Signatures Huafei Zhu
2004/003 (PDF ) On the Role of the Inner State Size in Stream Ciphers Erik Zenner
2004/002 (PDF ) Efficient Universal Padding Schemes for Multiplicative Trapdoor One-way Permutation Yuichi Komano, Kazuo Ohta
2003/265 (PDF ) Concurrent/Resettable Zero-Knowledge With Concurrent Soundness in the Bare Public-Key Model and Its Applications Yunlei ZHAO
2003/264 (PDF ) Inversion of Several Field Elements: A New Parallel Algorithm Pradeep Kumar Mishra, Palash Sarkar
2003/263 (PDF ) Security Analysis of Lal and Awasthi's Proxy Signature Schemes Manik Lal Das, Ashutosh Saxena, V P Gulati
2003/262 (PDF ) A Secure Modified ID-Based Undeniable Signature Scheme Sherman S. M. Chow, Lucas C. K. Hui, S. M. Yiu, K. P. Chow
2003/261 (PDF ) A provably secure ID-based ring signature scheme Javier Herranz, Germán Sáez
2003/260 (PDF ) An Improved ID-based Authenticated Group Key Agreement Scheme Xinjun Du, Ying Wang, Jianhua Ge, Yumin Wang
2003/259 (PDF ) Attack on Two ID-based Authenticated Group Key Agreement Schemes Fangguo Zhang, Xiaofeng Chen
2003/258 (PDF ) Analysis of Implementation Hierocrypt-3 algorithm (and its comparison to Camellia algorithm) using ALTERA devices. Marcin Rogawski
2003/257 (PDF ) Trading Inversions for Multiplications in Elliptic Curve Cryptography Mathieu Ciet, Marc Joye, Kristin Lauter, Peter L. Montgomery
2003/255 (PDF ) Improved Constructions for Universal Re-encryption. Peter Fairbrother
2003/254 (PDF ) Committing Encryption and Publicly-Verifiable SignCryption Yitchak Gertner, Amir Herzberg
2003/253 (PDF ) Aspects of Hyperelliptic Curves over Large Prime Fields in Software Implementations Roberto Maria Avanzi
2003/252 (PDF ) On Simulation-Sound Trapdoor Commitments Philip MacKenzie, Ke Yang
2003/251 (PDF ) Isomorphism Classes of Hyperelliptic Curves of genus 3 over finite fields EunKyung Jeong
2003/250 (PDF ) Breaking the Stream Cipher Whitenoise Hongjun Wu
2003/249 (PDF ) Software Specifications For Tinnitus Utilizing Whitenoise(Revised Feb 2004) Stephen Boren, Andre Brisson
2003/248 (PDF ) Efficient Implementation of Genus Three Hyperelliptic Curve Cryptography over GF(2^n) Izuru Kitamura, Masanobu Katagi
2003/247 (PDF ) ID-based Authenticated Two Round Multi-Party Key Agreement Xinjun Du, Ying Wang, Jianhua Ge, Yumin Wang
2003/246 (PDF ) Quantum Digital Signature Based on Quantum One-way Functions Xin L¨¹, Deng-Guo Feng
2003/245 (PDF ) A Key Substitution Attack on SFLASH^{v3} Willi Geiselmann, Rainer Steinwandt
2003/244 (PDF ) Efficient Public Key Steganography Secure Against Adaptively Chosen Stegotext Attacks Tri Van Le, Kaoru Kurosawa
2003/243 (PDF ) An Attack on Not-interactive Designated Verifier Proofs for Undeniable Signatures Guilin Wang
2003/242 (PDF ) Improved Weil and Tate pairings for elliptic and hyperelliptic curves Kirsten Eisentraeger, Kristin Lauter, Peter L. Montgomery
2003/241 (PDF ) Hybrid Broadcast Encryption and Security Analysis Shaoquan Jiang, Guang Gong
2003/240 (PDF ) How to Break and Repair a Universally Composable Signature Functionality Michael Backes, Dennis Hofheinz
2003/239 (PDF ) Universally Composable Signatures, Certification and Authentication Ran Canetti
2003/238 (PDF ) Chameleon Signature from Bilinear Pairing Xinjun Du, Ying Wang, Jianhua Ge, Yumin Wang
2003/237 (PDF ) Low-Cost Solutions for Preventing Simple Side-Channel Analysis: Side-Channel Atomicity Benoit Chevallier-Mames, Mathieu Ciet, Marc Joye
2003/236 (PDF ) Combinational Logic Design for AES SubByte Transformation on Masked Data Elena Trichina
2003/235 (PDF ) Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data Yevgeniy Dodis, Rafail Ostrovsky, Leonid Reyzin, Adam Smith
2003/234 (PDF ) Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary Gene Itkis, Peng Xie
2003/233 (PDF ) Public Key Steganography Luis von Ahn, Nicholas J. Hopper
2003/232 (PDF ) The Statistical Zero-knowledge Proof for Blum Integer Based on Discrete Logarithm Chunming Tang, Zhuojun Liu, Jinwang Liu
2003/231 (PDF ) Public-Key Steganography with Active Attacks Michael Backes, Christian Cachin
2003/230 (PDF ) A Fast Provably Secure Cryptographic Hash Function Daniel Augot, Matthieu Finiasz, Nicolas Sendrier
2003/229 (PDF ) Algebraic Attacks on Summation Generators Dong Hoon Lee, Jaeheon Kim, Jin Hong, Jae Woo Han, Dukjae Moon
2003/228 (PDF ) Verifiably Committed Signatures Provably Secure in The Standard Complexity Model Huafei Zhu
2003/227 (PDF ) Attacks on a Secure Group Communication Scheme With Hierarchical Access Control Willi Geiselmann, Rainer Steinwandt
2003/226 (PDF ) On the Security of a Group Signature Scheme with Forward Security Guilin Wang
2003/225 (PDF ) Masking Based Domain Extenders for UOWHFs: Bounds and Constructions Palash Sarkar
2003/223 (PDF ) Cryptanalysis of a Cryptosystem based on Drinfeld modules Simon R. Blackburn, Carlos Cid, Steven D. Galbraith
2003/222 (PDF ) A Verifiable Secret Sharing Scheme with Statistical zero-knowledge Chunming Tang, Zhuojun Liu, Mingsheng Wang
2003/221 (PDF ) A Cryptanalysis of the Original Domingo-Ferrer's Algebraic Privacy Homomophism Jung Hee Cheon, Hyun Soo Nam
2003/220 (PDF ) A short comment on the affine parts of SFLASH^{v3} Willi Geiselmann, Rainer Steinwandt
2003/219 (PDF ) Cryptanalysis of the Repaired Public-key Encryption Scheme Based on the Polynomial Reconstruction Problem Jean-Sebastien Coron
2003/218 (PDF ) A Security Evaluation of Whitenoise David Wagner
2003/217 (PDF ) Chemical Combinatorial Attacks on Keyboards Eric Brier, David Naccache, Pascal Paillier
2003/216 (PDF ) Secure Indexes Eu-Jin Goh
2003/215 (PDF ) Divide and Concatenate: A Scalable Hardware Architecture for Universal MAC Bo Yang, Ramesh Karri, David Mcgrew
2003/214 (PDF ) Multi-Trapdoor Commitments and their Applications to Non-Malleable Protocols Rosario Gennaro
2003/213 (PDF ) Isomorphism Classes of Hyperelliptic Curves of Genus 2 over $\mathbb{F}_{2^n}$ Y. Choie, E. Jeong
2003/212 (PDF ) High Performance Arithmetic for Hyperelliptic Curve Cryptosystems of Genus Two Jan Pelzl, Thomas Wollinger, Christof Paar
2003/211 (PDF ) SFLASHv3, a fast asymmetric signature scheme Nicolas T. Courtois, Louis Goubin, Jacques Patarin
2003/210 (PDF ) On a Relation Between Verifiable Secret Sharing Schemes and a Class of Error-Correcting Codes Ventzislav Nikov, Svetla Nikova
2003/209 (PDF ) Using the Trace Operator to repair the Polynomial Reconstruction based Cryptosystem presented at Eurocrypt 2003 Daniel Augot, Matthieu Finiasz, Pierre Loidreau
2003/208 (PDF ) ID-Based Chameleon Hashes from Bilinear Pairings Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo
2003/207 (PDF ) Security Flaws in Several Group Signatures Proposed by Popescu Guilin Wang, Sihan Qing
2003/206 (PDF ) Identity Based Undeniable Signatures Benoît Libert, Jean-Jacques Quisquater
2003/205 (PDF ) Improved Cryptanalysis of SecurID Scott Contini, Yiqun Lisa Yin
2003/204 (PDF ) A Composition Construction of Bent-Like Boolean Functions from Quadratic Polynomials ZENG Xiangyong, HU Lei
2003/203 (PDF ) Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems using Degenerate Divisors Masanobu Katagi, Izuru Kitamura, Toru Akishita, Tsuyoshi Takagi
2003/202 (PDF ) Yet Another Sieving Device Willi Geiselmann, Rainer Steinwandt
2003/201 (PDF ) an attack on a multisignature scheme Zheng Dong, Kefei Chen
2003/200 (PDF ) Cryptanalysis of B.Lee-S.Kim-K.Kim Proxy Signature Zheng Dong, Shengli Liu, kefei Chen
2003/199 (PDF ) Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan Simon R. Blackburn, Kenneth G. Paterson
2003/198 (PDF ) Construction of Perfect Nonlinear and Maximally Nonlinear Multi-Output Boolean Functions Satisfying Higher Order Strict Avalanche Criteria Kishan Chand Gupta, Palash Sarkar
2003/197 (PDF ) Revisiting fully distributed proxy signature schemes Javier Herranz, German Saez
2003/196 (PDF ) Security Analysis of Some Proxy Signatures Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng
2003/195 (PDF ) Public Key Encryption with keyword Search Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, Giuseppe Persiano
2003/194 (PDF ) Security Analysis of Several Group Signature Schemes Guilin Wang
2003/193 (PDF ) Efficient Extension of Standard Schnorr/RSA signatures into Universal Designated-Verifier Signatures Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk
2003/192 (PDF ) Universal Designated-Verifier Signatures Ron Steinfeld, Laurence Bull, Huaxiong Wang, Josef Pieprzyk
2003/191 (PDF ) Projective Coordinates Leak David Naccache, Nigel Smart, Jacques Stern
2003/189 (PDF ) Cryptanalysis of publicly verifiable authenticated encryption Zuhua Shao
2003/188 (PDF ) A New Forward Secure Signature Scheme using Bilinear Maps Fei Hu, Chwan-Hwa Wu, J. D. Irwin
2003/187 (PDF ) Resource Bounded Unprovability of Computational Lower Bounds Tatsuaki Okamoto, Ryo Kashima
2003/186 (PDF ) Safe Prime Generation with a Combined Sieve Michael J. Wiener
2003/185 (PDF ) VMPC Stream Cipher Bartosz Zoltak
2003/184 (PDF ) What do DES S-boxes Say to Each Other ? Nicolas T. Courtois, Guilhem Castagnos, Louis Goubin
2003/183 (PDF ) Certificate-Based Encryption and the Certificate Revocation Problem Craig Gentry
2003/182 (PDF ) Chosen-Ciphertext Security from Identity-Based Encryption Ran Canetti, Shai Halevi, Jonathan Katz
2003/181 (PDF ) On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? Rui Zhang, Goichiro Hanaoka, Junji Shikata, Hideki Imai
2003/180 (PDF ) Parallelizing Explicit Formula for Arithmetic in the Jacobian of Hyperelliptic Curves Pradeep Kumar Mishra, Palash Sarkar
2003/179 (PDF ) VMPC One-Way Function Bartosz Zoltak
2003/178 (PDF ) Constructing Optimistic Fair Exchange Protocols from Committed Signatures Huafei Zhu
2003/177 (PDF ) Building Secure Cryptographic Transforms, or How to Encrypt and MAC Tadayoshi Kohno, Adriana Palacio, John Black
2003/176 (PDF ) Patterson-Wiedemann Construction Revisited S. Gangopadhyay, P. H. Keskar, S. Maitra
2003/175 (PDF ) Double-Speed Safe Prime Generation David Naccache
2003/174 (PDF ) Relaxing Chosen-Ciphertext Security Ran Canetti, Hugo Krawczyk, Jesper Nielsen
2003/173 (PDF ) Domain Extender for Collision Resistant Hash Functions: Improving Upon Merkle-Damgaard Iteration Palash Sarkar
2003/172 (PDF ) NAEP: Provable Security in the Presence of Decryption Failures Nick Howgrave-Graham, Joseph H. Silverman, Ari Singer, William Whyte
2003/171 (PDF ) Scalable Protocols for Authenticated Group Key Exchange Jonathan Katz, Moti Yung
2003/170 (PDF ) HARPS: HAshed Random Preloaded Subset Key Distribution Mahalingam Ramkumar, Nasir Memon
2003/169 (PDF ) Properties of the Transformation Semigroup of the Solitaire Stream Cipher Boris Pogorelov, Marina Pudovkina
2003/168 (PDF ) Robust discretization, with an application to graphical passwords Jean-Camille Birget, Dawei Hong, Nasir Memon
2003/167 (PDF ) Identity-based Chameleon Hash and Applications Giuseppe Ateniese, Breno de Medeiros
2003/166 (PDF ) A reduction of the space for the parallelized Pollard lambda search on elliptic curves over prime finite fields and on anomalous binary elliptic curves Igor Semaev
2003/165 (PDF ) Commitment Capacity of Discrete Memoryless Channels Andreas Winter, Anderson C. A. Nascimento, Hideki Imai
2003/164 (PDF ) Identity-Based Threshold Decryption Joonsang Baek, Yuliang Zheng
2003/163 (PDF ) Multipurpose Identity-Based Signcryption : A Swiss Army Knife for Identity-Based Cryptography Xavier Boyen
2003/162 (PDF ) Cryptanalysis of the Alleged SecurID Hash Function Alex Biryukov, Joseph Lano, Bart Preneel
2003/161 (PDF ) Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle Methodology Ueli Maurer, Renato Renner, Clemens Holenstein
2003/160 (PDF ) A More Secure and Efficacious TTS Signature Scheme Jiun-Ming Chen, Bo-Yin Yang
2003/159 (PDF ) An efficient variant of the RSA cryptosystem Cesar Alison Monteiro Paixão
2003/158 (PDF ) A Sufficient Condition and Optimal Domain Extension of UOWHF Mridul Nandi
2003/157 (PDF ) Some RSA-based Encryption Schemes with Tight Security Reduction Kaoru Kurosawa, Tsuyoshi Takagi
2003/156 (PDF ) Efficient Provably Secure Public Key Steganography Tri Van Le
2003/155 (PDF ) A Formal Proof of Zhu's Signature Scheme huafei zhu
2003/154 (PDF ) ManTiCore: Encryption with Joint Cipher-State Authentication Cheryl Beaver, Timothy Draelos, Richard Schroeppel, Mark Torgerson
2003/153 (PDF ) Attack on an Identification Scheme Based on Gap Diffie-Hellman Problem Zhen-Feng ZHANG, Jing XU, Deng-Guo FENG
2003/152 (PDF ) Optimal Statistical Power Analysis Eric Brier, Christophe Clavier, Francis Olivier
2003/151 (PDF ) Secret sharing schemes on sparse homogeneous access structures with rank three Jaume Martí-Farré, Carles Padró
2003/150 (PDF ) On the random-oracle methodology as applied to length-restricted signature schemes Ran Canetti, Oded Goldreich, Shai Halevi
2003/148 (PDF ) A Tweakable Enciphering Mode Shai Halevi, Phillip Rogaway
2003/147 (PDF ) A Parallelizable Enciphering Mode Shai Halevi, Phillip Rogaway
2003/146 (PDF ) Breaking and Repairing Optimistic Fair Exchange from PODC 2003 Yevgeniy Dodis, Leonid Reyzin
2003/145 (PDF ) Symmetric Authentication Within a Simulatable Cryptographic Library Michael Backes, Birgit Pfitzmann, Michael Waidner
2003/144 (PDF ) ID-based tripartite key agreement with signatures Divya Nalla
2003/143 (PDF ) Elliptic curves suitable for pairing based cryptography Friederike Brezing, Annegret Weng
2003/142 (PDF ) A New Tree based Domain Extension of UOWHF Mridul Nandi
2003/141 (PDF ) General Composition and Universal Composability in Secure Multiparty Computation Yehuda Lindell
2003/140 (PDF ) Trading-Off Type-Inference Memory Complexity Against Communication Konstantin Hyppönen, David Naccache, Elena Trichina, Alexei Tchoulkine
2003/139 (PDF ) On the Randomness of the Editing Generator Enjian Bai, Guozhen Xiao
2003/138 (PDF ) Permutation graphs, fast forward permutations, and Boaz Tsaban
2003/137 (PDF ) Bernoulli numbers and the probability of a birthday surprise Boaz Tsaban
2003/136 (PDF ) Efficient linear feedback shift registers with maximal period Boaz Tsaban, Uzi Vishne
2003/135 (PDF ) Collision Attack on Reduced-Round Camellia Wen-Ling Wu, Deng-Guo Feng
2003/133 (PDF ) Minimum Distance between Bent and 1-resilient Boolean Functions Soumen Maity, Subhamoy Maitra
2003/132 (PDF ) Guaranteeing the diversity of number generators Adi Shamir, Boaz Tsaban
2003/131 (PDF ) Homomorphic public-key systems based on subgroup membership problems Kristian Gjøsteen
2003/130 (PDF ) On the Pseudorandomness of KASUMI Type Permutations Tetsu Iwata, Tohru Yagi, Kaoru Kurosawa
2003/129 (PDF ) Attack on Han et al.'s ID-based Confirmer (Undeniable) Signature at ACM-EC'03 Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo
2003/128 (PDF ) Weak Fields for ECC Alfred Menezes, Edlyn Teske, Annegret Weng
2003/127 (PDF ) Using Information Theory Approach to Randomness Testing B. Ya. Ryabko, V. A. Monarev
2003/126 (PDF ) Certificateless Public Key Cryptography Sattam S. Al-Riyami, Kenneth G. Paterson
2003/125 (PDF ) Algebraic Attacks on Combiners with Memory and Several Outputs Nicolas T. Courtois
2003/124 (PDF ) A General Correlation Theorem Kishan Chand Gupta, Palash Sarkar
2003/123 (PDF ) Assessing security of some group based cryptosystems Vladimir Shpilrain
2003/122 (PDF ) Cryptanalysis of Al-Riyami-Paterson's Authenticated Three Party Key Agreement Protocols Kyungah Shim
2003/121 (PDF ) A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol Michael Backes, Birgit Pfitzmann
2003/120 (PDF ) Physically Observable Cryptography Silvio Micali, Leonid Reyzin
2003/119 (PDF ) How Secure Are FPGAs in Cryptographic Applications? Thomas Wollinger, Christof Paar
2003/118 (PDF ) Visual Crypto Displays Enabling Secure Communications Pim Tuyls, Tom Kevenaar, Geert-Jan Schrijen, Toine Staring, Marten van Dijk
2003/117 (PDF ) An identity-based ring signature scheme from bilinear pairings Chih-Yin Lin, Tzong-Chen Wu
2003/116 (PDF ) A New ID-based Group Signature Scheme from Bilinear Pairings Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim
2003/115 (PDF ) Cryptanalysis of ID-based Tripartite Authenticated Key Agreement Protocols Kyungah Shim
2003/114 (PDF ) Unifying Simulatability Definitions in Cryptographic Systems under Different Timing Assumptions Michael Backes
2003/113 (PDF ) Security Analysis of Shim's Authenticated Key Agreement Protocols from Pairings Hung-Min Sun, Bin-Tsan Hsieh
2003/112 (PDF ) Accumulating Composites and Improved Group Signing Gene Tsudik, Shouhuai Xu
2003/110 (PDF ) Proposal on Personal Authentication System in which Biological Information is embedded in Cryptosystem Key Yukio Itakura, Shigeo Tsujii
2003/109 (PDF ) Crytanalysis of SAFER++ Alex Biryukov, Christophe De Cannière, Gustaf Dellkrantz
2003/108 (PDF ) Novel Cyclic and Algebraic Properties of AES Tri Van Le
2003/107 (PDF ) Fujisaki-Okamoto IND-CCA hybrid encryption revisited David Galindo, Sebastià Mart\'ın, Paz Morillo, Jorge L. Villar
2003/106 (PDF ) CWC: A high-performance conventional authenticated encryption mode Tadayoshi Kohno, John Viega, Doug Whiting
2003/105 (PDF ) On Diophantine Complexity and Statistical Zero-Knowledge Arguments Helger Lipmaa
2003/104 (PDF ) New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairing Fangguo Zhang, Reihaneh Safavi-Naini, Chih-Yin Lin
2003/103 (PDF ) Security analysis on Nalla-Reddy's ID-based tripartite authenticated key agreement protocols Zhongliang Chen
2003/102 (PDF ) Length-Based Attacks for Certain Group Based Encryption Rewriting Systems J. Hughes, A. Tannenbaum
2003/100 (PDF ) Protocols for Bounded-Concurrent Secure Two-Party Computation in the Plain Model Yehuda Lindell
2003/099 (PDF ) Algorithms in Braid Groups Matthew J. Campagna
2003/098 (PDF ) Side Channel Attacks on CBC Encrypted Messages in the PKCS#7 Format Vlastimil Klima, Tomas Rosa
2003/097 (PDF ) Low Cost Security: Explicit Formulae for Genus 4 Hyperelliptic Curves Jan Pelzl, Thomas Wollinger, Christof Paar
2003/096 (PDF ) Secure Proxy Signature Schemes for Delegation of Signing Rights Alexandra Boldyreva, Adriana Palacio, Bogdan Warinschi
2003/095 (PDF ) Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack Yevgeniy Dodis, Nelly Fazio
2003/094 (PDF ) Trace Zero Subvariety for Cryptosystems Tanja Lange
2003/093 (PDF ) Simple Stateless Steganography Leonid Reyzin, Scott Russell
2003/092 (PDF ) Provably-Secure Enhancement on 3GPP Authentication and Key Agreement Protocol Muxiang Zhang
2003/091 (PDF ) Sequential Aggregate Signatures from Trapdoor Permutations Anna Lysyanskaya, Silvio Micali, Leonid Reyzin, Hovav Shacham
2003/090 (PDF ) A Structured Multisignature Scheme from the Gap Diffie-Hellman Group Chih-Yin Lin, Tzong-Chen Wu, Fangguo Zhang
2003/089 (PDF ) Efficient Public Key Generation for Multivariate Cryptosystems Christopher Wolf
2003/088 (PDF ) Elliptic Curve Point Multiplication A. G. Rostovtsev, E. B. Makhovenko
2003/087 (PDF ) A Practical Elliptic Curve Public Key Encryption Scheme Provably Secure Against Adaptive Chosen-message Attack huafei zhu
2003/086 (PDF ) On the Selection of Pairing-Friendly Groups Paulo S. L. M. Barreto, Ben Lynn, Michael Scott
2003/085 (PDF ) A defect of the implementation schemes of the TTM cryptosystem Jintai Ding, Dieter Schmidt
2003/084 (PDF ) Cryptanalysis of an implementation scheme of the Tamed Transformation Method cryptosystem Jintai Ding, Timonthy Hodges
2003/083 (PDF ) A Forward-Secure Public-Key Encryption Scheme Ran Canetti, Shai Halevi, Jonathan Katz
2003/082 (PDF ) Stronger Security Bounds for OMAC, TMAC and XCBC Tetsu Iwata, Kaoru Kurosawa
2003/081 (PDF ) Primitive Specification for SOBER-128 Philip Hawkes, Greg Rose
2003/080 (PDF ) Non-interactive and Reusable Non-malleable Commitment Schemes Ivan Damgård, Jens Groth
2003/079 (PDF ) Fast arithmetic on Jacobians of Picard curves Stéphane Flon, Roger Oyono
2003/078 (PDF ) Relation among simulator-based and comparison-based definitions of semantic security Yodai Watanabe, Junji Shikata
2003/077 (PDF ) An Uninstantiable Random-Oracle-Model Scheme for a Hybrid Encryption Problem Mihir Bellare, Alexandra Boldyreva, Adriana Palacio
2003/076 (PDF ) Goldbach’s Conjecture on ECDSA Protocols N. Vijayarangan, Nitin Agarwal, S. Kasilingam
2003/075 (PDF ) Almost Security of Cryptographic Boolean Functions Kaoru Kurosawa
2003/074 (PDF ) Divisible Voting Scheme Natsuki Ishida, Shin'ichiro Matsuo, Wakaha Ogata
2003/073 (PDF ) A Scheme for obtaining a Warrant Message from the Digital Proxy Signatures Sunder Lal, Amit K Awasthi
2003/072 (PDF ) Proxy Blind Signature Scheme Amit K Awasthi, Sunder Lal
2003/071 (PDF ) How to Protect Against a Militant Spammer Markus Jakobsson, John Linn, Joy Algesheimer
2003/070 (PDF ) A Critique of CCM P. Rogaway, D. Wagner
2003/069 (PDF ) EAX: A Conventional Authenticated-Encryption Mode M. Bellare, P. Rogaway, D. Wagner
2003/068 (PDF ) On the Security of Some Proxy Signature Schemes Hung-Min Sun, Bin-Tsan Hsieh
2003/067 (PDF ) Forking Lemmas in the Ring Signatures' Scenario Javier Herranz, Germán Sáez
2003/066 (PDF ) Signcryption scheme for Identity-based Cryptosystems Divya Nalla, K. C. Reddy
2003/065 (PDF ) Hash Function Balance and its Impact on Birthday Attacks Mihir Bellare, Tadayoshi Kohno
2003/064 (PDF ) On the Optimality of Linear, Differential and Sequential Distinguishers Pascal Junod
2003/063 (PDF ) Initiator-Resilient Universally Composable Key Exchange Dennis Hofheinz, Joern Mueller-Quade, Rainer Steinwandt
2003/062 (PDF ) Extending Joux's Protocol to Multi Party Key Agreement Rana Barua, Ratna Dutta, Palash Sarkar
2003/061 (PDF ) Hidden Polynomial Cryptosystems Ilia Toli
2003/060 (PDF ) Isomorphism Classes of Picard Curves over Finite Fields Jong Won Lee
2003/058 (PDF ) An Elliptic Curve Trapdoor System Edlyn Teske
2003/057 (PDF ) Secure Multiplication of Shared Secrets in the Exponent Mario Di Raimondo, Rosario Gennaro
2003/056 (PDF ) Computing of Trust in Distributed Networks Huafei Zhu, Bao Feng, Robert H. Deng
2003/055 (PDF ) A New Approach to Prevent Blackmailing in E-Cash Xiaofeng Chen, Fangguo Zhang, Yumin Wang
2003/054 (PDF ) ID based Cryptosystems with Pairing on Elliptic Curve Ryuichi SAKAI, Masao KASAHARA
2003/053 (PDF ) Tate-pairing implementations for tripartite key agreement Iwan Duursma, Hyang-Sook Lee
2003/052 (PDF ) Attacking RSA-based Sessions in SSL/TLS Vlastimil Klima, Ondrej Pokorny, Tomas Rosa
2003/051 (PDF ) How to Predict the Output of a Hardware Random Number Generator Markus Dichtl
2003/050 (PDF ) Concealment and its Applications to Authenticated Encryption Yevgeniy Dodis, Jee Hea An
2003/049 (PDF ) Hidden Number Problem in Small Subgroups Igor Shparlinski, Arne Winterhof
2003/048 (PDF ) Compounding Secret Sharing Schemes E. Martinez-Moro, J. Mozo-Fernandez, C. Munuera
2003/047 (PDF ) A Construction of 100 bit Public-Key Cryptosystem and Digital Signature Scheme Masao KASAHARA, Ryuichi SAKAI
2003/046 (PDF ) Remarks on Saeednia's Identity-based Society Oriented Signature Scheme with Anonymous Signers Guilin Wang, Bo Zhu
2003/045 (PDF ) An algorithm to obtain an RSA modulus with a large private key L. Hernández Encinas, J. Muñoz Masqué, A. Queiruga Dios
2003/042 (PDF ) Timed Fair Exchange of Standard Signatures Juan A. Garay, Carl Pomerance
2003/041 (PDF ) A new statistical distinguisher for the shrinking generator Jovan Dj. Golic, Renato Menicocci
2003/040 (PDF ) Computing Partial Walsh Transform from the Algebraic Normal Form of a Boolean Function Kishan Chand Gupta, Palash Sarkar
2003/039 (PDF ) Torus-based cryptography Karl Rubin, Alice Silverberg
2003/038 (PDF ) Pretty-Simple Password-Authenticated Key-Exchange Under Standard Assumptions Kazukuni Kobara, Hideki Imai
2003/037 (PDF ) Strengthening Zero-Knowledge Protocols using Signatures Juan A. Garay, Philip MacKenzie, Ke Yang
2003/036 (PDF ) Cryptanalysis of a public-key encryption scheme based on the polynomial reconstruction problem Jean-Sebastien Coron
2003/035 (PDF ) On alternative approach for verifiable secret sharing Kamil Kulesza, Zbigniew Kotulski, Josef Pieprzyk
2003/034 (PDF ) On the (In)security of the Fiat-Shamir Paradigm Shafi Goldwasser, Yael Tauman
2003/033 (PDF ) Integral Cryptanalysis on reduced-round Safer++ Gilles Piret, Jean-Jacques Quisquater
2003/032 (PDF ) A Framework for Password-Based Authenticated Key Exchange Rosario Gennaro, Yehuda Lindell
2003/031 (PDF ) Cryptographic Tamper Evidence Gene Itkis
2003/030 (PDF ) Efficient Multi-Party Computation over Rings Ronald Cramer, Serge Fehr, Yuval Ishai, Eyal Kushilevitz
2003/028 (PDF ) Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults Mathieu Ciet, Marc Joye
2003/027 (PDF ) Cryptographic Randomized Response Techniques Andris Ambainis, Markus Jakobsson, Helger Lipmaa
2003/026 (PDF ) Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves (Update) Jan Pelzl, Thomas Wollinger, Jorge Guajardo, Christof Paar
2003/025 (PDF ) Homomorphic public-key cryptosystems and encrypting boolean circuits D. Grigoriev., I. Ponomarenko
2003/024 (PDF ) On Modeling IND-CCA Security in Cryptographic Protocols Dennis Hofheinz, Joern Mueller-Quade, Rainer Steinwandt
2003/023 (PDF ) New identity based signcryption schemes from pairings Benoît Libert, Jean-Jacques Quisquater
2003/022 (PDF ) Did Filiol Break AES ? Nicolas T. Courtois, Robert T. Johnson, Pascal Junod, Thomas Pornin, Michael Scott
2003/021 (PDF ) Interleaving Cryptography and Mechanism Design: The Case of Online Auctions Edith Elkind, Helger Lipmaa
2003/020 (PDF ) Attacks based on Conditional Correlations against the Nonlinear Filter Generator Bernhard Löhlein
2003/019 (PDF ) A Polynomial Time Algorithm for the Braid Diffie-Hellman Conjugacy Problem Jung Hee Cheon, Byungheup Jun
2003/018 (PDF ) An Authenticated Group Key Agreement Protocol on Braid groups HO-KYU LEE, HYANG-SOOK LEE, YOUNG-RAN LEE
2003/017 (PDF ) Perfect Hash Families with Few Functions Simon R. Blackburn
2003/016 (PDF ) A Threshold GQ Signature Scheme Cheng-Kang Chu, Li-Shan Liu, Wen-Guey Tzeng
2003/015 (PDF ) A Universally Composable Cryptographic Library Michael Backes, Birgit Pfitzmann, Michael Waidner
2003/014 (PDF ) Hiji-bij-bij: A New Stream Cipher with a Self-Synchronizing Mode of Operation Palash Sarkar
2003/013 (PDF ) Security Constraints on the Oswald-Aigner Exponentiation Algorithm Colin D. Walter
2003/012 (PDF ) The number of initial states of the RC4 cipher with the same cycle structure Marina Pudovkina
2003/011 (PDF ) Cryptanalysis of Lee-Hwang-Li's Key Authentication Scheme Fangguo Zhang, Kwangjo Kim
2003/010 (PDF ) Differential Fault Analysis on A.E.S. P. Dusart, G. Letourneux, O. Vivolo
2003/009 (PDF ) Domain Extenders for UOWHF: A Finite Binary Tree Algorithm Palash Sarkar
2003/008 (PDF ) DFA on AES Christophe Giraud
2003/006 (PDF ) Multi-Party Computation from any Linear Secret Sharing Scheme Secure against Adaptive Adversary: The Zero-Error Case Ventzislav Nikov, Svetla Nikova, Bart Preneel
2003/005 (PDF ) Distributing the Encryption and Decryption of a Block Cipher Keith M. Martin, Rei Safavi-Naini, Huaxiong Wang, Peter R. Wild
2003/004 (PDF ) ID-based tripartite Authenticated Key Agreement Protocols from pairings Divya Nalla, K. C. Reddy
2003/003 (PDF ) Plaintext-dependant Repetition Codes Cryptanalysis of Block Ciphers - The AES Case Eric FILIOL
2003/002 (PDF ) Imperfect Decryption and an Attack on the NTRU Encryption Scheme John Proos
2003/001 (PDF ) A Mode of Operation with Partial Encryption and Message Integrity Philip Hawkes, Gregory G. Rose
2002/195 (PDF ) An addition to the paper: A polarisation based visual crypto system and its secret sharing schemes H. D. L. Hollmann, J. H. v. Lint, L. Tolhuizen, P. Tuyls
2002/194 (PDF ) A polarisation based Visual Crypto System and its Secret Sharing Schemes P. Tuyls, H. D. L. Hollmann, J. H. v. Lint, L. Tolhuizen
2002/193 (PDF ) A Note on Ideal Tripartite Access Structures Michael J. Collins
2002/192 (PDF ) Security Proofs for an Efficient Password-Based Key Exchange Emmanuel Bresson, Olivier Chevassut, David Pointcheval
2002/191 (PDF ) A Linearization Attack on the Bluetooth Key Stream Generator Frederik Armknecht
2002/190 (PDF ) Parallelizable Authentication Trees Eric Hall, Charanjit S. Jutla
2002/189 (PDF ) Bit-Slice Auction Circuit Kaoru Kurosawa, Wakaha Ogata
2002/188 (PDF ) Key recovery attacks on NTRU without ciphertext validation routine Daewan Han, Jin Hong, Jae Woo Han, Daesung Kwon
2002/187 (PDF ) Entity Authentication Schemes Using Braid Word Reduction Hervé SIBERT, Patrick DEHORNOY, Marc GIRAULT
2002/186 (PDF ) Zero-Knowledge twenty years after its invention Oded Goldreich
2002/185 (PDF ) Turing, a fast stream cipher Greg Rose, Philip Hawkes
2002/184 (PDF ) Identity Based Authenticated Key Agreement Protocols from Pairings Liqun Chen, Caroline Kudla
2002/183 (PDF ) Simple backdoors to RSA key generation Claude Crépeau, Alain Slakmon
2002/182 (PDF ) Oblivious Keyword Search Wakaha Ogata, Kaoru Kurosawa
2002/181 (PDF ) Counting Points for Hyperelliptic Curves of type $y^2=x^5+ax$ over Finite Prime Fields Eisaku Furukawa, Mitsuru Kawazoe, Tetsuya Takahashi
2002/180 (PDF ) OMAC: One-Key CBC MAC Tetsu Iwata, Kaoru Kurosawa
2002/179 (PDF ) Parallel Algorithm for Multiplication on Elliptic Curves Juan Manuel Garcia Garcia, Rolando Menchaca Garcia
2002/178 (PDF ) Attack on A New Public Key Cryptosystem from ISC'02 (LNCS 2433) Fangguo Zhang, Shengli Liu, Kwangjo Kim
2002/177 (PDF ) two attacks on xia-you Group Signature Jianhong Zhang, Jilin Wang, Yumin Wang
2002/176 (PDF ) Theoretical Analysis of ``Correlations in RC6'' Masahiko Takenaka, Takeshi Shimoyama, Takeshi Koshiba
2002/175 (PDF ) Aggregate and Verifiably Encrypted Signatures from Bilinear Maps Dan Boneh, Craig Gentry, Ben Lynn, Hovav Shacham
2002/174 (PDF ) A Designer's Guide to KEMs Alexander W. Dent
2002/173 (PDF ) Efficient Group Signatures without Trapdoors Giuseppe Ateniese, Breno de Medeiros
2002/172 (PDF ) PECDSA. How to build a DL-based digital signature scheme with the best proven security Louis Granboulan
2002/171 (PDF ) Statistical weaknesses in the alleged RC4 keystream generator Marina Pudovkina
2002/170 (PDF ) An Analysis of RMAC Jack Lloyd
2002/169 (PDF ) Theoretical Use of Cache Memory as a Cryptanalytic Side-Channel D. Page
2002/168 (PDF ) New Signature Scheme Using Conjugacy Problem Ki Hyoung Ko, Doo Ho Choi, Mi Sung Cho, Jang Won Lee
2002/167 (PDF ) Cryptanalysis of Two New Signature Schemes Fangguo Zhang, Kwangjo Kim
2002/166 (PDF ) Multi-Party Authenticated Key Agreement Protocols from Multilinear Forms Ho-Kyu Lee, Hyang-Sook Lee, Young-Ran Lee
2002/165 (PDF ) Coercion-Resistant Electronic Elections Ari Juels, Dario Catalano, Markus Jakobsson
2002/164 (PDF ) Authenticated ID-based Key Exchange and remote log-in with simple token and PIN number Mike Scott
2002/163 (PDF ) Man-in-the-Middle in Tunnelled Authentication Protocols N. Asokan, Valtteri Niemi, Kaisa Nyberg
2002/162 (PDF ) On Constructing Locally Computable Extractors and Cryptosystems in the Bounded Storage Model Salil P. Vadhan
2002/161 (PDF ) Practical Verifiable Encryption and Decryption of Discrete Logarithms Jan Camenisch, Victor Shoup
2002/160 (PDF ) Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks Matt Blaze
2002/159 (PDF ) Related-Key and Key-Collision Attacks Against RMAC Tadayoshi Kohno
2002/158 (PDF ) The Book of Rijndaels Elad Barkan, Eli Biham
2002/157 (PDF ) In How Many Ways Can You Write Rijndael? Elad Barkan, Eli Biham
2002/155 (PDF ) Secure Bilinear Diffie-Hellman Bits Steven D. Galbraith, Herbie J. Hopkins, Igor E. Shparlinski
2002/154 (PDF ) On multi-exponentiation in cryptography Roberto M. Avanzi
2002/153 (PDF ) Weighted Coordinates on Genus 2 Hyperelliptic Curves Tanja Lange
2002/152 (PDF ) A note on Weak Keys of PES, IDEA and some Extended Variants Jorge Nakahara Jr, Bart Preneel, Joos Vandewalle
2002/151 (PDF ) Selective disclosure credential sets Jason E. Holt, Kent E. Seamons
2002/150 (PDF ) Cryptanalysis of the Lee-Hwang Group-Oriented Undeniable Signature Schemes Guilin Wang, Jianying Zhou, Robert H. Deng
2002/149 (PDF ) About Filliol's Observations on DES, AES and Hash Functions (draft) Nicolas T. Courtois
2002/148 (PDF ) The EMD Mode of Operation (A Tweaked, Wide-Blocksize, Strong PRP) Phillip Rogaway
2002/147 (PDF ) Inversion-Free Arithmetic on Genus 2 Hyperelliptic Curves Tanja Lange
2002/146 (PDF ) Bauer-Berson-Feiertag attack revisited Jun-Bum Shin, Kwang H. Lee
2002/145 (PDF ) Cryptanalysis of MQV with partially known nonces P. J. Leadbitter, N. P. Smart
2002/144 (PDF ) On Some Algebraic Structures in the AES Round Function A. M. Youssef, S. E. Tavares
2002/143 (PDF ) An Attack on the Isomorphisms of Polynomials Problem with One Secret Willi Geiselmann, Willi Meier, Rainer Steinwandt
2002/142 (PDF ) On the Applicability of Distinguishing Attacks Against Stream Ciphers Greg Rose, Philip Hawkes
2002/141 (PDF ) Applying General Access Structure to Proactive Secret Sharing Schemes Ventzislav Nikov, Svetla Nikova, Bart Preneel, Joos Vandewalle
2002/140 (PDF ) Universally Composable Two-Party and Multi-Party Secure Computation Ran Canetti, Yehuda Lindell, Rafail Ostrovsky, Amit Sahai
2002/139 (PDF ) Reaction Attacks on Public Key Cryptosystems Based on the Word Problem Maria Isabel Gonzalez Vasco, Rainer Steinwandt
2002/138 (PDF ) On the Security of HFE, HFEv- and Quartz Nicolas T. Courtois, Magnus Daum, Patrick Felke
2002/137 (PDF ) Provably Secure Steganography Nicholas J. Hopper, John Langford, Luis von Ahn
2002/136 (PDF ) Practical Non-Interactive Key Distribution Based on Pairings Régis Dupont, Andreas Enge
2002/135 (PDF ) Folklore, Practice and Theory of Robust Combiners Amir Herzberg
2002/134 (PDF ) Asynchronous Verifiable Secret Sharing and Proactive Cryptosystems Christian Cachin, Klaus Kursawe, Anna Lysyanskaya, Reto Strobl
2002/133 (PDF ) Efficient Construction of (Distributed) Verifiable Random Functions Yevgeniy Dodis
2002/132 (PDF ) Tight Lower Bound on Linear Authenticated Encryption Charanjit S. Jutla
2002/131 (PDF ) An Improved Pseudorandom Generator Based on Hardness of Factoring Nenad Dedic, Leonid Reyzin, Salil Vadhan
2002/130 (PDF ) OAEP++ : A Very Simple Way to Apply OAEP to Deterministic OW-CPA Primitives Kazukuni Kobara, Hideki Imai
2002/129 (PDF ) Key-collisions in (EC)DSA: Attacking Non-repudiation Tomas Rosa
2002/128 (PDF ) Perfectly Secure Message Transmission Revisited Yvo Desmedt, Yongge Wang
2002/127 (PDF ) Power of a Public Random Permutation and its Application to Authenticated-Encryption Kaoru Kurosawa
2002/126 (PDF ) Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference Ahmad-Reza Sadeghi, Michael Steiner
2002/125 (PDF ) The Jacobi Model of an Elliptic Curve and Side-Channel Analysis Olivier Billet, Marc Joye
2002/124 (PDF ) On Optimal Hash Tree Traversal for Interval Time-Stamping Helger Lipmaa
2002/123 (PDF ) New covering radius of Reed-Muller codes for $t$-resilient functions Kaoru Kurosawa, Tetsu Iwata, Takayuki Yoshiwara
2002/122 (PDF ) ID-Based One Round Authenticated Tripartite Key Agreement Protocol with Pairings Fangguo Zhang, Shengli Liu, Kwangjo Kim
2002/121 (PDF ) Efficient Arithmetic on Genus 2 Hyperelliptic Curves over Finite Fields via Explicit Formulae Tanja Lange
2002/120 (PDF ) Security Analysis of IKE's Signature-based Key-Exchange Protocol Ran Canetti, Hugo Krawczyk
2002/119 (PDF ) Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes Bodo Möller
2002/118 (PDF ) Efficient threshold signature, multisignature and blind signature schemes based on the Gap-Diffie-Hellman-group signature scheme Alexandra Boldyreva
2002/117 (PDF ) Diffie-Hellman Problems and Bilinear Maps Jung Hee Cheon, Dong Hoon Lee
2002/116 (PDF ) How to convert any ID-based Signature Schemes Claude Castelluccia
2002/115 (PDF ) Universal Padding Schemes for RSA Jean-Sébastien Coron, Marc Joye, David Naccache, Pascal Paillier
2002/114 (PDF ) Point Multiplication on Ordinary Elliptic Curves over Fields of Characteristic Three N. P. Smart, J. Westwood
2002/113 (PDF ) A Note on the Bilinear Diffie-Hellman Assumption Yacov Yacobi
2002/112 (PDF ) An Efficient Procedure to Double and Add Points on an Elliptic Curve Kirsten Eisentraeger, Kristin Lauter, Peter L. Montgomery
2002/111 (PDF ) On Linear Redundancy in the AES S-Box Joanne Fuller, William Millan
2002/110 (PDF ) The GGM Construction does NOT yield Correlation Intractable Function Ensembles Oded Goldreich
2002/109 (PDF ) A New Class of Unsafe Primes Qi Cheng
2002/107 (PDF ) Efficient Arithmetic on Hyperelliptic Curves Tanja Lange
2002/106 (PDF ) Secret sharing schemes on access structures with intersection number equal to one Jaume Marti-Farre, Carles Padro
2002/105 (PDF ) An Extension of Kedlaya's Algorithm to Hyperelliptic Curves in Characteristic 2 Jan Denef, Frederik Vercauteren
2002/104 (PDF ) Forward-Secure Signatures with Fast Key Update Anton Kozlov, Leonid Reyzin
2002/103 (PDF ) On the Power of Claw-Free Permutations Yevgeniy Dodis, Leonid Reyzin
2002/102 (PDF ) Applying General Access Structure to Metering Schemes Ventzislav Nikov, Svetla Nikova, Bart Preneel, Joos Vandewalle
2002/101 (PDF ) An Upper Bound on the Size of a Code with the $k$-Identifiable Parent Property Simon R. Blackburn
2002/100 (PDF ) Encryption-Scheme Security in the Presence of Key-Dependent Messages J. Black, P. Rogaway, T. Shrimpton
2002/099 (PDF ) A New Statistical Testing for Symmetric Ciphers and Hash Functions Eric Filiol
2002/098 (PDF ) Identity-Based Signcryption John Malone-Lee
2002/096 (PDF ) Generating Large Non-Singular Matrices over an Arbitrary Field with Blocks of Full Rank James Xiao, Yongxin Zhou
2002/094 (PDF ) Building curves with arbitrary small MOV degree over finite prime fields R. Dupont, A. Enge, F. Morain
2002/093 (PDF ) A Fuzzy Vault Scheme Ari Juels, Madhu Sudan
2002/092 (PDF ) TMAC: Two-Key CBC MAC Kaoru Kurosawa, Tetsu Iwata
2002/091 (PDF ) Multiplicative Masking and Power Analysis of AES Jovan Dj. Golić
2002/090 (PDF ) Efficient and Concurrent Zero-Knowledge from any public coin HVZK protocol Daniele Micciancio, Erez Petrank
2002/089 (PDF ) On Chosen Ciphertext Security of Multiple Encryptions Oded Goldreich, Yoad Lustig, Moni Naor
2002/088 (PDF ) Constructing Elliptic Curves with Prescribed Embedding Degrees Paulo S. L. M. Barreto, Ben Lynn, Michael Scott
2002/087 (PDF ) Higher Order Correlation Attacks, XL algorithm and Cryptanalysis of Toyocrypt Nicolas T. Courtois
2002/086 (PDF ) Adapting the weaknesses of the Random Oracle model to the Generic Group model. Alexander W. Dent
2002/085 (PDF ) Efficient and Player-Optimal Strong Consensus Matthias Fitzi, Juan A. Garay
2002/084 (PDF ) Towards Provably-Secure Timed E-Commerce: The Trusted Delivery Layer Amir Herzberg
2002/083 (PDF ) A semantically secure elliptic curve RSA scheme with small expansion factor David Galindo, Sebastià Mart\'ın, Paz Morillo, Jorge L. Villar
2002/082 (PDF ) Authentication of Quantum Messages Howard Barnum, Claude Crepeau, Daniel Gottesman, Adam Smith, Alain Tapp
2002/081 (PDF ) Some Applications of Threshold Signature Schemes to Distributed Protocols Vanesa Daza, Javier Herranz, Germán Sáez
2002/080 (PDF ) Applications of Multilinear Forms to Cryptography Dan Boneh, Alice Silverberg
2002/079 (PDF ) On the efficiency of the Clock Control Guessing Attack Erik Zenner
2002/078 (PDF ) Breaking and Provably Repairing the SSH Authenticated Encryption Scheme: A Case Study of the Encode-then-Encrypt-and-MAC Paradigm Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre
2002/077 (PDF ) Key-Insulated Public-Key Cryptosystems Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung
2002/076 (PDF ) Attack on Private Signature Keys of the OpenPGP Format, PGP(TM) Programs and Other Applications Compatible with OpenPGP Vlastimil Klima, Tomas Rosa
2002/075 (PDF ) Fault based cryptanalysis of the Advanced Encryption Standard J. Blöemer, J. -P. Seifert
2002/074 (PDF ) How to repair ESIGN Louis Granboulan
2002/073 (PDF ) Fault attacks on RSA with CRT: Concrete Results and Practical Countermeasures C. Aumüller, P. Bier, P. Hofreiter, W. Fischer, J. -P. Seifert
2002/072 (PDF ) Authenticated Identity-Based Encryption Ben Lynn
2002/071 (PDF ) Further Results and Considerations on Side Channel Attacks on RSA Vlastimil Klima, Tomas Rosa
2002/070 (PDF ) Weak Keys in MST1 Jens-Matthias Bohli, Maria Isabel Gonzalez Vasco, Consuelo Martinez, Rainer Steinwandt
2002/069 (PDF ) A Distributed and Computationally Secure Key Distribution Scheme Vanesa Daza, Javier Herranz, Carles Padró, Germán Sáez
2002/068 (PDF ) Improved key recovery of level 1 of the Bluetooth Encryption System Scott Fluhrer
2002/067 (PDF ) (Not So) Random Shuffles of RC4 Ilya Mironov
2002/066 (PDF ) Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV John Black, Phillip Rogaway, Thomas Shrimpton
2002/065 (PDF ) Secure Channels based on Authenticated Encryption Schemes: A Simple Characterization Chanathip Namprempre
2002/064 (PDF ) Protecting against Key Exposure: Strongly Key-Insulated Encryption with Optimal Threshold Mihir Bellare, Adriana Palacio
2002/063 (PDF ) On some Attacks on Multi-prime RSA M Jason Hinek, Mo King Low, Edlyn Teske
2002/062 (PDF ) ABC - A Block Cipher Dieter Schmidt
2002/061 (PDF ) Strengthened Encryption in the CBC Mode Vlastimil Klima, Tomas Rosa
2002/060 (PDF ) A Forward-Secure Public-Key Encryption Scheme Jonathan Katz
2002/059 (PDF ) Universally Composable Notions of Key Exchange and Secure Channels Ran Canetti, Hugo Krawczyk
2002/058 (PDF ) Construction of UOWHF: Tree Hashing Revisited Palash Sarkar
2002/057 (PDF ) A Simpler Construction of CCA2-Secure Public-Key Encryption Under General Assumptions Yehuda Lindell
2002/056 (PDF ) Hierarchical ID-Based Cryptography Craig Gentry, Alice Silverberg
2002/055 (PDF ) Concurrent Zero Knowledge Proofs with Logarithmic Round-Complexity Manoj Prabhakaran, Amit Sahai
2002/054 (PDF ) SiBIR: Signer-Base Intrusion-Resilient Signatures Gene Itkis, Leonid Reyzin
2002/053 (PDF ) Extended Validity and Consistency in Byzantine Agreement Matthias Fitzi, Martin Hirt, Thomas Holenstein, Jürg Wullschleger
2002/052 (PDF ) A Variant of the Cramer-Shoup Cryptosystem for Groups with Unknwon Order Stefan Lucks
2002/051 (PDF ) Fully Distributed Proxy Signature Schemes Javier Herranz, Germán Sáez
2002/050 (PDF ) Secret sharing schemes with three or four minimal qualified subsets Jaume Martí-Farré, Carles Padró
2002/049 (PDF ) Tensor Transform of Boolean Functions and Related Algebraic and Probabilistic Properties Alexander Kholosha, Henk C. A. van Tilborg
2002/048 (PDF ) Towards a Uniform Description of Several Group Based Cryptographic Primitives Maria Isabel Gonzalez Vasco, Consuelo Martinez, Rainer Steinwandt
2002/047 (PDF ) Universal Composition with Joint State Ran Canetti, Tal Rabin
2002/046 (PDF ) On the Security of Joint Signature and Encryption Jee Hea An, Yevgeniy Dodis, Tal Rabin
2002/045 (PDF ) Cryptanalysis of S-DES Dr. K. S. Ooi, Brain Chin Vito
2002/044 (PDF ) Cryptanalysis of Block Ciphers with Overdefined Systems of Equations Nicolas Courtois, Josef Pieprzyk
2002/043 (PDF ) Strict Polynomial-time in Simulation and Extraction Boaz Barak, Yehuda Lindell
2002/042 (PDF ) A Unified Methodology For Constructing Public-Key Encryption Schemes Secure Against Adaptive Chosen-Ciphertext Attack Edith Elkind, Amit Sahai
2002/041 (PDF ) New Results on Boomerang and Rectangle Attack Eli Biham, Orr Dunkelman, Nathan Keller
2002/040 (PDF ) Secure Computation Without Agreement Shafi Goldwasser, Yehuda Lindell
2002/039 (PDF ) Partial Key Escrow Monitoring Scheme Jiang Shaoquan, Zhang Yufeng
2002/037 (PDF ) An efficient semantically secure elliptic curve cryptosystem based on KMOV David Galindo, Sebastià Mart\'ın, Paz Morillo, Jorge L. Villar
2002/036 (PDF ) Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups Ronald Cramer, Serge Fehr
2002/035 (PDF ) Tripartite Authenticated Key Agreement Protocols from Pairings Sattam S. Al-Riyami, Kenneth G. Paterson
2002/034 (PDF ) An OAEP Variant With a Tight Security Proof Jakob Jonsson
2002/033 (PDF ) Equivalence between semantic security and indistinguishability against chosen ciphertext attacks Yodai Watanabe, Junji Shikata, Hideki Imai
2002/032 (PDF ) Supersingular Hyperelliptic Curve of Genus 2 over Finite Fields Y. Choie, E. Jeong, E. Lee
2002/031 (PDF ) A Parallelizable Design Principle for Cryptographic Hash Functions Palash Sarkar, Paul J. Schellenberg
2002/030 (PDF ) Adaptive chi-square test and its application to some cryptographic problems. Boris Ryabko
2002/029 (PDF ) Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products Joy Algesheimer, Jan Camenisch, Victor Shoup
2002/028 (PDF ) A Universal Forgery of Hess's Second ID-based Signature against the Known-message Attack Jung Hee Cheon
2002/027 (PDF ) Efficient and Non-Malleable Proofs of Plaintext Knowledge and Applications Jonathan Katz
2002/026 (PDF ) Generic Groups, Collision Resistance, and ECDSA Daniel R. L. Brown
2002/025 (PDF ) Making Mix Nets Robust For Electronic Voting By Randomized Partial Checking Markus Jakobsson, Ari Juels, Ron Rivest
2002/023 (PDF ) Almost Optimal Hash Sequence Traversal Don Coppersmith, Markus Jakobsson
2002/022 (PDF ) From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security Michel Abdalla, Jee Hea An, Mihir Bellare, Chanathip Namprempre
2002/021 (PDF ) Spectral Analysis of Boolean Functions under Non-uniformity of Arguments Kanstantsin Miranovich
2002/020 (PDF ) Cryptanalysis of stream ciphers with linear masking Don Coppersmith, Shai Halevi, Charanjit Jutla
2002/019 (PDF ) Scream: a software-efficient stream cipher Shai Halevi, Don Coppersmith, Charanjit Jutla
2002/018 (PDF ) An Identity-Based Signature from Gap Diffie-Hellman Groups Jae Choon Cha, Jung Hee Cheon
2002/017 (PDF ) The Cramer-Shoup Strong-RSA Signature Scheme Revisited Marc Fischlin
2002/016 (PDF ) Content Extraction Signatures Ron Steinfeld, Laurence Bull, Yuliang Zheng
2002/015 (PDF ) Security proofs of cryptographic protocols Eva Jencusova
2002/014 (PDF ) Better than BiBa: Short One-time Signatures with Fast Signing and Verifying Leonid Reyzin, Natan Reyzin
2002/013 (PDF ) Generic Lower Bounds for Root Extraction and Signature Schemes in General Groups Ivan Damgard, Maciej Koprowski
2002/012 (PDF ) Exponent Group Signature Schemes and Efficient Identity Based Signature Schemes Based on Pairings F. Hess
2002/011 (PDF ) Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages Jean-Sebastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen
2002/010 (PDF ) Cut and Paste Attacks with Java Serge Lefranc, David Naccache
2002/009 (PDF ) Tree-based Group Key Agreement Yongdae Kim, Adrian Perrig, Gene Tsudik
2002/008 (PDF ) Efficient Algorithms for Pairing-Based Cryptosystems Paulo S. L. M. Barreto, Hae Y. Kim, Ben Lynn, Michael Scott
2002/007 (PDF ) Parallel scalar multiplication on general elliptic curves over $\mathbb{F}_p$ hedged against Non-Differential Side-Channel Attacks Wieland Fischer, Christophe Giraud, Erik Woodward Knudsen, Jean-Pierre Seifert
2002/006 (PDF ) The best and worst of supersingular abelian varieties in cryptology Karl Rubin, Alice Silverberg
2002/005 (PDF ) Cryptanalysis of Stream Cipher COS (2,128) Mode I Hongjun Wu, Feng Bao
2002/004 (PDF ) ID-based Signatures from Pairings on Elliptic Curves Kenneth G. Paterson
2002/003 (PDF ) Square Attacks on Reduced-Round Variants of the Skipjack Block Cipher Jorge Nakahara Jr, Bart Preneel, Joos Vandewalle
2002/002 (PDF ) Evaluating Security of Voting Schemes in the Universal Composability Framework Jens Groth
2002/001 (PDF ) Fractal Hash Sequence Representation and Traversal Markus Jakobsson
2001/113 (PDF ) Efficient Revocation of Anonymous Group Membership Jan Camenisch, Anna Lysyanskaya
2001/112 (PDF ) A Proposal for an ISO Standard for Public Key Encryption Victor Shoup
2001/111 (PDF ) An Identity Based Authenticated Key Agreement Protocol Based on the Weil Pairing N. P. Smart
2001/110 (PDF ) RSA hybrid encryption schemes Louis Granboulan
2001/109 (PDF ) New Notions of Soundness and Simultaneous Resettability in the Public-Key Model Yunlei ZHAO
2001/108 (PDF ) Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack Ronald Cramer, Victor Shoup
2001/107 (PDF ) Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation Yehuda Lindell
2001/106 (PDF ) Cryptanalysis of the COS (2,128) Stream Ciphers Steve Babbage
2001/105 (PDF ) Universal Arguments and their Applications Boaz Barak, Oded Goldreich
2001/104 (PDF ) Concurrent Zero-Knowledge With Timing, Revisited Oded Goldreich
2001/103 (PDF ) Countermeasures against Side-Channel Attacks for Elliptic Curve Cryptosystems Antonio Bellezza
2001/102 (PDF ) An Extended Quadratic Frobenius Primality Test with Average Case Error Estimates Ivan Damgård, Gudmund Frandsen
2001/101 (PDF ) Quasi-Efficient Revocation of Group Signatures Giuseppe Ateniese, Dawn Song, Gene Tsudik
2001/100 (PDF ) A Note on Girault's Self-Certified Model Shahrokh Saeednia
2001/099 (PDF ) Linear Code Implies Public-Key Traitor Tracing Kaoru Kurosawa, Takuya Yoshida
2001/098 (PDF ) Fast hashing onto elliptic curves over fields of characteristic 3 Paulo S. L. M. Barreto, Hae Yong Kim
2001/097 (PDF ) An Efficient MAC for Short Messages Sarvar Patel
2001/096 (PDF ) Constructing elliptic curves with a given number of points over a finite field Amod Agashe, Kristin Lauter, Ramarathnam Venkatesan
2001/095 (PDF ) Secure Vickrey Auctions without Threshold Trust Helger Lipmaa, N. Asokan, Valtteri Niemi
2001/094 (PDF ) Slope packings and coverings, and generic algorithms for the discrete logarithm problem M. Chateauneuf, A. C. H. Ling, D. R. Stinson
2001/093 (PDF ) Threshold Cryptosystems Based on Factoring Jonathan Katz, Moti Yung
2001/092 (PDF ) BDD-based Cryptanalysis of Keystream Generators Matthias Krause
2001/091 (PDF ) Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor Ivan Damgård, Jesper B. Nielsen
2001/090 (PDF ) Identity Based Encryption From the Weil Pairing Dan Boneh, Matthew Franklin
2001/089 (PDF ) Linear broadcast encryption schemes Carles Padró, Ignacio Gracia, Sebastià Martín, Paz Morillo
2001/088 (PDF ) Improving the trade-off between storage and communication in broadcast encryption schemes Ignacio Gracia, Sebastià Martín, Carles Padró
2001/087 (PDF ) A Linear Algebraic Approach to Metering Schemes C. Blundo, S. Martìn, B. Masucci, C. Padrò
2001/086 (PDF ) Statistical Zero-Knowledge Proofs from Diophantine Equations Helger Lipmaa
2001/085 (PDF ) Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption Ronald Cramer, Victor Shoup
2001/084 (PDF ) Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree Markus Maurer, Alfred Menezes, Edlyn Teske
2001/083 (PDF ) On the Constructing of Highly Nonlinear Resilient Boolean Functions by Means of Special Matrices Maria Fedorova, Yuriy Tarannikov
2001/082 (PDF ) A Description of Protocols for Private Credentials Ariel Glenn, Ian Goldberg, Frédéric Légaré, Anton Stiglic
2001/081 (PDF ) A Sufficient Condition for Secure Ping--Pong Protocols Masao Mori
2001/080 (PDF ) COS Ciphers are not "extremely weak"! - The Design Rationale of COS Ciphers Eric Filiol, Caroline Fontaine
2001/079 (PDF ) Authenticated Encryption in the Public-Key Setting: Security Notions and Analyses Jee Hea An
2001/078 (PDF ) The COS Stream Ciphers are Extremely Weak Steve Babbage
2001/077 (PDF ) A Time-Memory Tradeoff Attack Against LILI-128 Markku-Juhani Olavi Saarinen
2001/076 (PDF ) Communication Complexity and Secure Function Evaluation Moni Naor, Kobbi Nissim
2001/075 (PDF ) Pseudo-Random Functions and Factoring Moni Naor, Omer Reingold, Alon Rosen
2001/074 (PDF ) On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit - A New Construction Eliane Jaulmes, Antoine Joux, Frederic Valette
2001/073 (PDF ) Efficient oblivious transfer schemes Wen-Guey Tzeng
2001/072 (PDF ) On the Goubin-Courtois Attack on TTM T. Moh, Jiun-Ming Chen
2001/071 (PDF ) Multi-Recipient Public-Key Encryption with Shortened Ciphertext Kaoru Kurosawa
2001/070 (PDF ) Security Assessment of Hierocrypt and Rijndael against the Differential and Linear Cryptanalysis (Extended Abstract) Kenji Ohkuma, Hideo Shimizu, Fumihiko Sano, Shinichi Kawamura
2001/069 (PDF ) On the (Im)possibility of Obfuscating Programs Boaz Barak, Oded Goldreich, Russell Impagliazzo, Steven Rudich, Amit Sahai, Salil Vadhan, Ke Yang
2001/068 (PDF ) SQUARE Attacks on Reduced-Round PES and IDEA Block Ciphers J. Nakahara Jr, P. S. L. M. Barreto, B. Preneel, J. Vandewalle, H. Y. Kim
2001/067 (PDF ) An Attack on A Traitor Tracing Scheme Jeff Jianxin Yan, Yongdong Wu
2001/066 (PDF ) IMPROVED PUBLIC KEY CRYPTOSYSTEM USING FINITE NON ABELIAN GROUPS SEONG-HUN PAENG, DAESUNG KWON, KIL-CHAN HA, JAE HEON KIM
2001/065 (PDF ) Analysis of chosen plaintext attacks on the WAKE Stream Cipher Marina Pudovkina
2001/064 (PDF ) An Integer Commitment Scheme based on Groups with Hidden Order Ivan Damgard, Eiichiro Fujisaki
2001/063 (PDF ) Resettably-Sound Zero-Knowledge and its Applications Boaz Barak, Oded Goldreich, Shafi Goldwasser, Yehuda Lindell
2001/062 (PDF ) Optimal security proofs for PSS and other signature schemes Jean-Sébastien Coron
2001/061 (PDF ) Clock-Controlled Shift Registers for Key-Stream Generation Alexander Kholosha
2001/060 (PDF ) The Security of Practical Two-Party RSA Signature Schemes Mihir Bellare, Ravi Sandhu
2001/059 (PDF ) Revocation and Tracing Schemes for Stateless Receivers Dalit Naor, Moni Naor, Jeff Lotspiech
2001/058 (PDF ) Efficient Zero-knowledge Authentication Based on a Linear Algebra Problem MinRank Nicolas T. Courtois
2001/057 (PDF ) On the Security of the SPEKE Password-Authenticated Key Exchange Protocol Philip MacKenzie
2001/056 (PDF ) On the Complexity of Matsui's Attack P. Junod
2001/055 (PDF ) Universally Composable Commitments Ran Canetti, Marc Fischlin
2001/054 (PDF ) Extending the GHS Weil Descent Attack S. D. Galbraith, F. Hess, N. P. Smart
2001/053 (PDF ) Security Proofs for the RSA-PSS Signature Scheme and Its Variants Jakob Jonsson
2001/052 (PDF ) Differential Probability of Modular Addition with a Constant Operand Alexis Warner Machado
2001/051 (PDF ) Black-Box Concurrent Zero-Knowledge Requires $\tilde\Omega(\log n)$ Rounds Ran Canetti, Joe Kilian, Erez Petrank, Alon Rosen
2001/050 (PDF ) Elliptic curve Paillier schemes Steven D Galbraith
2001/049 (PDF ) A known plaintext attack on the ISAAC keystream generator Marina Pudovkina
2001/048 (PDF ) Forward-Secure Signatures with Optimal Signing and Verifying Gene Itkis, Leonid Reyzin
2001/047 (PDF ) ON THE METHOD OF "XL" AND ITS INEFFICIENCY TO TTM T. MOH
2001/046 (PDF ) The simple ideal cipher system Boris Ryabko
2001/045 (PDF ) The order of encryption and authentication for protecting communications (Or: how secure is SSL?) Hugo Krawczyk
2001/044 (PDF ) Optimistic Asynchronous Multi-Party Contract Signing with Reduced Number of Rounds Birgit Baum-Waidner
2001/043 (PDF ) Cryptanalysis of the Vesta-2M Stream Cipher Marina Pudovkina
2001/042 (PDF ) Simple Forward-Secure Signatures From Any Signature Scheme Hugo Krawczyk
2001/041 (PDF ) Solving Elliptic Curve Discrete Logarithm Problems Using Weil Descent Michael Jacobson, Alfred Menezes, Andreas Stein
2001/040 (PDF ) Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels Ran Canetti, Hugo Krawczyk
2001/039 (PDF ) Robust Software Tokens: Towards Securing a Digital Identity Taekyoung Kwon
2001/038 (PDF ) Flaws in differential cryptanalysis of Skipjack Louis Granboulan
2001/037 (PDF ) EMpowering Side-Channel Attacks Josyula R. Rao, Pankaj Rohatgi
2001/036 (PDF ) Anti-persistence: History Independent Data Structures Moni Naor, Vanessa Teague
2001/035 (PDF ) Forward-Security in Private-Key Cryptography Mihir Bellare, Bennet Yee
2001/034 (PDF ) Composition and Efficiency Tradeoffs for Forward-Secure Digital Signatures Tal Malkin, Daniele Micciancio, Sara Miner
2001/033 (PDF ) Dual of New Method for Upper Bounding the Maximum Average Linear Hull Probability for SPNs Liam Keliher, Henk Meijer, Stafford Tavares
2001/032 (PDF ) Efficient and Non-Interactive Non-Malleable Commitment Giovanni Di Crescenzo, Jonathan Katz, Rafail Ostrovsky, Adam Smith
2001/031 (PDF ) Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords Jonathan Katz, Rafail Ostrovsky, Moti Yung
2001/030 (PDF ) On the Power of Nonlinear Secret-Sharing Amos Beimel, Yuval Ishai
2001/029 (PDF ) On multivariate signature-only public key cryptosystems Nicolas T. Courtois
2001/028 (PDF ) Efficient Encryption for Rich Message Spaces Under General Assumptions Alexander Russell, Hong Wang
2001/027 (PDF ) A Block-Cipher Mode of Operation for Parallelizable Message Authentication John Black, Phillip Rogaway
2001/026 (PDF ) OCB Mode Phillip Rogaway, Mihir Bellare, John Black, Ted Krovetz
2001/024 (PDF ) Secure Multiparty Computation of Approximations Joan Feigenbaum, Yuval Ishai, Tal Malkin, Kobbi Nissim, Martin Strauss, Rebecca N. Wright
2001/023 (PDF ) Robustness for Free in Unconditional Multi-Party Computation Martin Hirt, Ueli Maurer
2001/022 (PDF ) Optimistic Asynchronous Atomic Broadcast Klaus Kursawe, Victor Shoup
2001/021 (PDF ) The Rectangle Attack - Rectangling the Serpent Biham Eli, Orr Dunkelman, Nathan Keller
2001/020 (PDF ) Some observations on the theory of cryptographic hash functions D. R. Stinson
2001/019 (PDF ) An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation Jan Camenisch, Anna Lysyanskaya
2001/018 (PDF ) Analysis of a Subset Sum Randomizer Peter Gemmell, Anna Johnston
2001/017 (PDF ) On adaptive vs. non-adaptive security of multiparty protocols Ran Canetti, Ivan Damgard, Stefan Dziembowski, Yuval Ishai, Tal Malkin
2001/016 (PDF ) Efficient Traitor Tracing Algorithms using List Decoding Alice Silverberg, Jessica Staddon, Judy Walker
2001/015 (PDF ) An observation regarding Jutla's modes of operation Shai Halevi
2001/014 (PDF ) Timed-Release Cryptography Wenbo Mao
2001/013 (PDF ) Digitally Watermarking RSA Moduli Anna M. Johnston
2001/012 (PDF ) Ciphers with Arbitrary Finite Domains John Black, Phillip Rogaway
2001/011 (PDF ) New Zero-knowledge Undeniable Signatures - Forgery of Signature Equivalent to Factorisation Wenbo Mao
2001/010 (PDF ) How to achieve a McEliece-based Digital Signature Scheme Nicolas Courtois, Matthieu Finiasz, Nicolas Sendrier
2001/009 (PDF ) Robust key-evolving public key encryption schemes Wen-Guey Tzeng, Zhi-Jia Tzeng
2001/008 (PDF ) Fully Distributed Threshold RSA under Standard Assumptions Pierre-Alain Fouque, Jacques Stern
2001/007 (PDF ) Are 'Strong' Primes Needed for RSA Ron Rivest, Robert Silverman
2001/006 (PDF ) Secure and Efficient Asynchronous Broadcast Protocols Christian Cachin, Klaus Kursawe, Frank Petzold, Victor Shoup
2001/005 (PDF ) A Note on Cryptanalysis of the Preliminary Version of the NTRU Signature Scheme Ilya Mironov
2001/003 (PDF ) Separating Decision Diffie-Hellman from Diffie-Hellman in cryptographic groups Antoine Joux, Kim Nguyen
2001/002 (PDF ) The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme M. Bellare, C. Namprempre, D. Pointcheval, M. Semanko
2001/001 (PDF ) Efficient Algorithms for Computing Differential Properties of Addition Helger Lipmaa, Shiho Moriai
2000/069 (PDF ) New constructions of resilient Boolean functions with maximal nonlinearity Yuriy Tarannikov
2000/068 (PDF ) A Content Certified E-mail Protocol with a Public Mailbox Tak-Ming Law
2000/067 (PDF ) Universally Composable Security: A New Paradigm for Cryptographic Protocols Ran Canetti
2000/066 (PDF ) A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission Birgit Pfitzmann, Michael Waidner
2000/065 (PDF ) How to Encrypt Long Messages without Large Size Symmetric/Asymmetric Encryption Schemes Masashi Mitomo, Kaoru Kurosawa
2000/064 (PDF ) On the Security of Modular Exponentiation with Application to the Construction of Pseudorandom Generators Oded Goldreich, Vered Rosen
2000/063 (PDF ) Candidate One-Way Functions Based on Expander Graphs Oded Goldreich
2000/061 (PDF ) RSA-OAEP is Secure under the RSA Assumption Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointcheval, Jacques Stern
2000/060 (PDF ) OAEP Reconsidered Victor Shoup
2000/059 (PDF ) Essential Shannon Security with Keys Smaller Than the Encrypted Message Gideon Samid
2000/058 (PDF ) Graph-Based Authentication of Digital Streams Sara Miner, Jessica Staddon
2000/057 (PDF ) Session-Key Generation using Human Passwords Only Oded Goldreich, Yehuda Lindell
2000/056 (PDF ) A Complete Problem for Statistical Zero Knowledge Amit Sahai, Salil Vadhan
2000/055 (PDF ) Multiparty Computation from Threshold Homomorphic Encryption Ronald Cramer, Ivan Damgård, Jesper Buus Nielsen
2000/054 (PDF ) Correlation Immune Boolean Functions with Very High Nonlinearity Subhamoy Maitra
2000/053 (PDF ) A Construction of Resilient Functions with High Nonlinearity Thomas Johansson, Enes Pasalic
2000/052 (PDF ) CRYPTANALYSIS OF THE A5/2 ALGORITHM Slobodan Petrovic, Amparo Fúster-Sabater
2000/051 (PDF ) Reducing the Gate Count of Bitslice DES Matthew Kwan
2000/050 (PDF ) Spectral Analysis of High Order Correlation Immune Functions Yuriy Tarannikov, Denis Kirienko
2000/049 (PDF ) Spectral Domain Analysis of Correlation Immune and Resilient Boolean Functions Palash Sarkar
2000/048 (PDF ) New Constructions of Resilent and Correlation Immune Boolean Functions achieving Upper Bounds on Nonlinearity Enes Pasalic, Thomas Johansson, Subhamoy Maitra, Palash Sarkar
2000/047 (PDF ) Highly Nonlinear Balanced Boolean Functions with very good Autocorrelation Property Subhamoy Maitra
2000/046 (PDF ) The Saturation Attack - a Bait for Twofish Stefan Lucks
2000/045 (PDF ) Efficient Zero-Knowledge Proofs of Knowledge Without Intractability Assumptions Ronald Cramer, Ivan Damgård, Philip MacKenzie
2000/044 (PDF ) Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman Victor Boyko, Philip MacKenzie, Sarvar Patel
2000/043 (PDF ) Constructions and Bounds for Unconditionally Secure Commitment Schemes C. Blundo, B. Masucci, D. R. Stinson, R. Wei
2000/042 (PDF ) Constructing Pseudo-Random Permutations with a Prescribed Structure Moni Naor, Omer Reingold
2000/041 (PDF ) On Symmetrically Private Information Retrieval Sanjeev Kumar Mishra
2000/040 (PDF ) Decimation Attack of Stream Ciphers Eric FILIOL
2000/039 (PDF ) Encryption Modes with Almost Free Message Integrity Charanjit S. Jutla
2000/038 (PDF ) On the Complexity of Verifiable Secret Sharing and Multi-Party Computation Ronald Cramer, Ivan Damgård, Stefan Dziembowski
2000/037 (PDF ) General Secure Multi-Party Computation from any Linear Secret Sharing Scheme Ronald Cramer, Ivan Damgård, Ueli Maurer
2000/036 (PDF ) Using fewer Qubits in Shor's Factorization Algorithm via Simultaneous Diophantine Approximation Jean-Pierre Seifert
2000/035 (PDF ) Electronic Jury Voting Protocols Alejandro Hevia, Marcos Kiwi
2000/034 (PDF ) Random Oracles in Constantinople: Practical Asynchronous Byzantine Agreement using Cryptography Christian Cachin, Klaus Kursawe, Victor Shoup
2000/033 (PDF ) The Complete Distribution of Linear Probabilities of MARS' s-box Kazumaro Aoki
2000/032 (PDF ) Anonymous Fingerprinting with Direct Non-Repudiation Birgit Pfitzmann, Ahmad-Reza Sadeghi
2000/031 (PDF ) Forward Security in Threshold Signature Schemes Michel Abdalla, Sara Miner, Chanathip Namprempre
2000/029 (PDF ) Concrete Security Characterizations of PRFs and PRPs: Reductions and Applications Anand Desai, Sara Miner
2000/028 (PDF ) An Information-Theoretic Model for Steganography Christian Cachin
2000/027 (PDF ) Accountable Certificate Management using Undeniable Attestations Ahto Buldas, Peeter Laud, Helger Lipmaa
2000/026 (PDF ) Authentication and Key Agreement via Memorable Password Taekyoung Kwon
2000/025 (PDF ) Authenticated Encryption: Relations among notions and analysis of the generic composition paradigm Mihir Bellare, Chanathip Namprempre
2000/024 (PDF ) Security of the Most Significant Bits of the Shamir Message Passing Scheme Maria Isabel Gonzalez Vasco, Igor E. Shparlinski
2000/023 (PDF ) Security of Polynomial Transformations of the Diffie--Hellman Key Igor Shparlinski
2000/022 (PDF ) ACE: The Advanced Cryptographic Engine Thomas Schweinberger, Victor Shoup
2000/021 (PDF ) An Efficient Identification Scheme Based on Permuted Patterns Shahrokh Saeednia
2000/020 (PDF ) On the Security of Diffie--Hellman Bits Maria Isabel Gonzalez Vasco, Igor E. Shparlinski
2000/019 (PDF ) Threshold Cryptography Secure Against the Adaptive Adversary, Concurrently Anna Lysyanskaya
2000/017 (PDF ) Lower Bounds on the Efficiency of Generic Cryptographic Constructions Rosario Gennaro, Luca Trevisan
2000/015 (PDF ) Identification Protocols Secure Against Reset Attacks Mihir Bellare, Marc Fischlin, Shafi Goldwasser, Silvio Micali
2000/014 (PDF ) Authenticated Key Exchange Secure Against Dictionary Attacks Mihir Bellare, David Pointcheval, Phillip Rogaway
2000/013 (PDF ) Concurrent Zero-Knowledge in Poly-logarithmic Rounds Joe Kilian, Erez Petrank
2000/011 (PDF ) Tailored Key Encryption (TaKE) Tailoring a key for a given pair of plaintext/ciphertext Gideon Samid
2000/010 (PDF ) The Security of Chaffing and Winnowing Mihir Bellare, Alexandra Boldyreva
2000/009 (PDF ) New Directions in Design of Resilient Boolean Functions Palash Sarkar, Subhamoy Maitra
2000/008 (PDF ) Efficient Protocols based on Probabilistic Encryption using Composite Degree Residue Classes Ivan Damgård, Mads Jurik
2000/007 (PDF ) Public Electronic Contract Protocol Tak-Ming Law
2000/006 (PDF ) An Encryption Algorithm and Key-stream Generator for Chinese Text Messages by Character Internal Code Structure Tak-Ming Law
2000/005 (PDF ) On Resilient Boolean Functions with Maximal Possible Nonlinearity Yuriy Tarannikov
2000/004 (PDF ) Combinatorial Properties of Frameproof and Traceability Codes J. N. Staddon, D. R. Stinson, R. Wei
2000/002 (PDF ) A New Forward-Secure Digital Signature Scheme Michel Abdalla, Leonid Reyzin
2000/001 (PDF ) On Security Preserving Reductions -- Revised Terminology Oded Goldreich
1999/024 (PDF ) A tool for obtaining tighter security analyses of pseudorandom function based constructions, with applications to PRP to PRF conversion M. Bellare, R. Impagliazzo
1999/023 (PDF ) Concurrent Zero-Knowledge Cynthia Dwork, Moni Naor, Amit Sahai
1999/022 (PDF ) Resettable Zero-Knowledge Ran Canetti, Oded Goldreich, Shafi Goldwasser, Silvio Micali
1999/021 (PDF ) Public-Key Cryptography and Password Protocols: The Multi-User Case Maurizio Kliban Boyarsky
1999/020 (PDF ) Improving the Exact Security of Digital Signature Schemes Silvio Micali, Leonid Reyzin
1999/019 (PDF ) Security of all RSA and Discrete Log Bits Johan Hastad, Mats Naslund
1999/018 (PDF ) Non-Malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization Mihir Bellare, Amit Sahai
1999/017 (PDF ) A Composition Theorem for Universal One-Way Hash Functions Victor Shoup
1999/016 (PDF ) A forward-secure digital signature scheme Mihir Bellare, Sara Miner
1999/015 (PDF ) Interleaved Zero-Knowledge in the Public-Key Model Oded Goldreich, Shafi Goldwasser, Silvio Micali
1999/014 (PDF ) Concurrent Zero-Knowledge is Easy in Practice Ivan Damgard
1999/013 (PDF ) Secure Hash-and-Sign Signatures without the Random Oracle Rosario Gennaro, Shai Halevi, Tal Rabin
1999/012 (PDF ) On Formal Models for Secure Key Exchange Victor Shoup
1999/011 (PDF ) Practical Threshold Signatures Victor Shoup
1999/010 (PDF ) A Relationship between One-Wayness and Correlation Intractability Satoshi Hada, Toshiaki Tanaka
1999/009 (PDF ) On the Existence of3-Round Zero-Knowledge Protocols Satoshi Hada, Toshiaki Tanaka
1999/008 (PDF ) Verifiable Encryption and Applications to Group Signatures and Signature Sharing Jan Camenisch, Ivan Damgaard
1999/007 (PDF ) DHAES: An Encryption Scheme Based on the Diffie-Hellman Problem Michel Abdalla, Mihir Bellare, Phillip Rogaway
1999/005 (PDF ) Lattice Based Cryptography: A Global Improvement Daniele Micciancio
1999/004 (PDF ) Public-key cryptography and password protocols Shai Halevi, Hugo Krawczyk
1999/003 (PDF ) An error in the mixed adversary protocol by Fitzi, Hirt and Maurer Ivan Damgard
1999/002 (PDF ) Chinese Remaindering with Errors Oded Goldreich, Dana Ron, Madhu Sudan
1999/001 (PDF ) Signature Schemes Based on the Strong RSA Assumption Ronald Cramer, Victor Shoup
1998/026 (PDF ) Comparing Entropies in Statistical Zero-Knowledge with Applications to the Structure of SZK Oded Goldreich, Salil Vadhan
1998/025 (PDF ) Secure Distributed Storage and Retrieval Juan A. Garay, Rosario Gennaro, Charanjit Jutla, Tal Rabin
1998/024 (PDF ) The Disparity between Work and Entropy in Cryptology John Pliam
1998/023 (PDF ) Security amplification by composition: The case of doubly-iterated, ideal ciphers William Aiello, Mihir Bellare, Giovanni Di Crescenzo, Ramarathnam Venkatesan
1998/022 (PDF ) Insecurity of Quantum Computations Hoi-Kwong Lo
1998/021 (PDF ) Relations among Notions of Security for Public-Key Encryption Schemes Mihir Bellare, Anand Desai, David Pointcheval, Phillip Rogaway
1998/020 (PDF ) Almost All Discrete Log Bits Are Simultaneously Secure Claus P. Schnorr
1998/019 (PDF ) Many-to-one Trapdoor Functions and their Relation to Public-key Cryptosystems Mihir Bellare, Shai Halevi, Amit Sahai, Salil Vadhan
1998/018 (PDF ) Security and Composition of Multi-party Cryptographic Protocols Ran Canetti
1998/017 (PDF ) Making An Empty Promise With A Quantum Computer (Or, A Brief Review on the Impossibility of Quantum Bit Commitment) H. F. Chau, H. -K. Lo
1998/015 (PDF ) More on Proofs of Knowledge Shai Halevi, Silvio Micali
1998/014 (PDF ) Randomness versus Fault-Tolerance Ran Canetti, Eyal Kushilevitz, Rafail Ostrovsky, Adi Rosen
1998/013 (PDF ) A Random Server Model for Private Information Retrieval (or How to Achieve Information Theoretic PIR Avoiding Data Replication) Yael Gertner, Shafi Goldwasser, Tal Malkin
1998/012 (PDF ) Maintaining Authenticated Communication in the Presence of Break-ins Ran Canetti, Shai Halevi, Amir Herzberg
1998/011 (PDF ) The Random Oracle Methodology, Revisited Ran Canetti, Oded Goldreich, Shai Halevi
1998/010 (PDF ) Chameleon Hashing and Signatures Hugo Krawczyk, Tal Rabin
1998/009 (PDF ) A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols Mihir Bellare, Ran Canetti, Hugo Krawczyk
1998/008 (PDF ) An Efficient Non-Interactive Statistical Zero-Knowledge Proof System for Quasi-Safe Prime Products Rosario Gennaro, Daniele Micciancio, Tal Rabin
1998/007 (PDF ) Fast Batch Verification for Modular Exponentiation and Digital Signatures Mihir Bellare, Juan A. Garay, Tal Rabin
1998/006 (PDF ) A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack Ronald Cramer, Victor Shoup
1998/005 (PDF ) On the possibility of basing Cryptography on the assumption that $P \neq NP$ Oded Goldreich, Shafi Goldwasser
1998/004 (PDF ) Universal Service Providers for Database Private Information Retrieval Giovanni Di-Crescenzo, Yuval Ishai, Rafail Ostrovsky
1998/003 (PDF ) Private Information Retrieval by Keywords Benny Chor, Niv Gilboa, Moni Naor
1998/002 (PDF ) The Graph Clustering Problem has a Perfect Zero-Knowledge Proof A. De Santis, G. Di Crescenzo, O. Goldreich, G. Persiano.
1998/001 (PDF ) On Protocol Divertibility Gerrit Bleumer
1997/015 (PDF ) Optimistic fair Exchange of Digital Signatures N. Asokan, V. Shoup, M. Waidner
1997/014 (PDF ) Generalized Diffie-Hellman Modulo a Composite is not Weaker than Factoring Eli Biham, Dan Boneh, Omer Reingold
1997/013 (PDF ) Visual Authentication and Identification Moni Naor, Benny Pinkas.
1997/012 (PDF ) Self-Delegation with Controlled Propagation - or - What If You Lose Your Laptop. Oded Goldreich, Birgit Pfitzmann, Ronald L. Rivest
1997/011 (PDF ) Identity Escrow Joe Kilian, Erez Petrank
1997/010 (PDF ) CBC MAC for Real-Time Data Sources Erez Petrank, Charles Rackoff
1997/009 (PDF ) Collision-Resistant Hashing: Towards Making UOWHFs Practical Mihir Bellare, Phillip Rogaway
1997/008 (PDF ) Factoring via Strong Lattice Reduction Algorithms Harald Ritter, Carsten Roessner
1997/007 (PDF ) Towards realizing random oracles: Hash functions that hide all partial information Ran Canetti
1997/006 (PDF ) Protecting Data Privacy in Private Information Retrieval Schemes Yuval Ishai, Eyal Kushilevitz
1997/005 (PDF ) A Probabilistic Error-Correcting Scheme S. Decatur, O. Goldreich, D. Ron
1997/004 (PDF ) A note on negligible functions Mihir Bellare
1997/003 (PDF ) Efficient Cryptographic Protocols Based on Noisy Channels. Claude Crepeau
1997/002 (PDF ) Round-Optimal Zero-Knowledge Arguments Based on any One-Way Function Mihir Bellare, Markus Jakobsson, Moti Yung
1997/001 (PDF ) A New Paradigm for Collision-free Hashing: Incrementality at Reduced Cost Mihir Bellare, Daniele Micciancio
1996/016 (PDF ) Public-Key Cryptosystems from Lattice Reduction Problems Oded Goldreich, Shafi Goldwasser, Shai Halevi
1996/015 (PDF ) Verifiable Partial Key Escrow Mihir Bellare, Shafi Goldwasser
1996/014 (PDF ) The Graph Clustering Problem has a Perfect Zero-Knowledge Proof Oded Goldreich
1996/013 (PDF ) On the Contrast in Visual Cryptography Schemes Carlo Blundo, Alfredo De Santis, Douglas R. Stinson
1996/012 (PDF ) Proactive RSA Yair Frankel, Peter Gemmell, Philip D. MacKenzie, Moti Yung
1996/011 (PDF ) On the Construction of Pseudo-Random Permutations: Luby-Rackoff Revisited Moni Naor, Omer Reingold
1996/010 (PDF ) Oblivious Transfers and Intersecting Codes Gilles Brassard, Claude Crepeau, Miklos Santha
1996/009 (PDF ) Collision-Free Hashing from Lattice Problems Oded Goldreich, Shafi Goldwasser, Shai Halevi
1996/008 (PDF ) Access Control and Signatures via Quorum Secret Sharing Moni Naor, Avishai Wool
1996/007 (PDF ) Visual Cryptography II: Improving the Contrast Via the Cover Base Moni Naor, Adi Shamir
1996/006 (PDF ) Upper bound on the communication complexity of private information retrieval Andris Ambainis
1996/005 (PDF ) Private Information Storage Rafail Ostrovsky, Victor Shoup
1996/004 (PDF ) Linear Zero-Knowledge - A note on Efficient Zero-Knowledge Proofs and Arguments Ronald Cramer, Ivan Damgaard
1996/003 (PDF ) On Monotone Function Closure of Statistical Zero-Knowledge Ronald Cramer, Ivan Damgaard
1996/002 (PDF ) Deniable Encryption Ran Canetti, Cynthia Dwork, Moni Naor, Rafi Ostrovsky
1996/001 (PDF ) Incoercible Multiparty Computation Ran Canetti, Rosario Gennaro
[ Cryptology ePrint archive ]